Skip to content

g4nkd/redproxy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

224 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Fork

This project combines two major forks:

Stealth Fingerprint Multilayer Spoofing

A research-focused tool designed for security testing, capable of simulating multiple fingerprint layers to match Chrome/Chromium behavior. It also performs IP rotation every 5 requests.

Supports:

  • IP Rotation (via GitHub Actions)
  • Bypass Javascript Bot Detection:
    • WebDriver
    • Common Window Size
  • JA4 (TLS fingerprint)
  • JA4H (HTTP fingerprint)
  • JA4X (X509 certificate fingerprint)
  • JA4T (TCP fingerprint)

Overview

image

Adjustments

You can adapt catcher-microsoft-login.py or catcher-fingerprint.py to customize how requests are crafted during security research and detection-evasion testing. These adjustments are useful for evaluating how infrastructures respond when multiple fingerprint layers and IP validation mechanisms are in place—for example, when assessing defenses against scenarios such as password spraying, brute-force attempts, or MFA validation abuse.

Demo

We can note different IP Addresses and the same JA4 hash (impersonating chrome): image

About

I developed this repository by combining a fork of Thermoptic Proxy with GitHub Actions–based IP rotation, along with several custom modifications such as improved handling of webdriver-detection mechanisms. The goal is to make the system adaptable and robust for BOT detection evasion+automation..

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages