Learn how to bypass captcha using Python, Selenium, Playwright & AI. Covers Roblox captcha bypass, Cloudflare solutions, and best tools for developers.
In the modern web, CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart) are the gatekeepers. Whether you are logging into Roblox, checking out on Amazon, or scraping data from a site protected by Cloudflare, these challenges aim to block bots. However, as fast as security teams build walls, developers and end-users search for solutions. This article explores the landscape of captcha bypass methods, from browser extensions to AI-driven scripts, with a focus on technical accuracy and responsible use.

The motivations vary significantly across different user groups:
Gamers might search for a roblox captcha bypass to automate account creation for legitimate testing or accessibility purposes.
Developers need a playwright bypass captcha solution for automated testing of their own applications.
Accessibility users frustrated with distorted text simply ask "how to bypass captcha human verification" when visual challenges are impossible to read.
Researchers collecting public data may need to navigate captchas to gather information at scale.
While some use cases are legitimate (automated testing, accessibility accommodations), others may violate platform terms of service. Understanding this distinction is critical for responsible implementation.
For programmers, the question is rarely if you can handle a CAPTCHA, but how to do so efficiently and ethically. Below are the most common technical approaches, ranging from basic automation to advanced AI integration.
Tools like Selenium and Playwright are the standard for web automation, but they are easily detected without proper configuration.
To bypass captcha selenium, developers typically use undetected chromedriver or add stealth plugins to mask automation fingerprints. A basic implementation requires carefully mimicking human behavior patterns.
A playwright bypass captcha setup combines Playwright with proxy rotation and browser context isolation. However, Playwright alone cannot solve image-based challenges; it needs integration with an external solver service. For bypass captcha playwright scripts, developers often connect to APIs like 2Captcha or Capsolver.
Standard headless browsers have unique "tells" that Cloudflare and DataDome actively scan for:
The navigator.webdriver property set to true
Missing browser plugins or extensions
Inconsistent screen resolutions and user agent strings
Unusual JavaScript execution timing
The most popular language for captcha handling is Python. To bypass captcha python, developers use libraries such as:
undetected-chromedriver – A patched version of Selenium that evades basic detection
pytesseract – OCR library for simple text captchas (limited effectiveness)
capsolver / 2captcha API wrappers – For professional solving services
A typical selenium bypass captcha workflow in Python:
1from selenium import webdriver
2import capsolver
3
4driver = webdriver.Chrome()
5driver.get("https://example.com/login")
6
7# Detect captcha presence
8if driver.find_elements(".captcha-container"):
9 site_key = driver.find_element(".g-recaptcha").get_attribute("data-sitekey")
10 solution = capsolver.solve({
11 "type": "ReCaptchaV2TaskProxyless",
12 "websiteURL": "https://example.com",
13 "websiteKey": site_key
14 })
15 driver.execute_script(f"document.getElementById('g-recaptcha-response').innerHTML = '{solution}';")
16 driver.find_element("submit-button").click()
17
18Ai bypass captcha represents the cutting edge of automated solving. Modern computer vision models can handle complex challenges:
Convolutional Neural Networks (CNNs) for image segmentation – achieving over 90% accuracy on reCAPTCHA v2's "select all traffic lights" puzzles
Transformer-based audio models for solving audio captchas in seconds
YOLO (You Only Look Once) object detection – custom-trained to identify bicycles, crosswalks, or fire hydrants
However, Google's reCAPTCHA v3 has shifted toward behavioral analysis, tracking mouse movements, typing patterns, and browsing history. This makes pure AI-based solving significantly less effective against modern implementations.
For non-technical users, browser extensions offer a seemingly simple solution. A captcha bypass extension claims to automatically solve challenges in the background. Popular search queries include:
Captcha bypass extension – Generic add-ons that integrate with commercial solving services
Roblox captcha bypass extension – Specifically targets Roblox's FunCaptcha implementation
Cloudflare captcha bypass extension – Attempts to solve or skip Cloudflare Turnstile and IUAM pages
Discord captcha bypass – Extensions marketed for Discord account automation
Critical Warning: Most free extensions are scams, malware, or ineffective. Legitimate browser-based solvers typically require:
A paid API key from a solving service (Capsolver, 2Captcha, etc.)
Explicit installation from official Chrome Web Store or Firefox Add-ons
Transparent source code (for open-source options)
Before installing any extension, verify the publisher, read recent reviews, and check permissions requested. Extensions demanding "read and change all data on websites" with vague justifications should be avoided.
