puppeteer-extra
curl-impersonate
puppeteer-extra | curl-impersonate | |
---|---|---|
28 | 31 | |
6,075 | 3,337 | |
- | - | |
0.0 | 7.1 | |
16 days ago | 2 months ago | |
JavaScript | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
puppeteer-extra
-
What are your favorite Data Scraping tools?
You could use https://github.com/berstend/puppeteer-extra/tree/master/packages/puppeteer-extra-plugin-stealth A plugin to escape anti bot detection
-
how can i bypasd 403 forbidden?
There is a good chance that the website is using Cloudflare to block web scrapers, which will require you to use a fortified headless browser to solve the JS challenges. Your options include the Puppeteer stealth plugin and Selenium undetected-chromedriver.
-
New headless Chrome has been released and has a near-perfect browser fingerprint
There are even Puppeteer plugins that will do it for you. [^1]
The best detection I've come across so far (i.e. before this release) has just required I run headless Chrome in headed mode. Granted, I don't do a ton of scraping -- mostly just pulling data out of websites so that I can play with it in aggregate using more civilized tools.
[1]: https://github.com/berstend/puppeteer-extra/tree/master/pack...
-
Proposed solution to twitter's ridiculous API pricing
You didn't know? https://github.com/berstend/puppeteer-extra/wiki/Block-resources-without-request-interception
- Using selenium with proxy still hit bot detection
-
Getting detected by Cloudflare for no apparent reason.
As for solutions, you are on point. Running a headless browser or using a web scraping API that does that for you (I work at one: https://scrapfly.io hi) is the easiest way to do it. Note that because of javascript fingerprinting you still need to fortify your headless browsers with various scripts like puppeteer-stealth.
-
100s of Spam Leads but not showing up in Google Analytics (UA) or Google Ads
Unfortunately, it's now trivial to bypass recaptcha: https://github.com/berstend/puppeteer-extra/tree/master/packages/puppeteer-extra-plugin-recaptcha
-
Perimeter X bypass help
Use a fortified headless browser like the stealth plugin for puppeteer.
- Spam on Unbounce Landers
- Puppeteer-extra-plugin-stealth – plugin for puppeteer-extra to prevent detection
curl-impersonate
-
Recent 'MFA Bombing' Attacks Targeting Apple Users
> us[e] Akamai to block scraping
Would https://github.com/lwthiker/curl-impersonate help? Haven’t tried with Akamai, but did help with another widely used CDN that shall remain unnamed (but has successfully infused me with burning hate for their products after a couple of years’ worth of using an always-on VPN to bypass Internet censorship and/or a slightly unusual browser).
- Curl-impersonate: Mimic real browsers' TLS handshake with curl
-
Get RSS feed for your Ko-Fi account
But before that, I had to create a development environment where I could do the coding. I used Docker and created a docker-compose.yml file on my local system to build a container. At first, I did that on an Arm based computer and the first problem appeared. Although RSS-Bridge was working fine, I couldn't get any data, and the reason was that Ko-Fi.com uses Cloudflare CDN. This is something that a lot of people had issues with in the past. RSS-Bridge solves that problem by using a special build of curl that can impersonate the four major browsers: Chrome, Edge, Safari & Firefox. But unfortunately, that library doesn't work well on Arm-based systems, so I had to move to my trusty Intel-based Linux computer.
-
curl-impersonate VS curl-impersonate-php - a user suggested alternative
2 projects | 2 Aug 2023
-
Found a way to bypass Cloudflare 403 forbidden in cURL, fetch
Curl-Impersonate: https://github.com/lwthiker/curl-impersonate A special build of curl that can impersonate Chrome & Firefox
- Weird API behavior: Only Postman and browser consistently work but making same request with requests library gets a Captcha instead.
-
Web fingerprinting is worse than I thought
I haven’t seen a custom build of Wget, but for Curl there is curl-impersonate[1].
[1] https://github.com/lwthiker/curl-impersonate
- Using selenium with proxy still hit bot detection
- Devirtualizing Nike.com's Bot Protection (Part 1)
-
Bypassing University Internet Restrictions for Legal Purposes (to access my homeservers/raspberry Pis/VPS)
If you're just trying to pull a file, the curl-impersonate could be a low-effort option.
What are some alternatives?
puppeteer - Node.js API for Chrome
curl_cffi - Python binding for curl-impersonate via cffi. A http client that can impersonate browser tls/ja3/http2 fingerprints.
dark-knowledge - 😈📚 A curated library of research papers and presentations for counter-detection and web privacy enthusiasts.
challenge-bypass-extension - DEPRECATED - Client for Privacy Pass protocol providing unlinkable cryptographic tokens
fakebrowser - 🤖 Fake fingerprints to bypass anti-bot systems. Simulate mouse and keyboard operations to make behavior like a real person.
electron-store - Simple data persistence for your Electron app or module - Save and load user preferences, app state, cache, etc
SendWhatsppTextByJavaScript - Here is small JS Script for sending a message in a loop.
puppeteer-instagram - Instagram automation driven by headless chrome.
static-curl - fully static builds of curl, runs anywhere
headless-recorder - Chrome extension that records your browser interactions and generates a Playwright or Puppeteer script.
browsercookie