gost
CycleTLS
Our great sponsors
gost | CycleTLS | |
---|---|---|
2 | 3 | |
15,085 | 786 | |
- | - | |
4.0 | 6.7 | |
9 days ago | 17 days ago | |
Go | Go | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gost
-
Teach us something Sundays
With a combination of Gost and cloudflare tunnel you can access literally anything on the local LAN network.
-
Obfuscate specific connection
I would use gost for something like this (this also supports creating a shadowsocks tunnel, as outlined in the readme file.)
CycleTLS
-
Is it possible to scrape a website protected by Cloudflare?
A lot of websites nowadays add fingerprint checking. So even if you fake the headers - it wouldn't help, as cloudflare still knows you are making request from go / python / whatever. So there is a lib to spoof fingerptint - https://github.com/Danny-Dasilva/CycleTLS . It may work for you .
- Curl’s TLS Fingerprint
-
Stack under attack: what we learned about handling DDoS attacks
While it can still be spoofed using several packages , e.g. https://github.com/Danny-Dasilva/CycleTLS it can still provide a meaningful/easy-to-manipulate signal.
Moreover, most bots conducting L7 DDoS don't use real/headless browsers in order to be able to scale their attack, so it's highly likely they'll have a discriminating/inconsistent TLS fingerprint.
This can also be done directly in Fastly using e.g. https://developer.fastly.com/reference/vcl/variables/client-...
Another approach to proactively flag malicious IPs is to scrape free proxies. Indeed, most DDoS leverage lot of cheap/know bad IPs. It's frequent to see these free proxies in these attacks.
What are some alternatives?
trojan-go - Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW. https://p4gefau1t.github.io/trojan-go/
go-cloudflare-scraper - A golang http.Transport layer that uses Otto to solve Cloudflare challenges
go-shadowsocks2 - Modern Shadowsocks in Go
mimic - Mimic chromium's HTTP/HTTP2 and TLS implementations.
tun2socks - tun2socks - powered by gVisor TCP/IP stack
chromedp - A faster, simpler way to drive browsers supporting the Chrome DevTools Protocol.
ghostunnel - A simple SSL/TLS proxy with mutual authentication for securing non-TLS services.
Ponzu - Headless CMS with automatic JSON API. Featuring auto-HTTPS from Let's Encrypt, HTTP/2 Server Push, and flexible server framework written in Go.
shadowsocks-go - A versatile and efficient proxy platform for secure communications.
surf - Stateful programmatic web browsing in Go.
kcptun - A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。N:M 多重化と FEC を備えた KCP に基づく安定した安全なトンネル。 N:M 다중화 및 FEC를 사용하는 KCP 기반의 안정적이고 안전한 터널입니다. Un tunnel stable et sécurisé basé sur KCP avec multiplexage N:M et FEC.
colly - Elegant Scraper and Crawler Framework for Golang