How to bypass roblox captcha is heavily searched among automation developers. Roblox uses FunCaptcha by Arkose Labs, known for its dynamic difficulty and resistance to automation.
Technical Methods:
A. Token interception – Using a roblox captcha bypass method that captures the solution token before submission
B. Session recycling – Reusing authenticated cookies to avoid new challenges entirely
C. Human farming – Outsourcing solves to paid human workers via API (approximately $2–5 per 1,000 solves)
For bypass roblox captcha at scale, developers typically combine token-based approaches with residential proxy rotation to maintain session integrity across multiple accounts.
Amazon captcha bypass remains notoriously difficult due to Amazon's multi-layered defense system, which combines:
Distorted text with variable fonts and background noise
Behavioral analysis of mouse movements and typing speed
Device fingerprinting across Amazon's global infrastructure
To how to bypass amazon captcha effectively, solutions include:
Using Amazon's own AWS Textract OCR service (ironically) to read distorted text – achieving approximately 75% accuracy
Combining OCR with confidence scoring and multiple retry attempts
Implementing bypass captcha workflows that trigger lower-difficulty challenges by mimicking Prime customer browsing patterns
Cloudflare captcha bypass and datadome captcha bypass represent the most sophisticated challenges for automation engineers. These enterprise solutions track:
Mouse movement trajectories and acceleration patterns
TLS fingerprinting (JA3 signatures)
Browser rendering inconsistencies
WebGL and canvas fingerprinting
Effective Bypass Methods:
FlareSolverr – An open-source proxy server that solves bypass cloudflare captcha challenges using real browser instances
Browser automation with undetected-chromedriver – Specifically patched to avoid Cloudflare's detection heuristics
Session persistence – Maintaining long-lived browser profiles with consistent fingerprints
Important Limitation: A cloudflare captcha bypass extension alone is generally ineffective against Cloudflare's server-side validation, which cryptographically ties the solution token to your specific browser fingerprint and IP address.
The one ui 7 captcha bypass emerged as a niche but notable development: Samsung's One UI 7 browser introduced an accessibility feature that automatically fills CAPTCHAs using on-device AI. Intended for users with visual impairments, this feature was quickly identified as an effective captcha bypasser for mobile automation workflows. Samsung has since added rate limiting and challenge complexity scaling to prevent abuse.
For developers working on automated testing, data aggregation, or accessibility tools, the landscape of CAPTCHA handling divides into two categories: Solving Services (which solve challenges directly) and Stealth & Automation Frameworks (which avoid triggering challenges altogether).
Best for: Production automation requiring millisecond-level speed and high-volume solving.
Capsolver uses machine learning models trained on millions of captcha samples to solve challenges almost instantly. Based on 2026 benchmark data, it solves reCAPTCHA v2 in 3 to 9 seconds and standard image-to-text challenges in under 1 second.
Technical Specifications:
Supported Types: reCAPTCHA v2 (checkbox and invisible), reCAPTCHA v3 Enterprise, hCaptcha, FunCaptcha (Roblox), Cloudflare Turnstile, AWS WAF, and Geetest
API Compatibility: Offers a 2Captcha-compatible endpoint, enabling seamless switching between providers with minimal code changes
Integration: REST API with official SDKs for Python, Node.js, Go, Java, and C#
Billing Model: Pay-per-success – you are not charged for unsolvable challenges
Pricing Benchmark (as of 2026):
reCAPTCHA v2: $0.80 per 1,000 solves
Cloudflare Turnstile: $1.20 per 1,000 solves
hCaptcha: $1.00 per 1,000 solves
FunCaptcha: $1.50 per 1,000 solves
Implementation Example (Python):
1import capsolver
2
3capsolver.api_key = "YOUR_API_KEY"
4
5solution = capsolver.solve({
6 "type": "ReCaptchaV2TaskProxyless",
7 "websiteURL": "https://example.com",
8 "websiteKey": "6Le-wvkSAAAAAPBMRTvw0Q4Muexq9bi0DJwx_mJ-"
9})
10print(solution["gRecaptchaResponse"])
11
12Best for: Obscure, custom, or highly distorted challenges that defeat AI systems.
2Captcha routes challenges to a distributed workforce of human operators worldwide. While slower (10–30 seconds typical solve time), it offers unmatched versatility, supporting over 20 unique challenge types.
