freebsd-ports/net/py-cloudflare-scrape-js2py/pkg-descr
Stefan Eßer fb16dfecae Remove WWW entries moved into port Makefiles
Commit b7f05445c0 has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
2022-09-07 23:58:51 +02:00

12 lines
734 B
Text

A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes
their techniques periodically, so I will update this repo frequently.
This can be useful if you wish to scrape or crawl a website protected with
Cloudflare. Cloudflare's anti-bot page currently just checks if the client
supports Javascript, though they may add additional techniques in the future.
Due to Cloudflare continually changing and hardening their protection page,
cloudflare-scrape requires js2py to solve Javascript challenges. This allows
the script to easily impersonate a regular web browser without explicitly
deobfuscating and parsing Cloudflare's Javascript.