PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

Overview

PyPasser

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request, gets rresp by params and token which gotted in previous step.

Support Python >= 3.7

Installation

From PyPI

pip install PyPasser

From Github (latest repo code)

pip install git+https://github.com/xHossein/[email protected]

 

Usage

Option 1: Use the pre-added sites

see pre-added sites here.

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com, snapchat_com

# for Spotify.com
reCaptcha_response = reCaptchaBypasser(spotify_com)
## use this response in your requests ...

# for SnapChat.com
reCaptcha_response = reCaptchaBypasser(snapchat_com)
## use this response in your requests ...

 

Option 2: Use CustomSite for unadded sites

To use CustomSite, first you must find endpoint and params of anchor URL.

  • Open inspect-element on your browser.
  • Go to web page that has reCaptcha V3.
  • In Network tab you should see a request with URL like this:
    https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
    so in this URL, endpoint is api2 (it also can be enterprise in another sites).
    and params is ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
from pypasser import reCaptchaBypasser
from pypasser.structs import CustomSite

config = CustomSite('endpoint', 'params')
reCaptcha_response = reCaptchaBypasser(config)
## use this response in your requests ...

 

Use proxy

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com
from pypasser.structs import Proxy

## Using Proxy structure
proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT')

## with authentication credentials
# proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT','USERNAME', 'PASSWORD')

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

also you can configure it as Dict.

proxy = {"http": "http://HOST:PORT",
         "https": "http://HOST:PORT"}

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

 

Set timeout

Default timeout is 20 seconds but you can change the amount like this:

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com

reCaptcha_response = reCaptchaBypasser(spotify_com, timeout = 10)

 

Exception

Exception Description
ConnectionError Raised due to network connectivity-related issues.
SiteNotSupported Raised when site not in sites.json.
RecaptchaTokenNotFound Raised when couldn't find token due to wrong endpoint or params.
RecaptchaResponseNotFound Raised when couldn't find reCaptcha response due to using PyPasser for site that hasn't reCaptchaV3.
Comments
  • new site

    new site

    Wasn't sure where to ask. Could you add hbomax.com as a new site?

    https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LeMrv8ZAAAAAIcvo5HKvdj1lxtUdHnS13jUCulQ&co=aHR0cHM6Ly9wbGF5Lmhib21heC5jb206NDQz&hl=en&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=invisible&cb=4dxv36bwkio3

    enhancement 
    opened by jpeg115 6
  • ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    When I try to run the following code:

    from pypasser import reCaptchaBypasser

    I get this error: "ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'"

    How to solve it? Thanks!

    opened by roboes 4
  • `ffmpeg` dependency required to import `ReCaptchaV3`

    `ffmpeg` dependency required to import `ReCaptchaV3`

    From the README, it appears ffmpeg is only a requirement for solving recaptcha v2, however running from pypasser import ReCaptchaV3 seems to use pydub.utils which expects ffmpeg or avconv.

    Is this intentional?

    >>> from pypasser import ReCaptchaV3
    
    /usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pydub/utils.py:170: RuntimeWarning: Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work
      warn("Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work", RuntimeWarning)
    Traceback (most recent call last):
      File "/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/code.py", line 90, in runcode
        exec(code, self.locals)
      File "<input>", line 1, in <module>
    ImportError: cannot import name 'ReCaptchaV3' from 'pypasser' (/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pypasser/__init__.py)
    
    opened by banagale 1
  • Incompatibility with requests==2.26.0

    Incompatibility with requests==2.26.0

    I would like to test this package - but it seems that it is not compatible with requests==2.26.0 (https://pypi.org/project/requests/#history).

    Any chance that the latest version of requests gets compatible to your package?

    Thanks!

    opened by roboes 1
  • Bug for custom site

    Bug for custom site

    i have try this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    after this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    and this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

      File "XXXXX", line 6, in <module>
        reCaptcha_response = reCaptchaBypasser(config)
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 49, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 82, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    

    but all don't work, please help me ^^

    opened by JeanQuiTest 1
  • important question

    important question

    hello do it work for recaptcha v2 invisible if so pls tell me how to make it work am creating bot but it just wont work because invisible recaptcha so pls help

    opened by CosmicDev-Official 0
  • question

    question

    hello bro, I have successfully used the recaptcha version v3, but it worked on a few tries, sometimes 1 to 3, after that it will error "invalid captcha", do you have a solution?

    opened by andipediaa 0
  • pypasser.exceptions.RecaptchaResponseNotFound

    pypasser.exceptions.RecaptchaResponseNotFound

    anchor url: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=invisible&cb=7eimmxc1uvrj

    Traceback (most recent call last):
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 99, in <module>
        loop.run_until_complete(send_async_requests(1))
      File "D:\Apps\Anaconda\envs\functions_env\lib\asyncio\base_events.py", line 642, in run_until_complete
        return future.result()
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 93, in send_async_requests
        return await asyncio.gather(*tasks)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 64, in bound_fetch
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        await fetch(number=number, proxy=proxy, email=email, email_password=email_password, useragent=useragent)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        recaptcha = reCaptchaV3("https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=inv
    isible&cb=7eimmxc1uvrj")
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 46, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 86, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    opened by kreo79 2
  • INVALID_REASON_UNSPECIFIED when submitting

    INVALID_REASON_UNSPECIFIED when submitting

    Im trying to submit a V3 generated token to spotify register recap, but i get INVALID_REASON_UNSPECIFIED as the answer to this https://www.spotify.com/api/signup/recaptcha/assess. (Normal solving results in a OK response) The payload is the same (the token looks a bit different of course):

    action: "website/signup/checkbox"
    token: "RECAPTOKENHERE"
    