Technical Specifications:
Supported Types: Standard text captchas, image captchas, audio captchas, reCAPTCHA v2/v3, hCaptcha, GeeTest, Capy Puzzle, Cloudflare Turnstile, Amazon AWS WAF, and simple "click a button" verifications
API Format: REST API with SDKs for Python, PHP, JavaScript (Node.js), Java, C#, Ruby, and Go
Additional Tools: Browser extensions for Chrome and Firefox to simplify debugging and manual solve submission
Limitations:
Not suitable for real-time or latency-sensitive workflows
Requires stable internet connection for API calls
Weekend and holiday solving times may increase by 30–50%
Pricing Benchmark:
Standard text captchas: $1.00 per 1,000 solves
reCAPTCHA v2: $2.99 per 1,000 solves
Audio captchas: $2.00 per 1,000 solves
Implementation Concept:
1import requests
2
3api_key = "YOUR_2CAPTCHA_API_KEY"
4site_key = "6Le-wvkSAAAAAPBMRTvw0Q4Muexq9bi0DJwx_mJ-"
5
6# Submit captcha for solving
7submit_response = requests.post("https://2captcha.com/in.php", data={
8 "key": api_key,
9 "method": "userrecaptcha",
10 "googlekey": site_key,
11 "pageurl": "https://example.com"
12})
13
14Best for: Preventing browser-based detection flags before a captcha challenge is triggered.
Puppeteer Extra Stealth is an open-source plugin that patches the unique fingerprints of a headless Chromium browser. Standard Puppeteer leaves detectable artifacts (the navigator.webdriver property, specific user agent strings, missing plugins) that Cloudflare, DataDome, and reCAPTCHA v3 actively scan for.
Technical Mechanism: The Stealth plugin applies 20+ evasion techniques, including:
Removing navigator.webdriver property entirely
Spoofing navigator.plugins and navigator.mimeTypes
Emulating navigator.languages and navigator.hardwareConcurrency
Patching WebGL and canvas fingerprinting methods
Simulating human-like window.outerWidth and window.outerHeight values
Implementation:
1const puppeteer = require('puppeteer-extra');
2const StealthPlugin = require('puppeteer-extra-plugin-stealth');
3puppeteer.use(StealthPlugin());
4
5(async () => {
6 const browser = await puppeteer.launch({ headless: "new" });
7 const page = await browser.newPage();
8 await page.goto('https://example.com');
9 // Your automation logic here
10})();
11
12Effectiveness Metrics:
Reduces detection rate from approximately 85% (standard Puppeteer) to under 5% (with Stealth) on basic Cloudflare challenges
reCAPTCHA v3 bot score improves from 0.1–0.3 to 0.7–0.9
Best for: Cross-browser automation requiring stealth capabilities across multiple rendering engines.
While Playwright offers superior modern web automation features compared to Puppeteer, it shares the same fundamental detection vulnerabilities. The playwright-extra package enables using the StealthPlugin logic with Playwright's API.
Key Advantage: Playwright-extra supports stealth configurations across Chromium, Firefox, and WebKit. Firefox automation with stealth is notably effective against detection systems that assume all bots use Chromium-based browsers.
Implementation:
1const { chromium } = require('playwright-extra');
2const StealthPlugin = require('puppeteer-extra-plugin-stealth');
3chromium.use(StealthPlugin());
4
5(async () => {
6 const browser = await chromium.launch({ headless: false });
7 const page = await browser.newPage();
8 await page.goto('https://example.com');
9 // Playwright automation methods remain identical
10})();
11
12Note: The library serves as a "drop-in replacement" – change only the require/import statements without modifying existing automation logic.
Best for: Programmatic bypass of Cloudflare's "I'm Under Attack Mode" (IUAM), also known as the 5-Second Shield.
FlareSolverr acts as a self-hosted proxy server. When you send a standard HTTP request to FlareSolverr, it spawns a real Selenium browser instance, allows Cloudflare to execute its JavaScript challenge, solves any presented puzzles, extracts the cf_clearance cookie, and returns both the cookie and the final page HTML.
