This is WIP reverse engineering the Tiktok app HTTP headers. I was able to everse engineer many of the protobuf fields used in X-Gorgon/X-Argus, while some I used an emulator to calculate. This was an exercise for me to get back into reverse engineering after many years I haven't practiced it. Discontinued my research as I needed tooling I didn't have to finish the few fields I haven't cracked in X-Argus.
If you're working on cracking X-Argus, this file will help you out with the fields I've already deciphered: https://github.com/tsarpaul/tiktok-x-argus/blob/main/proto/proto-decoded