Skip to content

primpvscamoufox

MIT 3 1 504
7.1 million (month) Jun 01 2024 1.2.2(2026-04-03 07:11:15 ago)
7,089 3 244 MPL-2.0
Mar 01 2024 1.0 million (month) 0.4.11(2025-01-29 09:33:18 ago)

Primp is a Python HTTP client that impersonates real web browsers by replicating their TLS fingerprints, HTTP/2 settings, and header ordering. It is a lightweight alternative to curl-cffi for bypassing TLS and HTTP fingerprinting-based bot detection.

Key features include:

  • Browser impersonation Can impersonate Chrome, Firefox, Safari, Edge, and OkHttp clients by replicating their exact TLS fingerprints (JA3/JA4), HTTP/2 frame settings, header ordering, and other connection-level characteristics.
  • HTTP/2 support Full HTTP/2 support with configurable settings that match real browser behavior.
  • Lightweight Smaller and simpler than curl-cffi while providing similar impersonation capabilities. Built on Rust for performance.
  • Familiar API Provides a requests-like API with Session support, making it easy to adopt for developers familiar with the Python requests library.
  • Proxy support HTTP and SOCKS5 proxy support with authentication.
  • Cookie management Automatic cookie handling across requests within a session.

Primp fills a similar niche to curl-cffi and hrequests — HTTP clients designed to avoid TLS/HTTP fingerprinting — but takes a Rust-powered approach for better performance. It is particularly useful when you need to bypass bot detection that relies on connection-level fingerprinting without using a full browser.

Camoufox is an anti-detect browser built on Firefox, designed specifically for web scraping and browser automation while evading bot detection systems. Unlike Chrome-based anti-detect solutions, Camoufox uses a patched version of Firefox with over 100 modifications to prevent fingerprinting and detection.

Key features include:

  • Firefox-based stealth Uses Firefox instead of Chrome, which has different fingerprinting characteristics and is less commonly targeted by anti-bot systems. The browser is patched at the C++ level to prevent JavaScript-based fingerprint leaks.
  • Realistic fingerprints Generates and applies realistic browser fingerprints including screen resolution, WebGL renderer, fonts, and other browser properties that match real user configurations.
  • Playwright integration Works seamlessly with Playwright for Python, providing the familiar Playwright API while running through the stealth-patched Firefox instance.
  • Proxy support Built-in proxy support with authentication, including residential proxy rotation.
  • Geolocation spoofing Can spoof browser geolocation to match proxy IP location for consistent fingerprints.
  • Human-like behavior Includes utilities for adding human-like mouse movements and typing patterns.

Camoufox is particularly effective against sophisticated anti-bot systems that detect Chrome-based automation tools. By using Firefox as the base, it avoids many Chrome-specific detection vectors while the deep browser patches prevent general fingerprinting techniques.

Highlights


bypasstls-fingerprinthttp-fingerprinthttp2fast
anti-detectstealth

Example Use


```python import primp # Create a session that impersonates Chrome session = primp.Session(impersonate="chrome_131") # Make requests - TLS fingerprint matches real Chrome response = session.get("https://example.com") print(response.status_code) print(response.text) # POST with JSON data response = session.post( "https://api.example.com/data", json={"key": "value"}, ) # With proxy session = primp.Session( impersonate="firefox_133", proxy="http://user:pass@proxy.example.com:8080", ) response = session.get("https://example.com") # Different browser impersonation profiles for browser in ["chrome_131", "firefox_133", "safari_18", "edge_131"]: session = primp.Session(impersonate=browser) resp = session.get("https://tls.peet.ws/api/all") print(f"{browser}: {resp.json()['ja3_hash']}") ```
```python from camoufox.sync_api import Camoufox # Launch stealth Firefox browser with Camoufox(headless=True) as browser: page = browser.new_page() # Navigate - the browser appears as a real Firefox user page.goto("https://example.com") # Use standard Playwright API for interaction page.fill("input[name='search']", "web scraping") page.click("button[type='submit']") # Extract data results = page.query_selector_all(".result") for result in results: title = result.query_selector("h3").text_content() print(title) # With proxy and custom fingerprint from camoufox.sync_api import Camoufox with Camoufox( headless=True, proxy={"server": "http://proxy.example.com:8080"}, geoip=True, # auto-match geolocation to proxy IP ) as browser: page = browser.new_page() page.goto("https://example.com") print(page.content()) ```

Alternatives / Similar


Was this page helpful?