Bypass Solution
Our solution automates the generation of all the required px-correlated headers
Last updated
Was this helpful?
Our solution automates the generation of all the required px-correlated headers
Last updated
Was this helpful?
To bypass PerimeterX protection:
Provide our API with the device and app details.
Parse the returned headers and use them for requests to the protected application.
Since PerimeterX is mobile-based, our API requires a JSON input with the package_name
of the Android app (e.g., com.enflick.android.TextNow
for TextNow). Additional optional device information can be supplied for more accurate header generation.
Based on this information, the API will return all necessary headers for the specified app.
This endpoint generates the PerimeterX authorization headers for mobile applications. It requires the package name of the Android mobile application, and optionally the continent and manufacturer.
The package name of the Android mobile application (e.g., com.enflick.android.TextNow)
Optional Android version (e.g., america)
Optional device brand (e.g., samsung)