PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.
☆48Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for mcaptcha_bypass
Users that are interested in mcaptcha_bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Runs programs as TrustedInstaller☆49Jul 1, 2019Updated 6 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- ☆21Nov 13, 2019Updated 6 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Project for CS 691ST - Dalvik VM implementation in Javascript☆26Apr 21, 2017Updated 8 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆20Jul 19, 2022Updated 3 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 4 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- OSINT Resources for Politics☆14Aug 13, 2018Updated 7 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Dynamic Tracing in Android (fork from iovisor/ply)☆21Nov 26, 2022Updated 3 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- It's pointy and it hurts!☆126Oct 18, 2022Updated 3 years ago
- ☆72Aug 2, 2022Updated 3 years ago