A Burp extension has been developed to evade TLS fingerprinting, allowing users to bypass WAF and spoof any browser. This tool can be used to modify and hide the fingerprint of the TLS connection, making it harder for WAFs to detect and block malicious traffic. More details can be found on the GitHub repository: https://github.com/sleeyax/burp-awesome-tls
GitHub – sleeyax/burp-awesome-tls: Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser. https://t.co/0zZ59mr1CC
— Clandestine (@akaclandestine) November 24, 2024