    Im using this anchor url: https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LfCVLAUAAAAALFwwRnnCJ12DalriUGbj8FW_J39&co=aHR0cHM6Ly93d3cuc3BvdGlmeS5jb206NDQz&hl=de&v=1p3YWy80wlZ7Q8QFR1gjazwU&size=invisible&cb=26ifuv3a5qun (other give me pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found. errors)

    opened by Vinyzu 0
  • recaptcha v3 with specefic action

    recaptcha v3 with specefic action

    Hello what about website that use code like grecaptcha.ready(function() { grecaptcha.execute(site-key, {action: 'verify'}).then(function(token) { document.getElementById('g-recaptcha-response').value = token; }); }); how to bypass this kind of recaptcha v3 ?

    opened by Radamanth132 1
Releases(0.0.5)
一款辅助探测Orderby注入漏洞的BurpSuite插件,Python3编写,适用于上xray等扫描器被ban的场景

OrderbyHunter 一款辅助探测Orderby注入漏洞的BurpSuite插件,Python3编写,适用于上xray等扫描器被ban的场景 1. 支持Get/Post型请求参数的探测,被动探测,对于存在Orderby注入的请求将会在HTTP Histroy里标红 2. 自定义排序参数list

Automne 21 Aug 12, 2022
A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021)

wifi-bf [LINUX ONLY] A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021) This script is purely for educa

Finn Lancaster 20 Nov 12, 2022
DNS hijacking via dead records automation tool

DeadDNS Multi-threaded DNS hijacking via dead records automation tool How it works 1) Dig provided subdomains file for dead DNS records. 2) Dig the fo

45 Dec 20, 2022
威胁情报播报

Threat-Broadcast 威胁情报播报 运行环境 项目介绍 从以下公开的威胁情报来源爬取并整合最新信息: 360:https://cert.360.cn/warning 奇安信:https://ti.qianxin.com/advisory/ 红后:https://redqueen.tj-u

东方有鱼名为咸 148 Nov 09, 2022
TightVNC Vulnerability.

CVE-2022-23967 In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbprot

MaherAzzouzi 15 Jul 11, 2022
A Python Scanner for log4j

log4j-Scanner scanner for log4j cat web-urls.txt | python3 log4j.py ID.burpcollaborator.net web-urls.txt http://127.0.0.1:8080 https://www.google.c

Ihebski 5 Jun 26, 2022
Exploit tool for Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability

AdminerRead Exploit tool for Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability Installation git clone https://github.com/p0dalirius/AdminerRea

Podalirius 58 Dec 05, 2022
A simple way to store your passwords without requiring third party applications

SimplePasswordManager A simple way to store your passwords without requiring third party applications Simple To Use. Store Your Passwords For Each Web

Leone Odinga 1 Dec 23, 2021
macOS Initial Access Payload Generator

Mystikal macOS Initial Access Payload Generator Related Blog Post: https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520 Usage: Install Xcode

Leo Pitt 206 Dec 31, 2022
Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells

About create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool t

Nano 108 Dec 04, 2021
Metasploit Multi Purpose Exploiting Toolkit For Termux

MSF-EXPLOIT MSF-ANDRO is a Metasploit Multi Purpose Exploiting Toolkit For Termux . Only a Basic Script , Still in Development . FEATURES : Install Me

Mr.X 22 Dec 29, 2022
The First Python Compatible Camera Hacking Tool

ZCam Hack webcam using python by sending malicious link. FEATURES : [+] Real-time Camera hacking [+] Python compatible [+] URL Shortener using bitly [

Sanketh J 109 Dec 28, 2022
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit

Vortex VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit,

315 Dec 28, 2022
AutoScan 有多个目标时,调用xray+rad进行自动扫描

Usage: 在高级版Xray和rad同目录下运行 python3 X-AutoXray.py xxxx.txt 写的蛮人性化的哦,os,linux,windows通用 生成的xray报告会在当前目录的/result下面 Ctrl+c 打断脚本运行时还可以结算扫描进度,生成已扫描和未扫描的进度文件,

斯文 73 Jan 01, 2023
Python directory buster, multiple threads, gobuster-like CLI, web server brute-forcer, URL replace pattern feature.

pybuster v1.1 pybuster is a tool that is used to brute-force URLs of web servers. Features Directory busting (URI) URL replace patterns (put PYBUSTER

Glaukio 1 Jan 05, 2022
Fuck - Multi Brute Force 🚶‍♂

f-mbf Fuck - Multi Brute Force 🚶‍♂ Install Script $ pkg update && pkg upgrade $ pkg install python2 $ pkg install git $ pip2 install requests $ pip2

Yumasaa 1 Dec 03, 2021
Script checks provided domains for log4j vulnerability

log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

Matthias Nehls 2 Dec 12, 2021
NEW FACEBOOK CLONER WITH NEW PASSWORD, TERMUX FB CLONE, FB CLONING COMMAND. M

NEW FACEBOOK CLONER WITH NEW PASSWORD, TERMUX FB CLONE, FB CLONING COMMAND. M

Mr. Error 81 Jan 08, 2023
Buffer Overflow para SLmail5.5 32 bits

SLmail5.5-Exploit-BoF Buffer Overflow para SLmail5.5 32 bits con un par de utilidades para que puedas hacer el tuyo REQUISITOS PARA QUE FUNCIONE: Desa

Luis Javier 15 Jul 30, 2022
Malware-analysis-writeups - Some of my Malware Analysis writeups

About This repo contains some malware analysis writeups i've created over time m

Itay Migdal 14 Jun 22, 2022