gost VS CycleTLS

Compare gost vs CycleTLS and see what are their differences.

gost

GO Simple Tunnel - a simple tunnel written in golang (by ginuerzh)

CycleTLS

Spoof TLS/JA3 fingerprints in GO and Javascript (by Danny-Dasilva)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
gost CycleTLS
2 3
15,085 786
- -
4.0 6.7
9 days ago 17 days ago
Go Go
MIT License GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

gost

Posts with mentions or reviews of gost. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-12-11.

CycleTLS

Posts with mentions or reviews of CycleTLS. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-09-10.
  • Is it possible to scrape a website protected by Cloudflare?
    6 projects | /r/golang | 10 Sep 2022
    A lot of websites nowadays add fingerprint checking. So even if you fake the headers - it wouldn't help, as cloudflare still knows you are making request from go / python / whatever. So there is a lib to spoof fingerptint - https://github.com/Danny-Dasilva/CycleTLS . It may work for you .
  • Curl’s TLS Fingerprint
    3 projects | news.ycombinator.com | 2 Sep 2022
  • Stack under attack: what we learned about handling DDoS attacks
    1 project | news.ycombinator.com | 22 May 2022
    While it can still be spoofed using several packages , e.g. https://github.com/Danny-Dasilva/CycleTLS it can still provide a meaningful/easy-to-manipulate signal.

    Moreover, most bots conducting L7 DDoS don't use real/headless browsers in order to be able to scale their attack, so it's highly likely they'll have a discriminating/inconsistent TLS fingerprint.

    This can also be done directly in Fastly using e.g. https://developer.fastly.com/reference/vcl/variables/client-...

    Another approach to proactively flag malicious IPs is to scrape free proxies. Indeed, most DDoS leverage lot of cheap/know bad IPs. It's frequent to see these free proxies in these attacks.

What are some alternatives?

When comparing gost and CycleTLS you can also consider the following projects:

trojan-go - Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW. https://p4gefau1t.github.io/trojan-go/

go-cloudflare-scraper - A golang http.Transport layer that uses Otto to solve Cloudflare challenges

go-shadowsocks2 - Modern Shadowsocks in Go

mimic - Mimic chromium's HTTP/HTTP2 and TLS implementations.

tun2socks - tun2socks - powered by gVisor TCP/IP stack

chromedp - A faster, simpler way to drive browsers supporting the Chrome DevTools Protocol.

ghostunnel - A simple SSL/TLS proxy with mutual authentication for securing non-TLS services.

Ponzu - Headless CMS with automatic JSON API. Featuring auto-HTTPS from Let's Encrypt, HTTP/2 Server Push, and flexible server framework written in Go.

shadowsocks-go - A versatile and efficient proxy platform for secure communications.

surf - Stateful programmatic web browsing in Go.

kcptun - A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。N:M 多重化と FEC を備えた KCP に基づく安定した安全なトンネル。 N:M 다중화 및 FEC를 사용하는 KCP 기반의 안정적이고 안전한 터널입니다. Un tunnel stable et sécurisé basé sur KCP avec multiplexage N:M et FEC.

colly - Elegant Scraper and Crawler Framework for Golang