evilsocket / mcaptcha_bypass
PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.
☆47Updated 2 years ago
Alternatives and similar repositories for mcaptcha_bypass:
Users that are interested in mcaptcha_bypass are comparing it to the libraries listed below
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- ☆24Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- NAT Slipstream attack code samples☆46Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- ☆27Updated 3 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Left To My Own Devices - NT hash tools☆32Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- visually see issues with supported cipher suites☆16Updated 10 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- ☆31Updated 3 years ago
- My malware analysis code snippets☆27Updated last year
- ☆12Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago
- Man in the Browser Framework☆46Updated 3 months ago
- ☆16Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago