garble
utls
Our great sponsors
garble | utls | |
---|---|---|
6 | 6 | |
3,518 | 1,495 | |
4.8% | 3.6% | |
8.4 | 8.1 | |
about 2 months ago | 15 days ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
garble
- Obfuscate Go Builds
-
SSHD: Random boot time relinking, OpenBSD
Yes, the base idea is not that new. I store since years every GO based application I use as small (few kb) source code tree checkout only, no binary at all. At runtime the wrapper compiles a randomized individual one-time-temporary-uniq binary via garble [0].
[0] https://github.com/burrowers/garble
- Reverse engineering executable
-
I built SafeHODL on Golang: A safe way to track your Bitcoin holdings value from the terminal
You're right. After thinking about it I finally understand that shouldn't embed the AES secret key and access pin code in cleartext into the binary, even if it's going to be obfuscated using [Garble](https://github.com/burrowers/garble). I didn't even hash encrypted them for further hash comparison, so it's very stupid of me.
- Our Github actions got abused for mining Monero today, anyone experienced sth. similar?
- Reversing Go - Part 1
utls
- uTLS – Go TLS fork with low-level access to ClientHello for mimicry purposes
-
Show HN: Golang HTTP Clients and Servers and Alternative Networking
Does this offer any control at the TLS level? I have been looking for alternate TLS stacks for Go, and the only one I really found was uTLS:
https://github.com/refraction-networking/utls
-
Easiest way to MITM my browser requests/responses using Go
Something that you'll run into for smarter anti-bot is that your JA3 tls signature will be checked. Easiest way to get around this is probably to use refraction-networking/utls. Especially true as go's tls signature is fairly unique.
-
GET request works only from the browser
Considering that the rocket league api isn't one of tracker.gg's listed apis, they probably enabled a lot of cloudflare'e antibot. If you really care to get around it, you can probably get fairly far with making sure you put the same headers as the chrome version you're trying to mimic. If that still doesn't work, then theres a chance that tracker.gg enabled ja3 fingerprint so you'd need to use a library like utls to fake your clienthello to look like chrome's.
- The State of Web Scraping in 2021
-
ClientHello mimicking in Rust
do we have something like https://github.com/refraction-networking/utls but for rust?
What are some alternatives?
go - The Go programming language
go-cloudflare-scraper - A golang http.Transport layer that uses Otto to solve Cloudflare challenges
appify - Create a macOS Application from an executable (like a Go binary)
trojan-go - Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW. https://p4gefau1t.github.io/trojan-go/
Glyph - An architecture independent binary analysis tool for fingerprinting functions through NLP
goproxy - An HTTP proxy library for Go
gpg - A client to gpg-agent for Go
pyppeteer - Headless chrome/chromium automation library (unofficial port of puppeteer)
wled-backup - Simple CLI tool to backup presets & configuration from a WLED device
colly - Elegant Scraper and Crawler Framework for Golang
safehodl - Track your Bitcoin holdings value safely from your terminal 🔐
lambdasoup - Functional HTML scraping and rewriting with CSS in OCaml