-
Hello! I'm looking for some kind of tool that would allow me to intercept TLS+h2, and create new sessions with different fingerprints. My goal is to have a generic SOCKS5 proxy that could handle rewriting the TLS+h2 fingerprints, block some h2 requests, do some caching, etc. That would remove a lot of complexity when instrumenting Chrome and improve performances as well. (request interception takes a lot of CPU doing the encoding of the messages) Is rama a good fit for this? Cheers |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 6 replies
-
Yes all that is very easily do-able with rama, but it does require you to know what you are doing and know your way around rust well enough. If that is the case Rama will make your life very easy here as it can already do most out of the box. For caching you'll need to use a third party library or something from yourself but either way very easy to integrate in your rama-based stack. So all good. Also consider becoming a sponsor as it helps sustain the free and open source project. Next to that we also offer service contracts in case you want our help to get you from the ground with a first version. Either way best of luck. |
Beta Was this translation helpful? Give feedback.
Yes all that is very easily do-able with rama, but it does require you to know what you are doing and know your way around rust well enough. If that is the case Rama will make your life very easy here as it can already do most out of the box. For caching you'll need to use a third party library or something from yourself but either way very easy to integrate in your rama-based stack. So all good.
Also consider becoming a sponsor as it helps sustain the free and open source project. Next to that we also offer service contracts in case you want our help to get you from the ground with a first version.
Either way best of luck.