Find Jobs
Hire Freelancers

url monitor with cloudflare waiting page bypass

€30-250 EUR

Closed
Posted over 5 years ago

€30-250 EUR

Paid on delivery
looking for a python script can monitor a list of URL and notify if a certain action occurs the script must bypass the Cloudflare, and open a selenium browser if captcha needed, ​send notification on discord, work with proxies and more details in dm. !!!!!!ONLY WHO KNOW HOW TO BYPASS CLOUDFLARE WAITING PAGE PLEASE!!!!!!!!!!! please make a bid only if u have already worked with sneakers web site monitor.
Project ID: 18534921

About the project

2 proposals
Remote project
Active 5 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
2 freelancers are bidding on average €123 EUR for this job
User Avatar
Hi, I think you've posted it before but bypassing cloud flare is easy and can be done with any js interpreter like node.js I've did it before couple of time but the real problem is if you send too many request to a cloud-flare protected page it will show most probably google recaptcha captcha so opening selenium is required, but i still don't know about what kind of actions you want to monitor , if you are interested we can talk about it on chat and discuss further about it Thanks
€90 EUR in 3 days
5.0 (3 reviews)
2.1
2.1

About the client

Flag of ITALY
bolzano, Italy
5.0
2
Payment method verified
Member since Jul 23, 2018

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759) & Freelancer Online India Private Limited (CIN U93000HR2011FTC043854)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.