PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

Overview

PyPasser

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request, gets rresp by params and token which gotted in previous step.

Support Python >= 3.7

Installation

From PyPI

pip install PyPasser

From Github (latest repo code)

pip install git+https://github.com/xHossein/[email protected]

 

Usage

Option 1: Use the pre-added sites

see pre-added sites here.

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com, snapchat_com

# for Spotify.com
reCaptcha_response = reCaptchaBypasser(spotify_com)
## use this response in your requests ...

# for SnapChat.com
reCaptcha_response = reCaptchaBypasser(snapchat_com)
## use this response in your requests ...

 

Option 2: Use CustomSite for unadded sites

To use CustomSite, first you must find endpoint and params of anchor URL.

  • Open inspect-element on your browser.
  • Go to web page that has reCaptcha V3.
  • In Network tab you should see a request with URL like this:
    https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
    so in this URL, endpoint is api2 (it also can be enterprise in another sites).
    and params is ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
from pypasser import reCaptchaBypasser
from pypasser.structs import CustomSite

config = CustomSite('endpoint', 'params')
reCaptcha_response = reCaptchaBypasser(config)
## use this response in your requests ...

 

Use proxy

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com
from pypasser.structs import Proxy

## Using Proxy structure
proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT')

## with authentication credentials
# proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT','USERNAME', 'PASSWORD')

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

also you can configure it as Dict.

proxy = {"http": "http://HOST:PORT",
         "https": "http://HOST:PORT"}

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

 

Set timeout

Default timeout is 20 seconds but you can change the amount like this:

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com

reCaptcha_response = reCaptchaBypasser(spotify_com, timeout = 10)

 

Exception

Exception Description
ConnectionError Raised due to network connectivity-related issues.
SiteNotSupported Raised when site not in sites.json.
RecaptchaTokenNotFound Raised when couldn't find token due to wrong endpoint or params.
RecaptchaResponseNotFound Raised when couldn't find reCaptcha response due to using PyPasser for site that hasn't reCaptchaV3.
Comments
  • new site

    new site

    Wasn't sure where to ask. Could you add hbomax.com as a new site?

    https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LeMrv8ZAAAAAIcvo5HKvdj1lxtUdHnS13jUCulQ&co=aHR0cHM6Ly9wbGF5Lmhib21heC5jb206NDQz&hl=en&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=invisible&cb=4dxv36bwkio3

    enhancement 
    opened by jpeg115 6
  • ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    When I try to run the following code:

    from pypasser import reCaptchaBypasser

    I get this error: "ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'"

    How to solve it? Thanks!

    opened by roboes 4
  • `ffmpeg` dependency required to import `ReCaptchaV3`

    `ffmpeg` dependency required to import `ReCaptchaV3`

    From the README, it appears ffmpeg is only a requirement for solving recaptcha v2, however running from pypasser import ReCaptchaV3 seems to use pydub.utils which expects ffmpeg or avconv.

    Is this intentional?

    >>> from pypasser import ReCaptchaV3
    
    /usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pydub/utils.py:170: RuntimeWarning: Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work
      warn("Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work", RuntimeWarning)
    Traceback (most recent call last):
      File "/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/code.py", line 90, in runcode
        exec(code, self.locals)
      File "<input>", line 1, in <module>
    ImportError: cannot import name 'ReCaptchaV3' from 'pypasser' (/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pypasser/__init__.py)
    
    opened by banagale 1
  • Incompatibility with requests==2.26.0

    Incompatibility with requests==2.26.0

    I would like to test this package - but it seems that it is not compatible with requests==2.26.0 (https://pypi.org/project/requests/#history).

    Any chance that the latest version of requests gets compatible to your package?

    Thanks!

    opened by roboes 1
  • Bug for custom site

    Bug for custom site

    i have try this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    after this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    and this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

      File "XXXXX", line 6, in <module>
        reCaptcha_response = reCaptchaBypasser(config)
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 49, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 82, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    

    but all don't work, please help me ^^

    opened by JeanQuiTest 1
  • important question

    important question

    hello do it work for recaptcha v2 invisible if so pls tell me how to make it work am creating bot but it just wont work because invisible recaptcha so pls help

    opened by CosmicDev-Official 0
  • question

    question

    hello bro, I have successfully used the recaptcha version v3, but it worked on a few tries, sometimes 1 to 3, after that it will error "invalid captcha", do you have a solution?

    opened by andipediaa 0
  • pypasser.exceptions.RecaptchaResponseNotFound

    pypasser.exceptions.RecaptchaResponseNotFound

    anchor url: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=invisible&cb=7eimmxc1uvrj

    Traceback (most recent call last):
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 99, in <module>
        loop.run_until_complete(send_async_requests(1))
      File "D:\Apps\Anaconda\envs\functions_env\lib\asyncio\base_events.py", line 642, in run_until_complete
        return future.result()
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 93, in send_async_requests
        return await asyncio.gather(*tasks)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 64, in bound_fetch
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        await fetch(number=number, proxy=proxy, email=email, email_password=email_password, useragent=useragent)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        recaptcha = reCaptchaV3("https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=inv
    isible&cb=7eimmxc1uvrj")
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 46, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 86, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    opened by kreo79 2
  • INVALID_REASON_UNSPECIFIED when submitting

    INVALID_REASON_UNSPECIFIED when submitting

    Im trying to submit a V3 generated token to spotify register recap, but i get INVALID_REASON_UNSPECIFIED as the answer to this https://www.spotify.com/api/signup/recaptcha/assess. (Normal solving results in a OK response) The payload is the same (the token looks a bit different of course):

    action: "website/signup/checkbox"
    token: "RECAPTOKENHERE"
    

    Im using this anchor url: https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LfCVLAUAAAAALFwwRnnCJ12DalriUGbj8FW_J39&co=aHR0cHM6Ly93d3cuc3BvdGlmeS5jb206NDQz&hl=de&v=1p3YWy80wlZ7Q8QFR1gjazwU&size=invisible&cb=26ifuv3a5qun (other give me pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found. errors)

    opened by Vinyzu 0
  • recaptcha v3 with specefic action

    recaptcha v3 with specefic action

    Hello what about website that use code like grecaptcha.ready(function() { grecaptcha.execute(site-key, {action: 'verify'}).then(function(token) { document.getElementById('g-recaptcha-response').value = token; }); }); how to bypass this kind of recaptcha v3 ?

    opened by Radamanth132 1
Releases(0.0.5)
This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections.

Log4J-Huntress-Automate-Script This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections. Pre-Requisits

1 Dec 16, 2021
A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021)

wifi-bf [LINUX ONLY] A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021) This script is purely for educa

Finn Lancaster 20 Nov 12, 2022
Brute-Force-Connected

Brute-Force-Connected Guess the password for Connected accounts the use : Create a new file and put usernames and passwords in it Example : joker:1234

4 Jun 05, 2022
Generate malicious files using recently published bidi-attack (CVE-2021-42574)

CVE-2021-42574 - Code generator Generate malicious files using recently published bidi-attack vulnerability, which was discovered in Unicode Specifica

js-on 7 Nov 09, 2022
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability

log4j-shell-poc A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. Recently there was a new vulnerability in log4j, a java loggin

koz 1.5k Jan 04, 2023
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)

log4j-finder A Python3 script to scan the filesystem to find Log4j2 that is vulnerable to Log4Shell (CVE-2021-44228) It scans recursively both on disk

Fox-IT 431 Dec 22, 2022
威胁情报播报

Threat-Broadcast 威胁情报播报 运行环境 项目介绍 从以下公开的威胁情报来源爬取并整合最新信息: 360:https://cert.360.cn/warning 奇安信:https://ti.qianxin.com/advisory/ 红后:https://redqueen.tj-u

东方有鱼名为咸 148 Nov 09, 2022
Pgen is the best brute force password generator and it is improved from the cupp.py

pgen Pgen is the best brute force password generator and it is improved from the cupp.py The pgen tool is dedicated to Leonardo da Vinci -Time stays l

heyheykids 2 Jan 31, 2022
信息收集自动化工具

水泽-信息收集自动化工具 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。 0x01 介绍 作者:Ske 团队:0x727,未来一段时间将陆续开源工具,地址:https://github.com/0x727 定位:协助

0x727 2.7k Jan 09, 2023
A gui application used for network reconnaissance while pentesting

netrecon A gui application used for network reconnaissance while pentesting

Krisna Pranav 4 Sep 03, 2022
POC for detecting the Log4Shell (Log4J RCE) vulnerability

Interactsh An OOB interaction gathering server and client library Features • Usage • Interactsh Client • Interactsh Server • Interactsh Integration •

ProjectDiscovery 2.1k Jan 08, 2023
Remote Desktop Protocol in Twisted Python

RDPY Remote Desktop Protocol in twisted python. RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client a

Sylvain Peyrefitte 1.6k Dec 30, 2022
A simple linux keylogger project.

The project This project is a simple linux keylogger. When activated, it registers all the actions made with the keyboard. The log files are registere

1 Oct 24, 2021
A Simple File Encryptor/Decryptor

Ec: A Simple File Encryptor/Decryptor This has been made for educational reasons only, any constructive criticism/advice/comments are welcome! Also, p

1 Dec 10, 2021
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically to AIL

AIL LeakFeeder: A Module for AIL Framework that automates the process to feed leaked files automatically to AIL, So basically this feeder will help you ingest AIL with your leaked files automatically

ail project 8 May 03, 2022
Show apps recorded storage files by jailbreak

0x101 Show registered storage files of apps by jailbreak Legal disclaimer: Usage of insTof for attacking targets without prior mutual consent is illeg

0x 4 Oct 24, 2022
Ducky Script is the payload language of Hak5 gear.

Ducky Script is the payload language of Hak5 gear. Since its introduction with the USB Rubber Ducky in 2010, Ducky Script has grown in capability while maintaining simplicity. Aided by Bash for logic

Abir Abedin Khan 6 Oct 07, 2022
DNS hijacking via dead records automation tool

DeadDNS Multi-threaded DNS hijacking via dead records automation tool How it works 1) Dig provided subdomains file for dead DNS records. 2) Dig the fo

45 Dec 20, 2022
Chapter 1 of the AWS Cookbook

Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide

AWS Cookbook 30 Nov 27, 2022
Proof of Concept Exploit for vCenter CVE-2021-21972

CVE-2021-21972 Proof of Concept Exploit for vCenter CVE-2021-21972

Horizon 3 AI Inc 210 Dec 31, 2022