By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Kasada Anti-Bot Bypass Techniques: Save Money with These Open-Source Solutions | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Kasada Anti-Bot Bypass Techniques: Save Money with These Open-Source Solutions | HackerNoon
Computing

Kasada Anti-Bot Bypass Techniques: Save Money with These Open-Source Solutions | HackerNoon

News Room
Last updated: 2025/07/13 at 1:56 PM
News Room Published 13 July 2025
Share
SHARE

Bypassing anti-bots is one of the major pain points a professional web scraper faces during their career. Luckily enough, the market offers several solutions for bypassing them, but delegating the heavy-duty work always comes with a price tag attached, which is not for every pocket.

As the saying goes, ‘If you want something done right, do it yourself.‘ So, let’s continue the series of articles about bypassing well-known anti-bot protections with Open-Source tools.

After doing the same with Cloudflare, today is the turn of Kasada, the Australian anti-bot company. If you’re interested in learning more, you can watch a nice talk with Nick Rieniets, Kasada’s CTO, on the TWSC YouTube channel about the anti-bot industry and its evolution.

So, let’s see which open-source tools we can use to bypass the Kasada anti-bot in 2025, keeping some dollars in our pockets.

As always, we need to choose a website on which to test our solutions. Today, it’s Canada Goose, the e-commerce site of the famous outerwear brand.

The easiest way to detect when a website is using Kasada is by asking it for Wappalyzer, which has a browser extension you can use while visiting a website to detect its tech stack.

As a double check, since the Wappalyzer data can be stale, you can visit the website with the network tab of the Developers Tools open (but first, tick the “preserve log” box).

If you notice that the website first returns a 429 error and then loads correctly, this is the typical behavior of a Kasada-protected website.

This is also confirmed by the presence of this access control header on the following calls: x-kpsdk-ct,x-kpsdk-r, and x-kpsdk-c and x-kpsdk-ct token.

So, calculating the token is enough?

I often hear this from people trying to bypass an anti-bot solution: We need to generate a valid token to get clearance to scrape the website’s data.

While it could be interesting to learn to reverse engineer a commercial solution like Kasada, this is not the best approach if you need data soon. It takes time, and you must restart after every change in the anti-bot software. Despite the difficulties, several repositories on GitHub are trying to do it.

My preferred approach, instead, is to create a human-like request that mixes with the actual website traffic and goes unnoticed by the crowd.

Of course, this approach is slower since it requires a browser automation tool, but it’s also more ethical than bombarding the target server with hundreds of requests per second.

In this article, we’ll see three different open-source tools that allow you to bypass Kasada using Playwright and a modified browser.

Standard Playwright ❌

Before trying more undetected tools, let’s start with a simple script using a standard version of Playwright and Brave Browser.

from playwright.sync_api import sync_playwright
import time
CHROMIUM_ARGS= [
		'--no-sandbox',
		'--disable-setuid-sandbox',
		'--no-first-run',
		'--disable-blink-features=AutomationControlled',
		'--start-maximized'
		
	]
		
with sync_playwright() as p:

	
	browser = p.chromium.launch_persistent_context(user_data_dir='./userdata/',channel='chrome',no_viewport=True,executable_path='/Applications/Brave Browser.app/Contents/MacOS/Brave Browser', headless=False,slow_mo=200, args=CHROMIUM_ARGS,ignore_default_args=["--enable-automation"])
	all_pages = browser.pages
	page = all_pages[0]
	page.goto('https://www.canadagoose.com/', timeout=0)
	time.sleep(10)
	page.goto('https://www.canadagoose.com/it/it/shop/donna/capispalla/giacche-imbottite/shop-womens-puffers', timeout=0)
	time.sleep(10)
	browser.close()

I often use Brave in these examples because it’s a browser that adds some noise to the WebGL fingerprint, even though it’s not as powerful as a real anti-detect browser.

The test miserably fails, as we get a blank screen for both URLs, another distinguishing mark of Kasada.

Patchright ✅

A stealthier version of Playwright is Patchright, which modifies some of its default arguments and fixes well-known flaws that make it more detectable by an anti-bot.

The best part of the game?

