Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   3646

[PYTHON] Requests based hCaptcha solver

by abuseful - 08 October, 2020 - 04:14 AM
This post is by a banned member (khimnguynn7) - Unhide
This post is by a banned member (Lawku) - Unhide
Lawku  
Registered
342
Posts
12
Threads
5 Years of service
#10
thank you
This post is by a banned member (kevxz775) - Unhide
kevxz775  
Registered
10
Posts
0
Threads
4 Years of service
#11
gracias amigo por el aporte
This post is by a banned member (gamel33) - Unhide
This post is by a banned member (ResiGG) - Unhide
ResiGG  
Contributor
58
Posts
10
Threads
5 Years of service
#13
(08 October, 2020 - 04:14 AM)abuseful Wrote: Show More
 

bjklbjklbjkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
[Image: ResiGG.gif]
Resi.GG Residential Proxies
Discount Code
cracked30 for 30% Off


Residential Proxies
100 Million Proxies, $3.60 / Gigabyte

Mobile Proxies
200k Proxies, $5.00 / Gigabyte

Datacenter Proxies
2000 Proxies, Unlimited Bandwidth

Static Proxies
Residential, $3.40 / proxy
Datacenter, $1.80 / proxy
Mobile, $2.50 / proxy
This post is by a banned member (22chars) - Unhide
22chars  
Registered
106
Posts
8
Threads
5 Years of service
#14
(This post was last modified: 23 December, 2020 - 10:54 PM by 22chars.)
(08 October, 2020 - 04:14 AM)abuseful Wrote: Show More
hCaptcha Solver
Found this cool project. Thought you guys might find a good use for it.

Uses requests so its decently fast depending on internet speed and WolfRam servers.
Download: PATCHED

Remember to leave a like and not leach Pepelove

nice contribution, kinda interesting in seeing the way this works  Pepelove

EDIT: cmon bruh just because something is patched, you don't need to remove the download link or the source link it's still educational content

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: