PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

Overview

PyPasser

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request, gets rresp by params and token which gotted in previous step.

Support Python >= 3.7

Installation

From PyPI

pip install PyPasser

From Github (latest repo code)

pip install git+https://github.com/xHossein/[email protected]

 

Usage

Option 1: Use the pre-added sites

see pre-added sites here.

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com, snapchat_com

# for Spotify.com
reCaptcha_response = reCaptchaBypasser(spotify_com)
## use this response in your requests ...

# for SnapChat.com
reCaptcha_response = reCaptchaBypasser(snapchat_com)
## use this response in your requests ...

 

Option 2: Use CustomSite for unadded sites

To use CustomSite, first you must find endpoint and params of anchor URL.

  • Open inspect-element on your browser.
  • Go to web page that has reCaptcha V3.
  • In Network tab you should see a request with URL like this:
    https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
    so in this URL, endpoint is api2 (it also can be enterprise in another sites).
    and params is ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
from pypasser import reCaptchaBypasser
from pypasser.structs import CustomSite

config = CustomSite('endpoint', 'params')
reCaptcha_response = reCaptchaBypasser(config)
## use this response in your requests ...

 

Use proxy

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com
from pypasser.structs import Proxy

## Using Proxy structure
proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT')

## with authentication credentials
# proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT','USERNAME', 'PASSWORD')

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

also you can configure it as Dict.

proxy = {"http": "http://HOST:PORT",
         "https": "http://HOST:PORT"}

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

 

Set timeout

Default timeout is 20 seconds but you can change the amount like this:

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com

reCaptcha_response = reCaptchaBypasser(spotify_com, timeout = 10)

 

Exception

Exception Description
ConnectionError Raised due to network connectivity-related issues.
SiteNotSupported Raised when site not in sites.json.
RecaptchaTokenNotFound Raised when couldn't find token due to wrong endpoint or params.
RecaptchaResponseNotFound Raised when couldn't find reCaptcha response due to using PyPasser for site that hasn't reCaptchaV3.
Comments
  • new site

    new site

    Wasn't sure where to ask. Could you add hbomax.com as a new site?

    https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LeMrv8ZAAAAAIcvo5HKvdj1lxtUdHnS13jUCulQ&co=aHR0cHM6Ly9wbGF5Lmhib21heC5jb206NDQz&hl=en&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=invisible&cb=4dxv36bwkio3

    enhancement 
    opened by jpeg115 6
  • ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    When I try to run the following code:

    from pypasser import reCaptchaBypasser

    I get this error: "ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'"

    How to solve it? Thanks!

    opened by roboes 4
  • `ffmpeg` dependency required to import `ReCaptchaV3`

    `ffmpeg` dependency required to import `ReCaptchaV3`

    From the README, it appears ffmpeg is only a requirement for solving recaptcha v2, however running from pypasser import ReCaptchaV3 seems to use pydub.utils which expects ffmpeg or avconv.

    Is this intentional?

    >>> from pypasser import ReCaptchaV3
    
    /usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pydub/utils.py:170: RuntimeWarning: Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work
      warn("Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work", RuntimeWarning)
    Traceback (most recent call last):
      File "/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/code.py", line 90, in runcode
        exec(code, self.locals)
      File "<input>", line 1, in <module>
    ImportError: cannot import name 'ReCaptchaV3' from 'pypasser' (/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pypasser/__init__.py)
    
    opened by banagale 1
  • Incompatibility with requests==2.26.0

    Incompatibility with requests==2.26.0

    I would like to test this package - but it seems that it is not compatible with requests==2.26.0 (https://pypi.org/project/requests/#history).

    Any chance that the latest version of requests gets compatible to your package?

    Thanks!

    opened by roboes 1
  • Bug for custom site

    Bug for custom site

    i have try this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    after this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    and this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

      File "XXXXX", line 6, in <module>
        reCaptcha_response = reCaptchaBypasser(config)
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 49, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 82, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    

    but all don't work, please help me ^^

    opened by JeanQuiTest 1
  • important question

    important question

    hello do it work for recaptcha v2 invisible if so pls tell me how to make it work am creating bot but it just wont work because invisible recaptcha so pls help

    opened by CosmicDev-Official 0
  • question

    question

    hello bro, I have successfully used the recaptcha version v3, but it worked on a few tries, sometimes 1 to 3, after that it will error "invalid captcha", do you have a solution?

    opened by andipediaa 0
  • pypasser.exceptions.RecaptchaResponseNotFound

    pypasser.exceptions.RecaptchaResponseNotFound

    anchor url: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=invisible&cb=7eimmxc1uvrj

    Traceback (most recent call last):
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 99, in <module>
        loop.run_until_complete(send_async_requests(1))
      File "D:\Apps\Anaconda\envs\functions_env\lib\asyncio\base_events.py", line 642, in run_until_complete
        return future.result()
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 93, in send_async_requests
        return await asyncio.gather(*tasks)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 64, in bound_fetch
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        await fetch(number=number, proxy=proxy, email=email, email_password=email_password, useragent=useragent)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        recaptcha = reCaptchaV3("https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=inv
    isible&cb=7eimmxc1uvrj")
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 46, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 86, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    opened by kreo79 2
  • INVALID_REASON_UNSPECIFIED when submitting

    INVALID_REASON_UNSPECIFIED when submitting

    Im trying to submit a V3 generated token to spotify register recap, but i get INVALID_REASON_UNSPECIFIED as the answer to this https://www.spotify.com/api/signup/recaptcha/assess. (Normal solving results in a OK response) The payload is the same (the token looks a bit different of course):

    action: "website/signup/checkbox"
    token: "RECAPTOKENHERE"
    

    Im using this anchor url: https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LfCVLAUAAAAALFwwRnnCJ12DalriUGbj8FW_J39&co=aHR0cHM6Ly93d3cuc3BvdGlmeS5jb206NDQz&hl=de&v=1p3YWy80wlZ7Q8QFR1gjazwU&size=invisible&cb=26ifuv3a5qun (other give me pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found. errors)

    opened by Vinyzu 0
  • recaptcha v3 with specefic action

    recaptcha v3 with specefic action

    Hello what about website that use code like grecaptcha.ready(function() { grecaptcha.execute(site-key, {action: 'verify'}).then(function(token) { document.getElementById('g-recaptcha-response').value = token; }); }); how to bypass this kind of recaptcha v3 ?

    opened by Radamanth132 1
Releases(0.0.5)
An automated header extensive scanner for detecting log4j RCE CVE-2021-44228

log4j An automated header extensive scanner for detecting log4j RCE CVE-2021-44228 Usage $ python3 log4j.py -l urls.txt --dns-log REPLACE_THIS.dnslog.

2 Dec 16, 2021
Malware arcane - Scripts and notes on my malware analysis journey

Malware Arcane Repository of notes and scripts I use when doing malware analysis

Automatic ProxyShell Exploit

proxyshell-auto usage: proxyshell.py [-h] -t T Automatic Exploit ProxyShell optional arguments: -h, --help show this help message and exit -t T

lulz 93 Jan 05, 2023
Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VSS-AGENT service running on host)

VSSTrigger Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VS

Filip Dragovic 6 Jul 24, 2022
Fat-Stealer is a stealer that allows you to grab the Discord token from a user and open a backdoor in his machine.

Fat-Stealer is a stealer that allows you to grab the Discord token from a user and open a backdoor in his machine.

Jet Berry's 21 Jan 01, 2023
A GitHub action for organizations that enables advanced security code scanning on all new repos

Advanced-Security-Enforcer What this repository does This code is for an active GitHub Action written in Python to check (on a schedule) for new repos

Zack Koppert 30 May 17, 2022
Phishing-Crack tools to punish friends

Phishing-Crack Phishing Tool Version 1.0.0 Created By temirovazat A Phishing Tool With PHP and Python3 Features Fake Instagram Phishing Page Fake Face

3 Oct 04, 2022
Xteam All in one Instagram,Android,phishing osint and wifi hacking tool available

Xteam All in one Instagram,Android,phishing osint and wifi hacking tool available

xploits tech 283 Dec 29, 2022
IDA Pro Python plugin to analyze and annotate Linux kernel alternatives

About This is an IDA Pro (Interactive Disassembler) plugin allowing to automatically analyze and annotate Linux kernel alternatives (content of .altin

Open Source Security, Inc. 16 Oct 12, 2022
telegram bug that discloses user's hidden phone number (still unpatched) (exploit included)

CVE-2019-15514 Type: Information Disclosure Affected Users, Versions, Devices: All Telegram Users Still not fixed/unpatched. brute.py is available exp

Gray Programmerz 66 Dec 08, 2022
Docker Compose based system for running remote browsers (including Flash and Java support) connected to web archives

pywb Remote Browsers This repository provides a simple configuration for deploying any pywb with remote browsers provided by OWT/Shepherd Remote Brows

Webrecorder 10 Jul 28, 2022
Herramienta para descargar eventos de Sucuri WAF hacia disco.

Descarga los eventos de Sucuri Script para descargar los eventos del Sucuri Web Application Firewall (WAF) en el disco como archivos CSV. Requerimient

CSIRT-RD 2 Nov 29, 2021
log4j2 passive burp rce scanning tool get post cookie full parameter recognition

log4j2_burp_scan 自用脚本log4j2 被动 burp rce扫描工具 get post cookie 全参数识别,在ceye.io api速率限制下,最大线程扫描每一个参数,记录过滤已检测地址,重复地址 token替换为你自己的http://ceye.io/ token 和域名地址

5 Dec 10, 2021
🍯 16 honeypots in a single pypi package (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres & MySQL)

Easy to setup customizable honeypots for monitoring network traffic, bots activities and username\password credentials. The current available honeypot

QeeqBox 259 Dec 31, 2022
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 - vsftpd 2.3.4 Exploit Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Lin

Padsala Tushal 5 Nov 08, 2022
A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.

A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regardin

Cycurity 39 Dec 10, 2022
Threat research and reporting from IronNet's Threat Research Teams

IronNet Threat Research 🕵️ Overview This repository contains IronNet's Threat Research. Research & Reporting 📝 Project Description Cobalt Strike Res

36 Dec 02, 2022
Hikvision 流媒体管理服务器敏感信息泄漏

Hikvisioninformation Hikvision 流媒体管理服务器敏感信息泄漏 Options optional arguments: -h, --help show this help message and exit -u url, --url url

Henry4E36 13 Nov 09, 2022
:closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)

privacyIDEA privacyIDEA is an open solution for strong two-factor authentication like OTP tokens, SMS, smartphones or SSH keys. Using privacyIDEA you

1.3k Jan 03, 2023
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems

PwnLnX An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out

0xTRAW 212 Dec 24, 2022