Technical Architecture:
Uses undetected-chromedriver internally to evade common detection patterns
Maintains a pool of browser instances to reduce cold-start latency
Cryptographically binds session cookies to the requesting IP address
Resource Requirements:
Memory: 2-4 GB RAM per concurrent browser instance
CPU: Moderate usage during challenge execution
Storage: Minimal (primarily for logs and temp files)
Implementation:
1import requests
2
3# FlareSolverr running on localhost:8191
4response = requests.post('http://localhost:8191/v1', json={
5 "cmd": "request.get",
6 "url": "https://target-site-with-cloudflare.com",
7 "maxTimeout": 60000, # milliseconds
8 "userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36"
9})
10
11if response.status_code == 200:
12 html_content = response.json()["solution"]["response"]
13 cf_clearance_cookie = response.json()["solution"]["cookies"]["cf_clearance"]
14
15Best Practice: Run FlareSolverr as a Docker container for easy deployment and resource isolation:
1docker run -d -p 8191:8191 --name flaresolverr flaresolverr/flaresolverr:latest
2
3Best for: Solving simple, low-complexity text captchas on legacy systems or internal applications.
Tesseract is an open-source Optical Character Recognition (OCR) engine originally developed by HP and now maintained by Google. It cannot solve logical puzzles (e.g., "Select all images containing buses") or any modern reCAPTCHA variants. However, for legacy systems or internal tools using clean, non-distorted text, Tesseract provides a free, offline solution.
Workflow:
Download and extract captcha image (PNG, JPG, or GIF)
Preprocess using OpenCV (convert to grayscale, apply thresholding, remove background noise)
Run OCR using pytesseract.image_to_string()
Parse and clean extracted text
Practical Example (Python):
1import pytesseract
2import cv2
3from PIL import Image
4
5# Load and preprocess image
6image = cv2.imread('captcha.png')
7gray = cv2.cvtColor(image, cv2.COLOR_BGR2GRAY)
8_, thresh = cv2.threshold(gray, 128, 255, cv2.THRESH_BINARY_INV)
9
10# Run OCR
11text = pytesseract.image_to_string(thresh, config='--psm 8') # Single word mode
12print(f"Extracted text: {text}")
13
14Accuracy Metrics:
Standard 4-character alphanumeric captchas (clean background): 70-75% accuracy
With added noise, lines, or overlapping characters: Drops to 30-50%
Completely distorted or warped text: Under 10% (not recommended)
Warning: Tesseract is completely ineffective against Google reCAPTCHA, Cloudflare Turnstile, hCaptcha, or any challenge requiring contextual understanding.
| Tool | Primary Function | Cost Model | Best Environment | Supported Captcha Types |
|---|---|---|---|---|
| Capsolver | AI-powered solving | Paid (API credits) | Python, Node, Go, Java | reCAPTCHA v2/v3, hCaptcha, FunCaptcha, Turnstile |
| 2Captcha | Human-powered solving | Paid (per solve) | Any language with HTTP | Text, image, audio, GeeTest, many others |
| Puppeteer Extra | Stealth evasion | Free (open source) | Node.js / Chromium | N/A (prevents triggering) |
| Playwright Extra | Stealth evasion | Free (open source) | Node.js / multi-browser | N/A (prevents triggering) |
| FlareSolverr | Cloudflare proxy | Free (self-hosted) | Docker / Python | Cloudflare IUAM and Challenge |
| Tesseract OCR | Simple text reading | Free (local) | Python / offline | Low-complexity text captchas only |
Before implementing any captcha bypassing technique, understand the legal landscape:
Use captcha bypass techniques exclusively on your own websites, local development environments, or with express written permission from the site owner
Even with working bypass methods, implement 3-5 second delays between requests
Rotate but stay realistic (no crawler-specific strings)
Never bypass CAPTCHAs on paths explicitly disallowed in robots.txt
Academic research and public interest archiving (e.g., Internet Archive) may qualify for fair use in some jurisdictions (consult legal counsel)
The most robust automation setup combines multiple approaches:
For services like Cloudflare, the
1cf_clearanceThe dance between captcha bypass techniques and defensive security measures continues to evolve. For every how to bypass a captcha tutorial published, security teams update their detection models. For every bypass captcha python library released, Google deploys a new reCAPTCHA version.
If you are a developer, resist the temptation to use these techniques against real-world websites without explicit permission. The costs – in legal fees, account bans, engineering time, or ethical standing – rarely outweigh the value of automated access. Instead, use bypass captcha methods on your own test environments, your own websites, or with formal API agreements from service providers.
Stay curious, develop responsibly, and respect the digital boundaries that website operators establish.