EXE-based Reverse Proxy with TLS Fingerprinting
Built with FastAPI + TLS-Client + Uvicorn
Gotlsapi is a powerful standalone EXE-based reverse proxy built with FastAPI + TLS-Client. It allows you to forward HTTP requests with custom headers, proxy rotation, enforced header order, optional protocol switching (HTTP/2), and browser-like TLS fingerprinting. Designed especially for scenarios like API tunneling, automated checkers, or bypass flows, it works without installing Python or any dependencies.
π’ Works out of the box β just run the EXE, and you're good to go.
- β
Supports
GET,POST,PUT,DELETE,PATCH, and more - π Proxy injection with
ip:port:user:passauto-format - π HTTP/2 protocol switch via
x-kc-protocolheader - π§ Header order enforcement for bot protection bypassing
- β±οΈ Delay support via
x-kc-delay - π TLS Fingerprint emulation via
x-kc-fingerprint(Chrome, Safari, Firefox, etc.) - π¨ Colorized request logging with response codes
- π¦ No dependencies needed β just run the EXE!
-
Download the EXE from the
Releases section.
- Run the program:
Gotlsapi.exe - Select port (Default:
9000). - Send your request through the proxy:
POST http://localhost:9000/
| Header | Description |
|---|---|
x-kc-url |
Target URL to forward the request to (can be full or relative) |
x-kc-proxy |
Proxy in format ip:port:user:pass or full URL |
x-kc-protocol |
2 for HTTPS (HTTP/2), otherwise uses HTTP |
x-kc-headerorder |
Force header order (comma-separated) |
x-kc-delay |
Add delay (in ms) before forwarding request |
x-kc-fingerprint |
Choose TLS fingerprint (e.g. chrome_120, safari_17) |
All non-x-kc- headers will be forwarded as-is to the target.
import requestsheaders = { "x-kc-url": "https://web.prod.cloud.netflix.com/graphql", "x-kc-proxy": "Http:<Proxy>", "x-kc-protocol": "2", "x-kc-headerorder": "User-Agent,Accept,Content-Type", "x-kc-fingerprint": "chrome_120", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:140.0) Gecko/20100101 Firefox/140.0", "Accept": "application/json", }
r = requests.post("http://localhost:9000/", headers=headers, data='{}') print(r.text)
# 1. Clone the repo $ git clone https://github.com/YashvirGaming/GoTlsClient.git$ pip install -r requirements.txt
$ python Gotlsclient.py
β Working login capture:
π Reverse Proxy Flow:
[TLS Proxy] GET https://www.google.com β 200 (123.4 ms)
[TLS Proxy] POST https://api.example.com/login β 401 (78.9 ms)
[TLS Proxy] GET https://redirect.test β 302 (45.1 ms)
[TLS Proxy] POST https://api.example.com/data β 500 (212.7 ms)
β
200 (Green) Β Β
π 300 (Cyan) Β Β
This project is licensed under the MIT License.
Built with β€οΈ by @YashvirGaming
Telegram: @therealyashvirgaming
Thanks to all testers and contributors for feedback!