You just need to change the imported package; the scraper is the same as the Playwright one. I just added the proxies and used the default browser installed with the library.

from patchright.sync_api import sync_playwright
import time
import os


proxies = {
		'server': 'http://ENDPOINT:PORT',
		'username': 'USER',
		'password': 'PWD'
	}

CHROMIUM_ARGS= [
		'--no-first-run',
		'--disable-blink-features=AutomationControlled',
		'--force-webrtc-ip-handling-policy'
	]
with sync_playwright() as p:
	browser = p.chromium.launch(headless=False,slow_mo=200, args=CHROMIUM_ARGS,ignore_default_args=["--enable-automation"])
	context = browser.new_context(proxy=proxies, ignore_https_errors=True, permissions=['geolocation'])
	page = context.new_page()
	page.goto('https://www.canadagoose.com/', timeout=0)
	time.sleep(10)
	page.goto('https://www.canadagoose.com/it/it/shop/donna/capispalla/giacche-imbottite/shop-womens-puffers', timeout=0)
	time.sleep(10)
	HTML_text = page.content()
	print(HTML_text)
	browser.close()

Now, the scraper works like a charm.

Zendriver ✅

Another package I tested is Zendriver (which is a fork of Nodriver, the successor of undetected-chromedriver).
I chose it instead of Nodriver because it is updated more often, and I was curious to test it.

It uses the Chrome Developer Protocol to interact with the browser, rather than a webdriver, and Python Async API to speed up the crawling.

import asyncio
import zendriver as zd
import time

proxies = {
		'server': 'http://ENDPOINT:PORT',
		'username': 'USER',
		'password': 'PWD'
	}

async def main():
	async with await zd.start(browser_executable_path='/Applications/Brave Browser.app/Contents/MacOS/Brave Browser', proxy=proxies) as browser:
		await browser.get('https://www.canadagoose.com/')
		time.sleep(10)
		await browser.get('https://www.canadagoose.com/it/it/shop/donna/capispalla/giacche-imbottite/shop-womens-puffers')
		time.sleep(10)
		await browser.stop()

if __name__ == "__main__":
	asyncio.run(main())

The small script can bypass Kasada and show us the pages without requiring us to set any particular options. Great discovery!

Camoufox ✅

Last but not least, one of the most mentioned libraries on these pages is Camoufox.

It’s an open-source anti-detect browser run by Playwright. It adds important features, such as human-like mouse movement and the ability to forge real fingerprints.

In this case, we just forged a new fingerprint of a Windows machine but didn’t move the mouse around the page, but that was enough to load the requested pages correctly.

from camoufox.sync_api import Camoufox
import time
import os


proxies = {
		'server': 'http://ENDPOINT:PORT',
		'username': 'USER',
		'password': 'PWD'
	}


with Camoufox(humanize=True,os="windows", geoip=True, proxy=proxies) as browser:
	page = browser.new_page()
	page.goto('https://www.canadagoose.com/', timeout=0)
	time.sleep(5)
	page.goto('https://www.canadagoose.com/it/it/shop/donna/capispalla/giacche-imbottite/shop-womens-puffers', timeout=0)
	time.sleep(5)
	HTML_text = page.content()
	print(HTML_text)
	browser.close()

The open-source community is always amazing and creates such great tools that sometimes don’t get the right appreciation.

Camoufox is a great example of a product that is on the same level as a commercial one.

What’s the best open-source tool you use for scraping? Please write it in the comment section!


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Subscriptions are overrated — own Microsoft Office Professional for life for just A$61
Next Article All 26 seasons of ‘South Park’ pulled from Paramount Plus — here’s where you can still stream it in the U.S.
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Dyson Reveals Futuristic Farming Vision
News
Alibaba Cloud cuts prices for international customers as AI demands rise · TechNode
Computing
Last Chance to Save: These Prime Day Deals on Apple AirPods, iPads, MacBooks, Smartwatches, and More End Tonight
News
Finding the Right Fit: Flooring Installation in Edmonton That Actually Feels Right
Gadget

You Might also Like

Computing

Alibaba Cloud cuts prices for international customers as AI demands rise · TechNode

1 Min Read
Computing

Toyota’s China joint venture to use Huawei components for autonomous driving: report · TechNode

1 Min Read
Computing

China’s group-buying platforms shift focus to profitability amid declining popularity: report · TechNode

1 Min Read
Computing

TSMC secures $6.6 billion US government subsidy for expansion · TechNode

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?