Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/unixfox/pupflare

A webpage proxy that request through Chromium (puppeteer) - can be used to bypass Cloudflare anti bot / anti ddos on any application (like curl)
https://github.com/unixfox/pupflare

anti-bot-page chromium cloudflare cloudflare-bypass cloudflare-scrape docker koa protected-page proxy puppeteer scrape scraping-websites

Last synced: 1 day ago
JSON representation

A webpage proxy that request through Chromium (puppeteer) - can be used to bypass Cloudflare anti bot / anti ddos on any application (like curl)

Awesome Lists containing this project

README

        

# Sponsor

# How to launch pupflare
1. Install NodeJS
2. `npm install`
3. `npm start`

# How to use
Send your request to the server with the port 3000 and add your URL to the "url" query string like this:
`http://localhost:3000/?url=https://example.org`

This script has been configured to wait for the cloudflare challenge to pass but, you can configure the "match" for anything else using the environment variable `CHALLENGE_MATCH`.
If the website that you are targeting have a protection page with "please wait" in the HTML code then launch the script like this:
```
CHALLENGE_MATCH="please wait" npm start
```

To show the browser window, set the environment variable `PUPPETEER_HEADFUL=1`.

To use a proxy,
set the `PUPPETEER_PROXY` environment variable, for example `PUPPETEER_PROXY=localhost:8080`.

To specify user data directory, set `PUPPETEER_USERDATADIR=/path/to/dir`.

To enable debugging: `DEBUG=true` and debugging with body in the logs: `DEBUG_BODY=true`

# Docker
Available as a Docker image here: https://quay.io/repository/unixfox/pupflare (linux/amd64,linux/arm64)

```
docker run -d -p 3000:3000 quay.io/unixfox/pupflare
```