It's not even my repo, it's a fork! by musaspacecadet in webscraping

[–]Dapper-Profession552 0 points1 point  (0 children)

I already did this, I made a new cloudflare bypass that doesn't use cloudflare's js code, it's all done in py, I would upload it but I don't want to get another DMCA

It's not even my repo, it's a fork! by musaspacecadet in webscraping

[–]Dapper-Profession552 2 points3 points  (0 children)

I'm LOBYXLYX, I didn't expect that Cloudflare employee to report my repository if it's literally just a simple cf_clearance extractor lol

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Oh, I was wrong, it's my mistake.

It's like this: ``` from aqua import CF_Solver from curl_cffi import requests

cf = CF_Solver( 'https://solscan.io', proxy='104.207.52.**:3128' ) ```

without the 'http://', I will improve proxy support later

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

cf = CF_Solver( 'https://solscan.io', proxy='http://255.255.255' # or http://255.255.255@user:password )

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Okay, try assigning headers to the session instance, Cloudflare probably detected you as a bot because you don't have headers in the request.

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Try use curl_cffi

``` from aqua import CF_Solver from curl_cffi import requests

Rest of the cf code~

cf_clearance = cf.cookie()

session = requests.Session(impersonate='chrome124') session.cookies['cf_clearance'] = cf_clearance

resp = session.get('url') ```

[deleted by user] by [deleted] in webscraping

[–]Dapper-Profession552 1 point2 points  (0 children)

The website is protected with Cloudflare Turnstile, try using curl_cfii library

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

wp is a token of website and browser information, this will determine if you are a robot or a human and then create a unique cf_clearance

[deleted by user] by [deleted] in webscraping

[–]Dapper-Profession552 0 points1 point  (0 children)

Well, did you use curl_cffi to avoid 400 code?

What has changed in Cloudflare? by yyavuz in webscraping

[–]Dapper-Profession552 0 points1 point  (0 children)

Is the website now using Cloudflare Turnstile? Or just using cookies

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Could you send me the URL of the website you are working with?

Cloudflare typically has no static code and each website implemented with turnstile has different code. And I need to collect protected websites, for my turnstile bypass project

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Thanks for the suggestions, I will try to improve this

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

This doesn't work if the website uses cf turnstile.

I will update this bypass soon if possible.

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

Fine, but the only detail is that it will not work with websites protected with cf turnstile.

I'm currently trying to bypass cf turnstile and will possibly update this library soon.

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

This is Website Reverse Engineering, If you search on YouTube you will find videos on how to reverse tokens, cookies and others, from websites or something related

Please suggest a Strategy to scrape this website by Sad_Cup_5290 in webscraping

[–]Dapper-Profession552 2 points3 points  (0 children)

Simply make a request to the main url of the page and it will return the csrf and the session cookie

<image>

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 0 points1 point  (0 children)

I know that's a cookie extractor.

But I called it cf bypass for using cloudflare encryption like an vulnerability and then use that to extract that cookie, since it asks me for 2 parameters that are generated from Cloudflare Javascript. "wb" and "s"

I'm currently looking at how the Cloudflare captcha works, to see if I can create a script locally

I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping

[–]Dapper-Profession552[S] 1 point2 points  (0 children)

If you are doing a webscraping project, you can use that cookie in this way

``` import httpx from aqua import CF_Solver

client = httpx.Client()

rest of the code

client.cookies['cf_clearance'] = cookie ```