PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

Overview

PyPasser

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request, gets rresp by params and token which gotted in previous step.

Support Python >= 3.7

Installation

From PyPI

pip install PyPasser

From Github (latest repo code)

pip install git+https://github.com/xHossein/[email protected]

 

Usage

Option 1: Use the pre-added sites

see pre-added sites here.

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com, snapchat_com

# for Spotify.com
reCaptcha_response = reCaptchaBypasser(spotify_com)
## use this response in your requests ...

# for SnapChat.com
reCaptcha_response = reCaptchaBypasser(snapchat_com)
## use this response in your requests ...

 

Option 2: Use CustomSite for unadded sites

To use CustomSite, first you must find endpoint and params of anchor URL.

  • Open inspect-element on your browser.
  • Go to web page that has reCaptcha V3.
  • In Network tab you should see a request with URL like this:
    https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
    so in this URL, endpoint is api2 (it also can be enterprise in another sites).
    and params is ar=1&k=6LfCVLAUAAAAFwwRnnCFW_J39&co=aHR....
from pypasser import reCaptchaBypasser
from pypasser.structs import CustomSite

config = CustomSite('endpoint', 'params')
reCaptcha_response = reCaptchaBypasser(config)
## use this response in your requests ...

 

Use proxy

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com
from pypasser.structs import Proxy

## Using Proxy structure
proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT')

## with authentication credentials
# proxy = Proxy(Proxy.type.HTTPs,'HOST','PORT','USERNAME', 'PASSWORD')

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

also you can configure it as Dict.

proxy = {"http": "http://HOST:PORT",
         "https": "http://HOST:PORT"}

reCaptcha_response = reCaptchaBypasser(spotify_com, proxy)

 

Set timeout

Default timeout is 20 seconds but you can change the amount like this:

from pypasser import reCaptchaBypasser
from pypasser.sites import spotify_com

reCaptcha_response = reCaptchaBypasser(spotify_com, timeout = 10)

 

Exception

Exception Description
ConnectionError Raised due to network connectivity-related issues.
SiteNotSupported Raised when site not in sites.json.
RecaptchaTokenNotFound Raised when couldn't find token due to wrong endpoint or params.
RecaptchaResponseNotFound Raised when couldn't find reCaptcha response due to using PyPasser for site that hasn't reCaptchaV3.
Comments
  • new site

    new site

    Wasn't sure where to ask. Could you add hbomax.com as a new site?

    https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LeMrv8ZAAAAAIcvo5HKvdj1lxtUdHnS13jUCulQ&co=aHR0cHM6Ly9wbGF5Lmhib21heC5jb206NDQz&hl=en&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=invisible&cb=4dxv36bwkio3

    enhancement 
    opened by jpeg115 6
  • ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'

    When I try to run the following code:

    from pypasser import reCaptchaBypasser

    I get this error: "ImportError: cannot import name 'reCaptchaBypasser' from 'pypasser'"

    How to solve it? Thanks!

    opened by roboes 4
  • `ffmpeg` dependency required to import `ReCaptchaV3`

    `ffmpeg` dependency required to import `ReCaptchaV3`

    From the README, it appears ffmpeg is only a requirement for solving recaptcha v2, however running from pypasser import ReCaptchaV3 seems to use pydub.utils which expects ffmpeg or avconv.

    Is this intentional?

    >>> from pypasser import ReCaptchaV3
    
    /usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pydub/utils.py:170: RuntimeWarning: Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work
      warn("Couldn't find ffmpeg or avconv - defaulting to ffmpeg, but may not work", RuntimeWarning)
    Traceback (most recent call last):
      File "/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/code.py", line 90, in runcode
        exec(code, self.locals)
      File "<input>", line 1, in <module>
    ImportError: cannot import name 'ReCaptchaV3' from 'pypasser' (/usr/local/Caskroom/miniconda/base/envs/thing/lib/python3.8/site-packages/pypasser/__init__.py)
    
    opened by banagale 1
  • Incompatibility with requests==2.26.0

    Incompatibility with requests==2.26.0

    I would like to test this package - but it seems that it is not compatible with requests==2.26.0 (https://pypi.org/project/requests/#history).

    Any chance that the latest version of requests gets compatible to your package?

    Thanks!

    opened by roboes 1
  • Bug for custom site

    Bug for custom site

    i have try this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    after this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

        config = CustomSite('api2', 'https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    TypeError: __init__() takes 2 positional arguments but 3 were given
    

    and this:

    from pypasser import reCaptchaBypasser
    from pypasser.structs import CustomSite
    import requests
    
    config = CustomSite('https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfd5wobAAAAACjTkOIXohTrPz9RIhNwRqRq2_R9&co=aHR0cHM6Ly92b2lyYW5pbWUuY29tOjQ0Mw..&hl=fr&v=wxAi4AKLXL2kBAvXqI4XLSWS&size=normal&cb=kmspryghc969')
    reCaptcha_response = reCaptchaBypasser(config)
    

    error:

      File "XXXXX", line 6, in <module>
        reCaptcha_response = reCaptchaBypasser(config)
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 49, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "C:\Users\XXXXX\AppData\Local\Programs\Python\Python39\lib\site-packages\pypasser\__init__.py", line 82, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    

    but all don't work, please help me ^^

    opened by JeanQuiTest 1
  • important question

    important question

    hello do it work for recaptcha v2 invisible if so pls tell me how to make it work am creating bot but it just wont work because invisible recaptcha so pls help

    opened by CosmicDev-Official 0
  • question

    question

    hello bro, I have successfully used the recaptcha version v3, but it worked on a few tries, sometimes 1 to 3, after that it will error "invalid captcha", do you have a solution?

    opened by andipediaa 0
  • pypasser.exceptions.RecaptchaResponseNotFound

    pypasser.exceptions.RecaptchaResponseNotFound

    anchor url: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=invisible&cb=7eimmxc1uvrj

    Traceback (most recent call last):
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 99, in <module>
        loop.run_until_complete(send_async_requests(1))
      File "D:\Apps\Anaconda\envs\functions_env\lib\asyncio\base_events.py", line 642, in run_until_complete
        return future.result()
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 93, in send_async_requests
        return await asyncio.gather(*tasks)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 64, in bound_fetch
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        await fetch(number=number, proxy=proxy, email=email, email_password=email_password, useragent=useragent)
      File "D:\PyCharm Projects\abuse_apenftex\main.py", line 43, in fetch
        recaptcha = reCaptchaV3("https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LebGb0dAAAAALVVq5NyllkKd3O7ShkwHHAkqsoL&co=aHR0cHM6Ly93YWl0bGlzdC5hcGVuZnRleC5jb206NDQz&hl=ru&v=2uoiJ4hP3NUoP9v_eBNfU6CR&size=inv
    isible&cb=7eimmxc1uvrj")
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 46, in __new__
        recaptcha_response = cls.get_recaptcha_response(data['endpoint'],
      File "D:\Apps\Anaconda\envs\functions_env\lib\site-packages\pypasser\reCaptchaV3\__init__.py", line 86, in get_recaptcha_response
        raise RecaptchaResponseNotFound()
    pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found.
    
    opened by kreo79 2
  • INVALID_REASON_UNSPECIFIED when submitting

    INVALID_REASON_UNSPECIFIED when submitting

    Im trying to submit a V3 generated token to spotify register recap, but i get INVALID_REASON_UNSPECIFIED as the answer to this https://www.spotify.com/api/signup/recaptcha/assess. (Normal solving results in a OK response) The payload is the same (the token looks a bit different of course):

    action: "website/signup/checkbox"
    token: "RECAPTOKENHERE"
    

    Im using this anchor url: https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6LfCVLAUAAAAALFwwRnnCJ12DalriUGbj8FW_J39&co=aHR0cHM6Ly93d3cuc3BvdGlmeS5jb206NDQz&hl=de&v=1p3YWy80wlZ7Q8QFR1gjazwU&size=invisible&cb=26ifuv3a5qun (other give me pypasser.exceptions.RecaptchaResponseNotFound: Recaptcha response not found. errors)

    opened by Vinyzu 0
  • recaptcha v3 with specefic action

    recaptcha v3 with specefic action

    Hello what about website that use code like grecaptcha.ready(function() { grecaptcha.execute(site-key, {action: 'verify'}).then(function(token) { document.getElementById('g-recaptcha-response').value = token; }); }); how to bypass this kind of recaptcha v3 ?

    opened by Radamanth132 1
Releases(0.0.5)
A tool to extract the IdP cert from vCenter backups and log in as Administrator

vCenter SAML Login Tool A tool to extract the Identity Provider (IdP) cert from vCenter backups and log in as Administrator Background Commonly, durin

Horizon 3 AI Inc 343 Dec 31, 2022
Make files with as many random bytes as you want

Lots o' Bytes 🔣 Make files with as many random bytes as you want! Use case Can be used to package malware that is normally small by making the downlo

Addi 1 Jan 13, 2022
A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks

Log4j dork scanner This is an auto script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks. Installation:

Jagar 5 Dec 27, 2022
XSS scanner in python

DeadXSS XSS scanner in python How to Download: Step 1: git clone https://github.com/Deadeye0x/DeadXSS.git Step 2: cd DeadXSS Step 3: python3 DeadXSS.p

2 Jul 17, 2022
VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read

vcenter_fileread_exploit VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read Usage python3 vCenter_fileread.py http(s)://ip Referen

Ashish Kunwar 4 Sep 23, 2022
Searches through git repositories for high entropy strings and secrets, digging deep into commit history

truffleHog Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accident

Truffle Security 10.1k Jan 09, 2023
Signatures and IoCs from public Volexity blog posts.

threat-intel This repository contains IoCs related to Volexity public threat intelligence blog posts. They are organised by year, and within each year

Volexity 130 Dec 29, 2022
DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)

dnspooq DNSpooq PoC - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) For educational purposes only Requirements Docker compo

Teppei Fukuda 80 Nov 28, 2022
Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures

Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.

Stamus Networks 39 Nov 28, 2022
Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.

Log4jScanner Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains. Disc

Pushpender Singh 35 Dec 12, 2022
Search Shodan for Minecraft server IPs to grief

GriefBuddy This script searches Shodan for Minecraft server IPs to grief. This will return all servers connected to the public internet which Shodan h

26 Dec 29, 2022
A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021)

wifi-bf [LINUX ONLY] A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021) This script is purely for educa

Finn Lancaster 20 Nov 12, 2022
Utility for Extracting all passwords from ConnectWise Automate

CWA Password Extractor Utility for Extracting all passwords from ConnectWise Automate (E.g. while migrating to a new system). Outputs a csv file with

Matthew Kyles 1 Dec 09, 2021
Strapi Framework Vulnerable to Remote Code Execution

CVE-2019-19609 Strapi Framework Vulnerable to Remote Code Execution well, I didnt found any exploit for CVE-2019-19609 so I wrote one. :/ Usage pytho

Dasith Vidanage 7 Mar 08, 2022
log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc

说明 about author: 我超怕的 blog: https://www.cnblogs.com/iAmSoScArEd/ github: https://github.com/iAmSOScArEd/ date: 2021-12-20 log4j2 dos exploit log4j2 do

3 Aug 13, 2022
Automatic SQL injection and database takeover tool

sqlmap sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of

sqlmapproject 25.7k Jan 08, 2023
The best Python Backdoor👌

Backdoor The best Python Backdoor Files Server file is used in all of cases If client is Windows, the client need execute EXE file If client is Linux,

13 Oct 28, 2022
The ultimate Metasploit apk binder with legit apk written in python3

Infector is a python3 based script which is officially made for linux based distro . It binds metasploit payload with original apk with avast antivirus bypassed .

27 Dec 25, 2022
Cookiecutter for creating open source Python packages

Cookiecutter for rapidly developing new open source Python packages. Best practices with all the modern bells and whistles included.

Wolt 177 Dec 22, 2022
Tool for finding PHP source code vulnerabilities.

vulnz Tool for finding php source code vulnerabilities. Scans PHP source code and prints out potentially dangerous lines. This tool is useful for secu

Mateo Hanžek 1 Jan 14, 2022