PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

Overview

PyPasser

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request, gets rresp by params and token which gotted in previous step.

Support Python >= 3.7

Installation

From PyPI

pip install PyPasser

From Github (latest repo code)

pip install git+https://github.com/xHossein/[email protected]

 

Usage

Option 1: Use the pre-added sites

see pre-added sites here.

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com, snapchat_com

# for Spotify.com
reCaptcha_response = reCaptchaBypasser(spotify_com)
## use this response in your requests ...

# for SnapChat.com
reCaptcha_response = reCaptchaBypasser(snapchat_com)
## use this response in your requests ...

 

Option 2: Use CustomSite for unadded sites

To use CustomSite, first you must find endpoint and params of anchor URL.

  • Open inspect-element on your browser.
  • Go to web page that has reCaptcha V3.
  • In Network tab you should see a request with URL like this:
    https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
    so in this URL, endpoint is api2 (it also can be enterprise in another sites).
    and params is ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
from pypasser import reCaptchaBypasser
from pypasser.structs import CustomSite

config = CustomSite('endpoint', 'params')
reCaptcha_response = reCaptchaBypasser(config)
## use this response in your requests ...

 

Use proxy

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com
from pypasser.structs import Proxy

## Using Proxy structure
proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT')

## with authentication credentials
# proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT','USERNAME', 'PASSWORD')

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

also you can configure it as Dict.

proxy = {"http": "http://HOST:PORT",
         "https": "http://HOST:PORT"}

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

 

Set timeout

Default timeout is 20 seconds but you can change the amount like this:

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com

reCaptcha_response = reCaptchaBypasser(spotify_com, timeout = 10)

 

Exception

Exception Description
ConnectionError Raised due to network connectivity-related issues.
SiteNotSupported Raised when site not in sites.json.
RecaptchaTokenNotFound Raised when couldn't find token due to wrong endpoint or params.
RecaptchaResponseNotFound Raised when couldn't find reCaptcha response due to using PyPasser for site that hasn't reCaptchaV3.
Comments
  • new site

    new site

    Wasn't sure where to ask. Could you add hbomax.com as a new site?

    https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LeMrv8ZAAAAAIcvo5HKvdj1lxtUdHnS13jUCulQ&co=aHR0cHM6Ly9wbGF5Lmhib21heC5jb206NDQz&hl=en&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=invisible&cb=4dxv36bwkio3

    enhancement 
    opened by jpeg115 6
  • ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    When I try to run the following code:

    from pypasser import reCaptchaBypasser

    I get this error: "ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'"

    How to solve it? Thanks!

    opened by roboes 4
  • `ffmpeg` dependency required to import `ReCaptchaV3`

    `ffmpeg` dependency required to import `ReCaptchaV3`

    From the README, it appears ffmpeg is only a requirement for solving recaptcha v2, however running from pypasser import ReCaptchaV3 seems to use pydub.utils which expects ffmpeg or avconv.

    Is this intentional?

    >>> from pypasser import ReCaptchaV3
    
    /usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pydub/utils.py:170: RuntimeWarning: Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work
      warn("Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work", RuntimeWarning)
    Traceback (most recent call last):
      File "/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/code.py", line 90, in runcode
        exec(code, self.locals)
      File "<input>", line 1, in <module>
    ImportError: cannot import name 'ReCaptchaV3' from 'pypasser' (/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pypasser/__init__.py)
    
    opened by banagale 1
  • Incompatibility with requests==2.26.0

    Incompatibility with requests==2.26.0

    I would like to test this package - but it seems that it is not compatible with requests==2.26.0 (https://pypi.org/project/requests/#history).

    Any chance that the latest version of requests gets compatible to your package?

    Thanks!

    opened by roboes 1
  • Bug for custom site

    Bug for custom site

    i have try this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    after this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    and this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

      File "XXXXX", line 6, in <module>
        reCaptcha_response = reCaptchaBypasser(config)
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 49, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 82, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    

    but all don't work, please help me ^^

    opened by JeanQuiTest 1
  • important question

    important question

    hello do it work for recaptcha v2 invisible if so pls tell me how to make it work am creating bot but it just wont work because invisible recaptcha so pls help

    opened by CosmicDev-Official 0
  • question

    question

    hello bro, I have successfully used the recaptcha version v3, but it worked on a few tries, sometimes 1 to 3, after that it will error "invalid captcha", do you have a solution?

    opened by andipediaa 0
  • pypasser.exceptions.RecaptchaResponseNotFound

    pypasser.exceptions.RecaptchaResponseNotFound

    anchor url: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=invisible&cb=7eimmxc1uvrj

    Traceback (most recent call last):
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 99, in <module>
        loop.run_until_complete(send_async_requests(1))
      File "D:\Apps\Anaconda\envs\functions_env\lib\asyncio\base_events.py", line 642, in run_until_complete
        return future.result()
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 93, in send_async_requests
        return await asyncio.gather(*tasks)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 64, in bound_fetch
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        await fetch(number=number, proxy=proxy, email=email, email_password=email_password, useragent=useragent)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        recaptcha = reCaptchaV3("https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=inv
    isible&cb=7eimmxc1uvrj")
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 46, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 86, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    opened by kreo79 2
  • INVALID_REASON_UNSPECIFIED when submitting

    INVALID_REASON_UNSPECIFIED when submitting

    Im trying to submit a V3 generated token to spotify register recap, but i get INVALID_REASON_UNSPECIFIED as the answer to this https://www.spotify.com/api/signup/recaptcha/assess. (Normal solving results in a OK response) The payload is the same (the token looks a bit different of course):

    action: "website/signup/checkbox"
    token: "RECAPTOKENHERE"
    

