Versions:

  • 0.4
  • 0.3

JA3Proxy is a lightweight network tool developed by Lyle that intercepts outgoing TLS handshakes and rewrites their JA3 fingerprints on-the-fly through a local HTTP proxy, enabling applications to present a different client identity to remote servers. By sitting between the originating program and the target endpoint, the utility decodes the initial ClientHello packet, substitutes selectable cipher suites, extensions, and elliptic-curve parameters, and forwards the modified data, all without touching the encrypted payload that follows. The program is most frequently used by penetration testers, red-team operators, and privacy researchers who need to mimic browser signatures, evade restrictive IDS rules, rotate identities during scraping, or verify that server-side JA3 blacklists are enforced correctly. JA3Proxy runs as a tiny console application on Windows, binds to a user-defined loopback port, and exports its root CA so that HTTPS connections remain trusted; any client that respects the system proxy settings can route traffic through it instantly. The current stable release, version 0.4, introduces automatic fingerprint randomization, pcap-style traffic logging, and a rule-based engine that can apply different profiles per destination, while the preceding 0.3 branch remains available for users who require the original static mapping mode. Both editions ship as a single executable with no external dependencies, consume less than three megabytes of disk space, and expose a JSON REST endpoint for runtime reconfiguration. The software is available for free on get.nero.com, with downloads provided via trusted Windows package sources (e.g. winget), always delivering the latest version, and supporting batch installation of multiple applications.

Tags: