eastee / rebreakcaptcha
☆749Updated 6 years ago
Alternatives and similar repositories for rebreakcaptcha:
Users that are interested in rebreakcaptcha are comparing it to the libraries listed below
- Defeating Google's audio reCaptcha with 85% accuracy.☆2,804Updated 7 years ago
- Generate credentials for Opera's "browser VPN"☆253Updated 7 years ago
- ☆1,331Updated last year
- Simple Python script for fetching "some" (usable) proxies☆583Updated 2 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 3 months ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- ☆351Updated 3 years ago
- No Coin is a tiny browser extension aiming to block coin miners such as Coinhive.☆1,586Updated 4 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆519Updated 2 years ago
- Data Selfie - a browser extension to track yourself on Facebook and analyze your data.☆1,024Updated 6 years ago
- Remote administration service which uses twitter as a command and control server☆711Updated 4 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- We try to break the recaptcha for the Merry Christmas for all!☆293Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆508Updated 8 years ago
- Reverse-engineering the new “captchaless” ReCaptcha system...☆1,020Updated 6 years ago
- defeating the latest version of ReCaptcha with 91% accuracy☆4,951Updated 6 years ago
- A demo of overriding what's in a person's clipboard☆1,427Updated last year
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆542Updated 9 years ago
- Various PoCs☆491Updated 5 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- Information Dump Monitor☆599Updated 7 years ago
- Wannacry in-memory key recovery☆1,081Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,666Updated 5 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- A simple demo of phishing by abusing the browser autofill feature☆1,485Updated 3 years ago
- This is a project for a browser fingerprinting technique that can track users not only within a single browser but also across different …☆1,268Updated 3 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆908Updated 7 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 8 years ago