
Security News
AI Has Taken Over Open Source
Vibe coding at scale is reshaping how packages are created, contributed, and selected across the software supply chain
hyper-sdk
Advanced tools
A powerful Python SDK for bypassing modern bot protection systems including Akamai Bot Manager, Incapsula, Kasada, and DataDome. Generate valid cookies, solve anti-bot challenges, and automate protected endpoints with ease.
Perfect for web scraping, automation, and data collection from protected websites.
Before using this SDK, you'll need an API key from Hyper Solutions:
from hyper_sdk import Session, SensorInput
session = Session("your-api-key")
# Generate Akamai sensor data
sensor_data, sensor_context = session.generate_sensor_data(SensorInput(
# sensor input fields
))
print(f"Generated sensor data: {sensor_data}")
print(f"Sensor context: {sensor_context}")
Install the Hyper Solutions SDK for Python using:
pip install hyper-sdk
Initialize the SDK with your API key to start bypassing bot protection:
from hyper_sdk import Session
# Basic session
session = Session("your-api-key")
# Advanced session with custom configuration
session = Session(
api_key="your-api-key",
jwt_key="your-jwt-key",
app_key="your-app-key",
app_secret="your-app-secret",
client=custom_http_client
)
Bypass Akamai Bot Manager protection with sensor data generation, cookie validation, and challenge solving.
Generate sensor data for valid Akamai cookies and bot detection bypass:
sensor_data, context = await session.generate_sensor_data({
# Configure sensor parameters
})
Solve sec-cpt challenges with built-in parsing and payload generation:
from hyper_sdk.akamai import SecCptChallenge
# Parse sec-cpt challenge from HTML
challenge = SecCptChallenge.parse(html_content)
# Or parse from JSON response
challenge = SecCptChallenge.parse_from_json(json_response)
# Generate challenge response payload
payload = challenge.generate_sec_cpt_payload(sec_cpt_cookie)
# Handle challenge timing requirements
challenge.sleep()
Validate Akamai _abck cookies and session states:
from hyper_sdk.akamai import is_cookie_valid, is_cookie_invalidated
# Check if cookie is valid for the current request count
is_valid = is_cookie_valid(cookie_value, request_count)
# Check if cookie has been invalidated and needs refresh
needs_refresh = is_cookie_invalidated(cookie_value)
Handle Akamai pixel challenges for advanced bot detection bypass:
from hyper_sdk import PixelInput
from hyper_sdk.akamai import parse_pixel_html_var, parse_pixel_script_url, parse_pixel_script_var
# Parse pixel challenge data
html_var = parse_pixel_html_var(html_content)
script_url, post_url = parse_pixel_script_url(html_content)
script_var = parse_pixel_script_var(script_content)
# Generate pixel data
pixel_data = session.generate_pixel_data(PixelInput(
# pixel input fields
))
Bypass Incapsula bot detection with Reese84 sensors and UTMVC cookie generation.
Create Reese84 sensor data for Incapsula bypass:
from hyper_sdk import ReeseInput
sensor_data = session.generate_reese84_sensor("example.com", ReeseInput(
# reese input fields
))
Generate UTMVC cookies for Incapsula protection bypass:
from hyper_sdk import UtmvcInput
utmvc_cookie, swhanedl = session.generate_utmvc_cookie(UtmvcInput(
# utmvc input fields
))
Parse UTMVC script paths and generate submit paths:
from hyper_sdk.incapsula import parse_utmvc_script_path, get_utmvc_submit_path
# Parse script path from content
script_path = parse_utmvc_script_path(script_content)
# Generate unique submit path
submit_path = get_utmvc_submit_path()
Parse dynamic Reese84 script paths from interruption pages:
from hyper_sdk.incapsula import parse_dynamic_reese_script
sensor_path, script_path = parse_dynamic_reese_script(html_content, "https://example.com")
Defeat Kasada Bot Manager with payload generation and POW solving.
Create x-kpsdk-ct tokens for Kasada bypass:
from hyper_sdk import KasadaPayloadInput
payload, headers = session.generate_kasada_payload(KasadaPayloadInput(
# kasada payload input fields
))
Solve Kasada Proof-of-Work challenges for x-kpsdk-cd tokens:
from hyper_sdk import KasadaPowInput
pow_payload = session.generate_kasada_pow(KasadaPowInput(
# kasada pow input fields
))
Bypass Vercel BotID protection by generating the required x-is-human header.
Create the x-is-human header for Vercel BotID bypass:
from hyper_sdk import BotIDHeaderInput
header = session.generate_botid_header(BotIDHeaderInput(
script=script_body, # The c.js script content
user_agent="your-user-agent",
ip="your-proxy-ip",
accept_language="en-US,en;q=0.9",
))
# Use the header in your requests
headers = {
"x-is-human": header,
# ... other headers
}
Extract Kasada script paths from blocked pages (HTTP 429):
from hyper_sdk.kasada import parse_kasada_script_path
script_path = parse_kasada_script_path(blocked_page_html)
# Returns: /ips.js?timestamp=...
Solve DataDome captchas including slider challenges and interstitial pages.
Bypass DataDome interstitial pages:
from hyper_sdk import DataDomeInterstitialInput
result = session.generate_interstitial_payload(DataDomeInterstitialInput(
# interstitial input fields
))
payload = result["payload"]
headers = result["headers"]
# POST payload to https://geo.captcha-delivery.com/interstitial/
Solve DataDome slider captchas automatically:
from hyper_sdk import DataDomeSliderInput
result = session.generate_slider_payload(DataDomeSliderInput(
# slider input fields
))
check_url = result["payload"]
headers = result["headers"]
# GET request to check_url
Generate DataDome tags payload:
from hyper_sdk import DataDomeTagsInput
tags_payload = session.generate_tags_payload(DataDomeTagsInput(
# tags input fields
))
Extract DataDome device check URLs from blocked pages:
from hyper_sdk.datadome import parse_interstitial_device_check_link, parse_slider_device_check_link
# Parse interstitial device links
device_link = parse_interstitial_device_check_link(
html_content,
datadome_cookie,
referer_url
)
# Parse slider device links
device_link = parse_slider_device_check_link(
html_content,
datadome_cookie,
referer_url
)
For detailed documentation on how to use the SDK, including examples and API reference, please visit our documentation website:
If you find any issues or have suggestions for improvement, please open an issue or submit a pull request.
This SDK is licensed under the MIT License.
Keywords: Python SDK, bot protection bypass, web scraping, Akamai bypass, Incapsula bypass, Kasada bypass, DataDome bypass, anti-bot, captcha solver, automation, reverse engineering, bot detection, web automation
FAQs
Hyper Solutions Python SDK
We found that hyper-sdk demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Vibe coding at scale is reshaping how packages are created, contributed, and selected across the software supply chain

Security News
npm invalidated all granular access tokens that bypass 2FA after a fresh Mini Shai-Hulud wave compromised 323 npm packages. Staged publishing also entered public preview.

Research
/Security News
Compromised npm package art-template delivered a Coruna-like iOS Safari exploit framework through a watering-hole attack.