
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
bestcaptchasolverapi2
Advanced tools
bestcaptchasolver-python2 is a super easy to use bypass captcha python2 API wrapper for bestcaptchasolver.com captcha service
git clone https://github.com/bestcaptchasolver/bestcaptchasolver-python2
pip install requests
# make sure you've changed access_key, page_url, etc in main.py
python main.py
Simply require the module, set the auth details and start using the captcha service:
from bestcaptchasolverapi2 import BestCaptchaSolverAPI
Set access_token for authentication
access_token = 'access_token_here'
# get your access token from https://bestcaptchasolver.com/account
bcs = BestCaptchaSolverAPI(ACCESS_TOKEN)
Once you've set your authentication details, you can start using the API
Get balance
balance = bcs.account_balance()
Solve image captcha
data = {}
data['image'] = 'captcha.jpg'
# optional parameters
data['is_case'] = if case sensitive set to True, default: False
data['is_phrase'] = if phrase, set to True, default: False
data['is_math'] = True if captcha is math, default: False
data['alphanumeric'] = 1 (digits only) or 2 (letters only), default: all characters
data['minlength'] = minimum length of captcha text, default: any
data['maxlength'] = maximum length of captcha text, default: any
bcs.submit_image_captcha(data)
The image submission works with both files and b64 encoded strings.
For setting the affiliate_id, set the affiliate_id
parameter
Submit recaptcha details
For recaptcha submission there are two things that are required.
captcha_id = bcs.submit_recaptcha({'page_url': 'page_url_here', 'site_key': 'sitekey_here')
This method returns a captchaID. This ID will be used next, to retrieve the g-response, once workers have completed the captcha. This takes somewhere between 10-80 seconds.
Geetest
captcha_id = bcs.submit_geetest({'domain': 'DOMAIN_HERE', 'gt': 'GT_HERE', 'challenge': 'CHALLENGE_HERE'})
Use captcha_id to retrieve solution
for geetest
Capy
captcha_id = bcs.submit_capy({'page_url': 'PAGE_URL_HERE', 'site_key': 'SITEKEY_HERE'})
Use captcha_id to retrieve solution
for capy
Retrieve captcha response (all captchas)
image_text = bcs.retrieve(captcha_id)['text']
gresponse = bcs.retrieve(recaptcha_id)['gresponse']
solution = bcs.retrieve(recaptcha_id)['solution']
If submitted with proxy, get proxy status
proxy_status = bcs.retrieve(recaptcha_id)['proxy_status']
Set captcha bad
When a captcha was solved wrong by our workers, you can notify the server with it's ID, so we know something went wrong.
bcs.set_captcha_bad(captcha_id)
Check main.py
API library is licensed under the MIT License
More details about the server-side API can be found here
captcha, bypasscaptcha, decaptcher, decaptcha, 2captcha, deathbycaptcha, anticaptcha, bypassrecaptchav2, bypassnocaptcharecaptcha, bypassinvisiblerecaptcha, captchaservicesforrecaptchav2, recaptchav2captchasolver, googlerecaptchasolver, recaptchasolverpython, recaptchabypassscript, bestcaptchasolver
FAQs
Bestcaptchasolver python2 API library
We found that bestcaptchasolverapi2 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.