Last active
March 9, 2020 20:39
-
-
Save manciuszz/4ae2499f0b748be2ef83a98b41e50843 to your computer and use it in GitHub Desktop.
KissManga Cloudflare Challenge Anti-AdBlock Counter-Tamper.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ==UserScript== | |
// @name KissManga - AdBlock Tampered Cloudflare Challenge Bypass | |
// @version 0.11 | |
// @author Manciuszz | |
// @match *://kissmanga.com/* | |
// @grant unsafeWindow | |
// ==/UserScript== | |
(function() { | |
'use strict'; | |
let footprint = document.querySelector("div[id^='cf-dn']"); | |
if (footprint) { | |
document.cookie.split(";").forEach(function(c) { document.cookie = c.replace(/^ +/, "").replace(/=.*/, "=;expires=" + new Date().toUTCString() + ";path=/"); }); | |
unsafeWindow.t = window.location.host; | |
unsafeWindow.k = footprint.id; | |
} | |
})(); |
is there an easy way to get this to work with other sites that are using cloudflare?
It really depends on the website and their cloudflare implementation. If the tampering done was identical to this, then simply adding a new line like this
// @match ://my_tampered_website.com/
will solve the issue... but that's highly unlikely.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
is there an easy way to get this to work with other sites that are using cloudflare?