Bypass Solution
This documentation provides detailed information on generating the Castle x-castle-request-token.
How the Solution Works
To bypass Castle:
Parse the site key from the webpage (starts with
pk_
).Send it along with your session’s
__cuid
(if you have one).Parse the response and use the
x-castle-request-token
.
Required Parameters:
scriptID
: A numeric scriptID parsed from the page's HTML
Optional Parameters:
__cuid
: The session’s__cuid
cookie. If not provided, one will be generated.
It's highly recommended to provide your session’s User-Agent
, Sec-Ch-Ua
, and Accept-Language
headers for more accurate token generation.
Example Response
In order to parse the scriptID from the page's HTML, you can use the following regex:
In order to access any of our endpoint you'll need a valid API Key, either join our discord for a trial or puchase a plan
Last updated