    Im using this anchor url: https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LfCVLAUAAAAALFwwRnnCJ12DalriUGbj8FW_J39&co=aHR0cHM6Ly93d3cuc3BvdGlmeS5jb206NDQz&hl=de&v=1p3YWy80wlZ7Q8QFR1gjazwU&size=invisible&cb=26ifuv3a5qun (other give me pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found. errors)

    opened by Vinyzu 0
  • recaptcha v3 with specefic action

    recaptcha v3 with specefic action

    Hello what about website that use code like grecaptcha.ready(function() { grecaptcha.execute(site-key, {action: 'verify'}).then(function(token) { document.getElementById('g-recaptcha-response').value = token; }); }); how to bypass this kind of recaptcha v3 ?

    opened by Radamanth132 1
Releases(0.0.5)
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.

Log4jHorizon Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. BLOG COMING SOON Code and README.md this time around are

96 Dec 14, 2022
Proof of concept GnuCash Webinterface

Proof of Concept GnuCash Webinterface This may one day be a something truly great. Milestones [ ] Browse accounts and view transactions [ ] Record sim

Josh 14 Dec 28, 2022
A security system to warn you when people enter your room 🎥

Get Out My Room v0.1 I hate people coming in my room when i'm not there. Get Out My Room is a simple security system that sends notifications with vid

ScriptLine 1 Jan 11, 2022
This Repository is an up-to-date version of Harvard nlp's Legacy code and a Refactoring of the jupyter notebook version as a shell script version.

This Repository is an up-to-date version of Harvard nlp's Legacy code and a Refactoring of the jupyter notebook version as a shell script version.

신재욱 17 Sep 25, 2022
🏃 Python Solutions of All Problems in FHC 2021 (In Progress)

FacebookHackerCup-2021 Python solutions of Facebook Hacker Cup 2021. Solution begins with * means it will get TLE in the largest data set (total compu

kamyu 14 Oct 15, 2022
On the 11/11/21 the apache 2.4.49-2.4.50 remote command execution POC has been published online and this is a loader so that you can mass exploit servers using this.

ApacheRCE ApacheRCE is a small little python script that will allow you to input the apache version 2.4.49-2.4.50 and then input a list of ip addresse

3 Dec 04, 2022
Gmail Accounts Hacking

gmail-hack Gmail Accounts Hacking Gemail-Hack python script for Hack gmail account brute force What is brute force attack? In brute force attack,scrip

Aryan 25 Nov 10, 2022
Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VSS-AGENT service running on host)

VSSTrigger Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VS

Filip Dragovic 6 Jul 24, 2022
Malware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.

Vital What is Vital? Vital is malware primarily used to collect and extract information from the Discord desktop client. While it has other features (

HellSec 59 Dec 01, 2022
Simples brute forcer de diretorios para web pentest.

🦑 dirbruter Simples brute forcer de diretorios para web pentest. ❕ Atenção Não ataque sites privados. Isto é illegal. 🖥️ Pré-requisitos Ultima versã

Dio brando 6 Jan 22, 2022
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or CVE from Github by CVE ID.

PocOrExp in Github 聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网 注意:只通过通用的CVE号聚合,因此对于MS17-010等Windows编号漏洞以及著名的有绰号的漏洞,还是自己检索一下比较好 Usage python3 exp.py -h usage: ex

567 Dec 30, 2022
GDID (Google Dorks for Information Disclosure)

GDID (Google Dorks for Information Disclosure) Script made for your recon automation in Bug Bounty or Pentest. It will help you to find Information Di

Nischacid 5 Mar 10, 2022
Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities.

👑 Recon 👑 The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my ow

Dirso 171 Dec 31, 2022
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

Cowrie Welcome to the Cowrie GitHub repository This is the official repository for the Cowrie SSH and Telnet Honeypot effort. What is Cowrie Cowrie is

Cowrie 4.1k Jan 09, 2023
CVE-2021-43936 is a critical vulnerability (CVSS3 10.0) leading to Remote Code Execution (RCE) in WebHMI Firmware.

CVE-2021-43936 CVE-2021-43936 is a critical vulnerability (CVSS3 10.0) leading to Remote Code Execution (RCE) in WebHMI Firmware. This vulnerability w

Jeremiasz Pluta 8 Jul 05, 2022
Apk Framework Detector

🚀🚀🚀Program helps you to detect the major framework or technology used in writing any android app. Just provide the apk 😇😇

Daniel Agyapong 10 Dec 07, 2022
Port scanning tool that uses Python3. Created by Noble Wilson

Hello There! My name is Noble Wilson and I am an aspiring IT/InfoSec coder practicing for my future. ________________________________________________

1 Nov 23, 2021
Crypto Meta Extractor

Crypto Meta Extractor This repository contains the code which extracts some metadata of all the cryptocurrencies listed (9K) on CoinMarketCap. Coding

Samyak Jain 3 Jul 03, 2022
Argument Injection in Dragonfly Ruby Gem

CVE-2021-33564 PoC Exploit script for CVE-2021-33564 (Argument Injection in Dragonfly Ruby Gem). Usage Arbitrary File Read python3 poc.py -u https://

Michael Tsai 12 Nov 09, 2022
An ARP Spoofer attacker for windows to block away devices from your network.

arp0_attacker An ARP Spoofer-attacker for Windows -OS to block away devices from your network. INFO Built in Python 3.8.2. arp0_attackerx.py is Upgrad

Wh0_ 15 Mar 17, 2022