Giter VIP home page Giter VIP logo

kpsdk-solver's People

Contributors

0x6a69616e avatar codesandbot avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Forkers

kinghost-90 imvvk

kpsdk-solver's Issues

Kasada Catching Up :P

I'm unexpectedly receiving new errors with my formerly working new build. Something about insecurity...?

The view-source URL hack probably might have to be dumped :(

Browser Automation Detected on Linux Machines

I've been notified about a persistent problem affecting several users, and I'd like to address it myself since there haven't been any related issues submitted to this repository. Correct me if I'm mistaken, but it appears that kpsdk-solver is easily being detected for browser automation on Linux-based systems.

At the moment, the easiest workaround is to run the solver on a Windows-based machine. However, despite this, I still plan on putting efforts into patching this issue in an attempt to maintain some cross-platform functionality.

Question Regarding Deobfuscation kpsdk-solver

Hello,

I recently came across your repository while learning about reverse engineering. First, I want to thank you for making this open-source resource available; it's been incredibly insightful for a beginner like myself.

However, I'm encountering some challenges with deobfuscation, particularly concerning the modifications made to the original p.js file. For instance, functions like KPSDK_0x8410 and others appear to have been removed in p_deobf.js . I'm especially curious about how you managed to deobfuscate the intricate parts of the code, such as the variables _0x586c98 = KPSDK_0x2e2f, _0x26c6c1.

Any guidance or tips you could provide on your approach to deobfuscating such complex code would be greatly appreciated.

Additionally, if you have a Discord channel or a Telegram group for reverse engineering enthusiasts, I would be eager to join and learn more from the community.

Thank you once again for your contributions to the open-source community. I apologize if this isn't the appropriate channel for such queries; I'm still quite new to this.

Best regards,

429 problem

hi bro
i try use it but i get 429
i change urls in part1.js with own
but i got 429
and change p,js with my script in website
but got 429
where is my problem?!

kasada browser fingerprint

Hello, thank you for your open source kasada solver project which helped me a lot. I downloaded the project and ran it for two consecutive days to generate x-kpsdk-cd and x-kpsdk-ct. But just now I found that when the generated x-kpsdk-cd and x-kpsdk-ct parameters were submitted to the website api, Kasda blocked the request and returned status code 429.

Is it because I have been running the project that Kasada has blocked the fingerprint of the Playwright browser?
I wonder if you have encountered similar problems?

Twitch Integrity Token

Hi! I need to get integrity tokens for twitch auth tokens. But now, as I understand it, there are problems in this. I'd like to help u.
And I would like to get in touch for further development

hello, need information

hello and thank you for your work.
This works well but you absolutely have to de-obfuscate the p.js file. Is there a way to work directly with the file without deobfuscating it?

browser not open again

node:internal/process/promises:289
triggerUncaughtException(err, true /* fromPromise */);
^

page.evaluate: Target page, context or browser has been closed

I have placed the code from test.js is in a loop, but when you reopen the browser, it does not open if the previous one was closed via close()

Are you interested in collaborating

Are you interested in studying their risk control system(Web API WAF)?

I can share the generation algorithm I have here, as well as the trained model to bypass their risk control system.

For instance: ips.js, tl, fingerprint.

tl request body data

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.