needle is an HTTP client library for Node.js that provides a simple, flexible, and powerful API for making HTTP requests.
It supports all major HTTP methods and has a clean and easy-to-use interface for handling responses and errors.
Primp is a Python HTTP client that impersonates real web browsers by replicating their
TLS fingerprints, HTTP/2 settings, and header ordering. It is a lightweight alternative
to curl-cffi for bypassing TLS and HTTP fingerprinting-based bot detection.
Key features include:
- Browser impersonation
Can impersonate Chrome, Firefox, Safari, Edge, and OkHttp clients by replicating their
exact TLS fingerprints (JA3/JA4), HTTP/2 frame settings, header ordering, and other
connection-level characteristics.
- HTTP/2 support
Full HTTP/2 support with configurable settings that match real browser behavior.
- Lightweight
Smaller and simpler than curl-cffi while providing similar impersonation capabilities.
Built on Rust for performance.
- Familiar API
Provides a requests-like API with Session support, making it easy to adopt for
developers familiar with the Python requests library.
- Proxy support
HTTP and SOCKS5 proxy support with authentication.
- Cookie management
Automatic cookie handling across requests within a session.
Primp fills a similar niche to curl-cffi and hrequests — HTTP clients designed to avoid
TLS/HTTP fingerprinting — but takes a Rust-powered approach for better performance. It is
particularly useful when you need to bypass bot detection that relies on connection-level
fingerprinting without using a full browser.
```javascript
const needle = require('needle');
// needle supports both Promises and async/await
needle.get('https://httpbin.org/get', (err, res) => {
if (err) {
console.error(err);
return;
}
console.log(res.body);
});
const response = await needle.get('https://httpbin.org/get')
// concurrent requests can be sent using Promise.all
const results = await Promise.all([
needle.get('http://httpbin.org/html'),
needle.get('http://httpbin.org/html'),
needle.get('http://httpbin.org/html'),
])
// POST requests
const data = { name: 'John Doe' };
await needle.post('https://api.example.com', data)
// proxy
const options = {
proxy: 'http://proxy.example.com:8080'
};
await needle.get('https://httpbin.org/ip', options)
// headers and cookies
const options = {
headers: {
'Cookie': 'myCookie=123',
'X-My-Header': 'myValue'
}
};
await needle.get('https://httpbin.org/headers', options)
```
```python
import primp
# Create a session that impersonates Chrome
session = primp.Session(impersonate="chrome_131")
# Make requests - TLS fingerprint matches real Chrome
response = session.get("https://example.com")
print(response.status_code)
print(response.text)
# POST with JSON data
response = session.post(
"https://api.example.com/data",
json={"key": "value"},
)
# With proxy
session = primp.Session(
impersonate="firefox_133",
proxy="http://user:pass@proxy.example.com:8080",
)
response = session.get("https://example.com")
# Different browser impersonation profiles
for browser in ["chrome_131", "firefox_133", "safari_18", "edge_131"]:
session = primp.Session(impersonate=browser)
resp = session.get("https://tls.peet.ws/api/all")
print(f"{browser}: {resp.json()['ja3_hash']}")
```