PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.
☆48Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for mcaptcha_bypass
Users that are interested in mcaptcha_bypass are comparing it to the libraries listed below
Sorting:
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Runs programs as TrustedInstaller☆49Jul 1, 2019Updated 6 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Go package for https://haveibeenpwned.com API☆22Jul 31, 2017Updated 8 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- User-Defined C2 BOF Template☆28Nov 24, 2025Updated 3 months ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- A Telegram bot created for my gf, written in Go☆12Apr 5, 2025Updated 10 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- The magic number 0x5F3759DF in Python3 Fast Inverse SquareRoot☆12Mar 5, 2023Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A tool to extract a KeePass master password from memory☆87Dec 11, 2020Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 weeks ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago