Hyper Solutions SDK - Python Library for Bot Protection Bypass (Akamai, Incapsula, Kasada, DataDome)
A powerful Python SDK for bypassing modern bot protection systems including Akamai Bot Manager, Incapsula, Kasada, and DataDome. Generate valid cookies, solve anti-bot challenges, and automate protected endpoints with ease.
Perfect for web scraping, automation, and data collection from protected websites.
Before using this SDK, you'll need an API key from Hyper Solutions:
- Visit hypersolutions.co to create your account
- Choose your plan:
- π³ Pay-as-you-go: Perfect for testing and small-scale usage
- π Subscription plans: Cost-effective for high-volume applications
- Get your API key from the dashboard
- Start bypassing bot protection with this SDK!
from hyper_sdk import Session, SensorInput
session = Session("your-api-key")
# Generate Akamai sensor data
sensor_data, sensor_context = session.generate_sensor_data(SensorInput(
# sensor input fields
))
print(f"Generated sensor data: {sensor_data}")
print(f"Sensor context: {sensor_context}")
- π‘οΈ Akamai Bot Manager: Generate sensor data, handle pixel challenges, validate cookies
- π Incapsula Protection: Generate Reese84 sensors and UTMVC cookies
- β‘ Kasada Bypass: Generate payload data (CT) and POW tokens (CD)
- π― DataDome Solutions: Solve tags, slider captchas and interstitial challenges
- π§ Easy Integration: Simple Python API with async/await support
- βοΈ Flexible Configuration: Custom HTTP clients and session management
Install the Hyper Solutions SDK for Python using:
pip install hyper-sdk
- Quick Start
- Installation
- Basic Usage
- Akamai Bot Manager
- Incapsula Protection
- Kasada Bypass
- DataDome Solutions
- Documentation
- Contributing
- License
Initialize the SDK with your API key to start bypassing bot protection:
from hyper_sdk import Session
# Basic session
session = Session("your-api-key")
# Advanced session with custom configuration
session = Session(
api_key="your-api-key",
jwt_key="your-jwt-key",
app_key="your-app-key",
app_secret="your-app-secret",
client=custom_http_client
)
Bypass Akamai Bot Manager protection with sensor data generation, cookie validation, and challenge solving.
Generate sensor data for valid Akamai cookies and bot detection bypass:
sensor_data, context = await session.generate_sensor_data({
# Configure sensor parameters
})
Solve sec-cpt challenges with built-in parsing and payload generation:
from hyper_sdk.akamai import SecCptChallenge
# Parse sec-cpt challenge from HTML
challenge = SecCptChallenge.parse(html_content)
# Or parse from JSON response
challenge = SecCptChallenge.parse_from_json(json_response)
# Generate challenge response payload
payload = challenge.generate_sec_cpt_payload(sec_cpt_cookie)
# Handle challenge timing requirements
challenge.sleep()
Validate Akamai _abck cookies and session states:
from hyper_sdk.akamai import is_cookie_valid, is_cookie_invalidated
# Check if cookie is valid for the current request count
is_valid = is_cookie_valid(cookie_value, request_count)
# Check if cookie has been invalidated and needs refresh
needs_refresh = is_cookie_invalidated(cookie_value)
Handle Akamai pixel challenges for advanced bot detection bypass:
from hyper_sdk import PixelInput
from hyper_sdk.akamai import parse_pixel_html_var, parse_pixel_script_url, parse_pixel_script_var
# Parse pixel challenge data
html_var = parse_pixel_html_var(html_content)
script_url, post_url = parse_pixel_script_url(html_content)
script_var = parse_pixel_script_var(script_content)
# Generate pixel data
pixel_data = session.generate_pixel_data(PixelInput(
# pixel input fields
))
Bypass Incapsula bot detection with Reese84 sensors and UTMVC cookie generation.
Create Reese84 sensor data for Incapsula bypass:
from hyper_sdk import ReeseInput
sensor_data = session.generate_reese84_sensor("example.com", ReeseInput(
# reese input fields
))
Generate UTMVC cookies for Incapsula protection bypass:
from hyper_sdk import UtmvcInput
utmvc_cookie, swhanedl = session.generate_utmvc_cookie(UtmvcInput(
# utmvc input fields
))
Parse UTMVC script paths and generate submit paths:
from hyper_sdk.incapsula import parse_utmvc_script_path, get_utmvc_submit_path
# Parse script path from content
script_path = parse_utmvc_script_path(script_content)
# Generate unique submit path
submit_path = get_utmvc_submit_path()
Parse dynamic Reese84 script paths from interruption pages:
from hyper_sdk.incapsula import parse_dynamic_reese_script
sensor_path, script_path = parse_dynamic_reese_script(html_content, "https://example.com")
Defeat Kasada Bot Manager with payload generation and POW solving.
Create x-kpsdk-ct tokens for Kasada bypass:
from hyper_sdk import KasadaPayloadInput
payload, headers = session.generate_kasada_payload(KasadaPayloadInput(
# kasada payload input fields
))
Solve Kasada Proof-of-Work challenges for x-kpsdk-cd tokens:
from hyper_sdk import KasadaPowInput
pow_payload = session.generate_kasada_pow(KasadaPowInput(
# kasada pow input fields
))
Extract Kasada script paths from blocked pages (HTTP 429):
from hyper_sdk.kasada import parse_script_path
script_path = parse_script_path(blocked_page_html)
# Returns: /ips.js?timestamp=...
Solve DataDome captchas including slider challenges and interstitial pages.
Bypass DataDome interstitial pages:
from hyper_sdk import DataDomeInterstitialInput
result = session.generate_interstitial_payload(DataDomeInterstitialInput(
# interstitial input fields
))
payload = result["payload"]
headers = result["headers"]
# POST payload to https://geo.captcha-delivery.com/interstitial/
Solve DataDome slider captchas automatically:
from hyper_sdk import DataDomeSliderInput
result = session.generate_slider_payload(DataDomeSliderInput(
# slider input fields
))
check_url = result["payload"]
headers = result["headers"]
# GET request to check_url
Generate DataDome tags payload:
from hyper_sdk import DataDomeTagsInput
tags_payload = session.generate_tags_payload(DataDomeTagsInput(
# tags input fields
))
Extract DataDome device check URLs from blocked pages:
from hyper_sdk.datadome import parse_interstitial_device_check_link, parse_slider_device_check_link
# Parse interstitial device links
device_link = parse_interstitial_device_check_link(
html_content,
datadome_cookie,
referer_url
)
# Parse slider device links
device_link = parse_slider_device_check_link(
html_content,
datadome_cookie,
referer_url
)
For detailed documentation on how to use the SDK, including examples and API reference, please visit our documentation website:
- Check our documentation
- Join our Discord community
If you find any issues or have suggestions for improvement, please open an issue or submit a pull request.
This SDK is licensed under the MIT License.
Keywords: Python SDK, bot protection bypass, web scraping, Akamai bypass, Incapsula bypass, Kasada bypass, DataDome bypass, anti-bot, captcha solver, automation, reverse engineering, bot detection, web automation