adidas-multi-session is a open-source program to simulate multiple sessions on adidas queue pages. It will open a x amounts of sessions in the background (depending on the num of proxies), when a session gets past queue/splash, it will automatically open a Chrome window with the active session. This script is still in BETA and doesn't guarantee any 'cart'. It is actively developed.
For updates follow me on Twitter: @TerryBommels and follow YZY.io on Twitter: @yzyio
This script is licensed under NPOSL-3.0. A short summary of this license is:
- It can only be used as non-profit
- Your code must be open-source, even modifications of the code
You need the following things installed on your Windows/Mac/Linux computer:
- Python 3+, download here
- A PhantomJS file (.exe/.dmg), download here
- A chromedriver file (.exe/.dmg), download here
If you use this script for the first time, following these instructions. Make sure you are always on the latest version:
- Download or clone this repository. And put it in a folder.
- Open a cmd/terminal window and go to the folder where the project files are located.
- Run
pip install -r requirements.txt
- Mac OS: Put the PhantomJS and chromedriver in the bin folder.
- Windows: Put the PhantomJS.exe and chromedriver.exe in your C:\ folder.
Now edit
config.py
. Set PHANTOM_JS_LOCATION toC:\phantomjs.exe
and CHROMEDRIVER_LOCATION toC:\chromedriver.exe
- Edit
config.py
and fill in the PRODUCT_URL and PROXIES. Make sure USE_PROXIES is set toTrue
- Run
python run.py
in cmd/terminal to start the script.
- Download/clone this repository. Overwrite existing files.
- Run
pip install -r requirements.txt
- Edit
config.py
file with your settings. - Run
python run.py
in cmd/terminal to start the script.
- Every x seconds the script will check for the hmac cookie.
- If the cookie is found, the session will be transferred to a Chrome session.
- If you are using a proxy with authentication, you need to login first. The credentials are printed in the console.
- It will load the page with the cookies / ip / user-agent from the session that got past splash.
For questions, please do not DM me. You can write a public tweet to me and I will reply. I will accept pull requests so feel free to contribute.
It is never tested on a live release. So it is possible it won't work at all, will crash or let you cop a pair. It only increases your chances and is no 'bypass'. A 'bypass' does not exists (atm) and all the popular ATC/Cook Groups/Mafias are using this same method but on a much larger scale.
You can also use sessions, set USE_PROXIES to False
and NUM_SESSION to your liking. However all sessions are from the same IP.
I used MyPrivateProxy to test. I will update this README with more proxy providers. Make sure you pick sneaker proxies that work on adidas.
Use at your own risk.