**Bypass-Turnstile** is a Rest-API that helps you bypass `Cloudflare Turnstile`
Made With
- Quart - Using Hypercorn or an alternative ASGI server
Features
SERVICES |
FUNCTION |
Cloudflare Checker |
To determine if a website is utilizing Cloudflare's services. |
Solve Turnstile Challenge |
To obtain a turnstile challenge token and solve it afterwards. |
Endpoint
https://x404x-bye-turnstile-ae128f0c.koyeb.app/
Parameter
check_cf
solve
Cloudflare Checker
```python
import httpx
ENDPOINT = "https://x404x-bye-turnstile-ae128f0c.koyeb.app/"
TARGET_URL = "https://haveibeenpwned.com/"
params = {"target_url": TARGET_URL}
response = httpx.get(f"{ENDPOINT}check_cf", params=params, timeout=20)
response_json = response.json()
print(response_json)
```
Output
```yml
{
"code": 200,
"cloudflare": True,
"challenge": False,
"chl-bypass": False,
"cf-ray": True,
"cf-cache": True,
"cf-bm": True,
"turnstile": True,
"iuam": False,
"turnstile_sitekey": "0x4AAAAAAADY3UwkmqCvH8VR",
}
```
Solve Turnstile Challenge
```python
from urllib.parse import quote_plus
import httpx
ENDPOINT = "https://x404x-bye-turnstile-ae128f0c.koyeb.app/"
TARGET_URL = "https://haveibeenpwned.com/"
email = input("Your email: ")
encoded_email = quote_plus(email)
params = {"target_url": TARGET_URL}
response = httpx.get(f"{ENDPOINT}check_cf", params=params, timeout=20)
response_json = response.json()
turnstile_sitekey = response_json.get("turnstile_sitekey")
if turnstile_sitekey is None:
raise ValueError("Turnstile sitekey is not present")
json_data = {
"sitekey": turnstile_sitekey,
"url": TARGET_URL,
}
response = httpx.post(f"{ENDPOINT}solve", json=json_data, timeout=20)
response_json = response.json()
token = response_json.get("token")
headers = {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0",
"Accept": "*/*",
"Accept-Language": "en-US,en;q=0.5",
"Referer": "https://haveibeenpwned.com/",
"cf-turnstile-response": token,
"X-Requested-With": "XMLHttpRequest",
"DNT": "1",
"Connection": "keep-alive",
"Sec-Fetch-Dest": "empty",
"Sec-Fetch-Mode": "cors",
"Sec-Fetch-Site": "same-origin",
}
response = httpx.get(
f"https://haveibeenpwned.com/unifiedsearch/{encoded_email}", headers=headers
)
if not response.is_success:
print("Good news — no pwnage found!")
else:
print(response.json())
```
Output
```yml
Your email: johnny.rotten@yahoo.com
{
'Breaches': [
{
'Name': 'Collection1',
'Title': 'Collection #1',
'Domain': '',
'BreachDate': '2019-01-07',
'AddedDate': '2019-01-16T21:46:07Z',
'ModifiedDate': '2019-01-16T21:50:21Z',
'PwnCount': 772904991,
'Description': 'In January 2019, a large collection of
credential stuffing lists (combinations of email addresses and passwords
used to hijack accounts on other services) was discovered being distributedon a popular hacking forum. The data contained almost 2.7 billion
records including 773 million unique email addresses alongside passwords
those addresses had used on other breached services. Full details on the
incident and how to search the breached passwords are provided in the blog
post The 773 Million Record "Collection #1"
Data Breach.',
'LogoPath':
'https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png',
'DataClasses': ['Email addresses', 'Passwords'],
'IsVerified': False,
'IsFabricated': False,
'IsSensitive': False,
'IsRetired': False,
'IsSpamList': False,
'IsMalware': False,
'IsSubscriptionFree': False
},
{
'Name': 'VerificationsIO',
'Title': 'Verifications.io',
'Domain': 'verifications.io',
'BreachDate': '2019-02-25',
'AddedDate': '2019-03-09T19:29:54Z',
'ModifiedDate': '2019-03-09T20:49:51Z',
'PwnCount': 763117241,
'Description': 'In February 2019, the email address validation
service verifications.io
suffered a data breach. Discovered by Bob
Diachenko and Vinny Troia, the breach was due to the data being storedin a MongoDB instance left publicly facing without a password and resulted
in 763 million unique email addresses being exposed. Many records within
the data also included additional personal attributes such as names, phone
numbers, IP addresses, dates of birth and genders. No passwords were
included in the data. The Verifications.io website went offline during the
disclosure process, although an archived copy remains viewable.',
'LogoPath':
'https://haveibeenpwned.com/Content/Images/PwnedLogos/VerificationsIO.png', 'DataClasses': [
'Dates of birth',
'Email addresses',
'Employers',
'Genders',
'Geographic locations',
'IP addresses',
'Job titles',
'Names',
'Phone numbers',
'Physical addresses'
],
'IsVerified': True,
'IsFabricated': False,
'IsSensitive': False,
'IsRetired': False,
'IsSpamList': False,
'IsMalware': False,
'IsSubscriptionFree': False
}
],
'Pastes': None
}
```
Legal Disclaimer
[!Note]
This was made for educational purposes only, nobody which directly involved in this project is responsible for any damages caused. You are responsible for your actions.