RuriLib HTTP detected

Ha, I encountered this for the first time - the target is detected the Rurilib HTTP library on which the actual bullet is built by SSL fingerprint upon request and bans immediately. On v2, you can change the library to the system one, it works right away. But i prefer use Rurilib better.

So i think here is detection TSL fingerprint but not all. just RUrilib only. And ban this fingerprint. Its possible? and how i can recompilie rurilib with another Cipher Suites?

There as option on http request block , custom chiper suites play with that. Maybe it will help you .

1 Like

@Ruri I have the same problem, is there a way to pass it?

Use a TLS client like this one GitHub - bogdanfinn/tls-client: net/http.Client like HTTP Client with options to select specific client TLS Fingerprints to use for requests.