Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit 682580d

Browse filesBrowse files
NEW added task
1 parent 78c4e9a commit 682580d
Copy full SHA for 682580d

File tree

Expand file treeCollapse file tree

1 file changed

+48
-8
lines changed
Filter options
Expand file treeCollapse file tree

1 file changed

+48
-8
lines changed

‎README.md

Copy file name to clipboardExpand all lines: README.md
+48-8Lines changed: 48 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -248,10 +248,20 @@ Same as Geetest, requires to solve a puzzle. A response is generated, which look
248248
### hCaptcha
249249
Similar to capy and reCAPTCHA in solving, it requires a pageurl and sitekey in order for it to be solved. It's also the newest one.
250250

251+
### FunCaptcha
252+
253+
Similar to capy
254+
251255
### Tiktok
252256

253257
Captcha from tiktok website is a bit different than the others, but still similar in some regards. Usually it's asking the user to pick certain objects that are alike, from a handful of objects, which look or don't look similar.
254258

259+
### Task (your custom bot)
260+
261+
The task is a totally different concept compared to the other types of captcha.
262+
With the other captcha types above, we are instructing our workers to solve that particular captcha and we get a captcha solution back.
263+
The task is different. You create a template (bot) [here](https://imagetyperz.net) which will contain actions, step by step. Those actions will be executed on the worker computer. If there is a captcha on the page, you can instruct the worker to solve the captcha, and manually click a button, by using the description field of the template. You will get back the cookies, localStorage, fingerprint and screenshot of the worker's browser. This will make it possible for you to restore the session of the worker, i.e automatically logged into an account. Isn't that nice ? :)
264+
255265

256266
Endpoints :sparkles:
257267
--------------
@@ -660,7 +670,7 @@ Similar to reCAPTCHA, geetest captcha details are submitted, ID is received and
660670
>
661671
> - affiliateid = ***affiliateID*** ```- optional```
662672
>
663-
> - user_agent = ***user agent goes here*** ```- optional```
673+
> - useragent = ***user agent goes here*** ```- optional```
664674
>
665675
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
666676
>
@@ -687,7 +697,7 @@ Similar to reCAPTCHA, geetest captcha details are submitted, ID is received and
687697
>
688698
> - affiliateid = ***affiliateID*** ```- optional```
689699
>
690-
> - user_agent = ***user agent goes here*** ```- optional```
700+
> - useragent = ***user agent goes here*** ```- optional```
691701
>
692702
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
693703
@@ -718,7 +728,7 @@ GeeTesV4 is a new version of captcha from geetest
718728
> - geetestid = ***geetest captcha ID***
719729
> - action = UPLOADCAPTCHA
720730
> - affiliateid = ***affiliateID*** ```- optional```
721-
> - user_agent = ***user agent goes here*** ```- optional```
731+
> - useragent = ***user agent goes here*** ```- optional```
722732
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
723733
724734
### Retrieve GeeTest response (deprecated)
@@ -788,7 +798,7 @@ Use the 3 codes to bypass the geetest captcha.
788798
> - sitekey = **sitekey used in solving captcha (gathered from URL source code / DOM)**
789799
> - action = **UPLOADCAPTCHA**
790800
> - affiliateid = ***affiliateID*** ```- optional```
791-
> - user_agent = ***user agent goes here*** ```- optional```
801+
> - useragent = ***user agent goes here*** ```- optional```
792802
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
793803
>
794804
>
@@ -821,8 +831,9 @@ Use the 3 codes to bypass the geetest captcha.
821831
> - sitekey = **sitekey used in solving captcha (gathered from URL source code / DOM)**
822832
> - action = **UPLOADCAPTCHA**
823833
> - affiliateid = ***affiliateID*** ```- optional```
824-
> - user_agent = ***user agent goes here*** ```- optional```
834+
> - useragent = ***user agent goes here*** ```- optional```
825835
> - invisible = **1, if hcaptcha is invisible** ```- optional```
836+
> - HcaptchaEnterprise = **extra payload used in loading hcaptcha, e.g rqdata, JSON stringified format** `- optional`
826837
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
827838
>
828839
>
@@ -855,7 +866,7 @@ Use the 3 codes to bypass the geetest captcha.
855866
> - cookie_input = **cookies that will be set when solving captcha**
856867
> - action = **UPLOADCAPTCHA**
857868
> - affiliateid = ***affiliateID*** ```- optional```
858-
> - user_agent = ***user agent goes here*** ```- optional```
869+
> - useragent = ***user agent goes here*** ```- optional```
859870
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
860871
>
861872
>
@@ -890,7 +901,7 @@ Use the 3 codes to bypass the geetest captcha.
890901
> - action = **UPLOADCAPTCHA**
891902
> - data = **extra parameters in JSON format, used when initializing captcha** `- optional`
892903
> - affiliateid = ***affiliateID*** ```- optional```
893-
> - user_agent = ***user agent goes here*** ```- optional```
904+
> - useragent = ***user agent goes here*** ```- optional```
894905
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
895906
>
896907
>
@@ -902,9 +913,38 @@ Use the 3 codes to bypass the geetest captcha.
902913
**Errors**
903914

904915
- ```ERROR: AUTHENTICATION_FAILED``` - Provided username and password and/or access key are invalid.
905-
906916
- ```ERROR: INVALID_CAPTCHA_DATA``` - Keys expired or other reason for not being able to load funcaptcha captcha on worker end
917+
- ```ERROR: LIMIT_EXCEED``` - Server is overloaded
907918

919+
## Task (your custom bot)
920+
921+
> Access token authentication (or user & password)
922+
923+
>```POST /captchaapi/UploadFunCaptcha.ashx```
924+
925+
> **Parameters**
926+
>
927+
> - token = ***your access token***
928+
> - username = ***your username*** (token is preferred)
929+
> - password = **your password** (token is preferred)
930+
> - captchatype = **16**
931+
> - template_name = **name of the template that will be executed**
932+
> - pageurl = **the URL on which the template will be executed**
933+
> - variables = **variables that are used in the template execution, in stringified JSON format**
934+
> - action = **UPLOADCAPTCHA**
935+
> - affiliateid = ***affiliateID*** ```- optional```
936+
> - useragent = ***user agent goes here*** ```- optional```
937+
> - proxy = ***eg. 123.45.67.89:1234 or 12.34.56.78:123:username:password*** ```- optional```
938+
>
939+
>
940+
941+
**Response**
942+
943+
`captchaID` is returned back, use it with response JSON endpoint to retrieve solution.
944+
945+
**Errors**
946+
947+
- ```ERROR: AUTHENTICATION_FAILED``` - Provided username and password and/or access key are invalid.
908948
- ```ERROR: LIMIT_EXCEED``` - Server is overloaded
909949

910950
## (NEW) Response JSON endpoint

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.