https://github.com/cpadlab/capture
CTF Bypass Script for TryHackMe Room - "Capture this!"
https://github.com/cpadlab/capture
bypass capture ctf ctf-challenges kali kali-linux linux penetration-testing pentest-scripts pentesting python script thm tryhackme
Last synced: 10 months ago
JSON representation
CTF Bypass Script for TryHackMe Room - "Capture this!"
- Host: GitHub
- URL: https://github.com/cpadlab/capture
- Owner: cpadlab
- License: mit
- Created: 2024-01-30T00:56:22.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2025-04-23T21:31:27.000Z (11 months ago)
- Last Synced: 2025-05-11T20:15:38.913Z (10 months ago)
- Topics: bypass, capture, ctf, ctf-challenges, kali, kali-linux, linux, penetration-testing, pentest-scripts, pentesting, python, script, thm, tryhackme
- Language: Python
- Homepage: https://tryhackme.com/room/capture
- Size: 249 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Capture! ByPass (TryHackme CTF)

**Author**: Carlos Padilla (cpadlab)
**Download**: https://github.com/cpadlab/capture#Install
**Room Title**: Capture this!
**Room Link**: [URL](https://tryhackme.com/room/capture!)
**Room Author**: [toxicat0r](https://tryhackme.com/p/toxicat0r) && [https://tryhackme.com/p/tryhackme](tryhackme)
# Table of Contents
1. [Download](https://github.com/cpadlab/capture#Download)
2. [Usage](https://github.com/cpadlab/capture#Usage)
3. [Usage Example](https://github.com/cpadlab/capture#Example)
4. [Output](https://github.com/cpadlab/capture#Output)
5. [License](https://github.com/cpadlab/capture/LICENSE)
# Download
```
git clone https://github.com/cpadlab/capture/
cd capture/ && pip install -r requirements.txt
```
# Usage
```bash
┌──(cpadlab㉿seccon)-[~/capture]
└─$ python bypass.py --help
usage: bypass.py [-h] [-p PASSLIST] [-u USERLIST] --url URL
CaptureByPass Args
options:
-h, --help show this help message and exit
-p PASSLIST, --passlist PASSLIST
-u USERLIST, --userlist USERLIST
--url URL
```
`--url URL` Is Required.
## Examples
```bash
python bypass.py --passlist passwords.txt --userlist usernames.txt --url 10.10.10.10
```
See More
```bash
python bypass.py -p passwords.txt --u usernames.txt --url 10.10.10.10/login
```
```bash
python bypass.py -u usernames.txt --url http://10.10.10.10
```
```bash
python bypass.py -p passwords.txt --url http://10.10.10.10/login
```
```bash
python bypass.py --url http://10.10.10.10/login # http://10.10.10.10 or 10.10.10.10
```
# Output
```
==============================================
Capture!ByPass Carlos Padilla (14wual)
==============================================
_____ _ _
/ ____| /\ | | ByPass Script | |
| | / \ _ __ | |_ _ __ _ _ ___| |
| | / /\ \ | '_ \| __| '__| | | |/ _ \ |
| |____ / ____ \| |_) | |_| | | |_| | __/_|
\_____/_/ \_\ .__/ \__|_| \__,_|\___(_)
| |
|_| (Code by 14Wual)
==============================================
Author Web: https://cpadlab.github.io/
CTF Room: https://tryhackme.com/room/capture
==============================================
TARGET: http://10.10.206.228
==============================================
PassList Size: 1567
UserList Size: 878
==============================================
[Info] Started at: 30:01/2024 - 00:34:02
[Info] Captchat enabled.
[*] Trying Username: hunter with the test password.
...
[Info] Discovered username: n******.
[*] Trying Password: michaela for n******.
...
[Info] Discovered password: s***
==============================================
[CREDENTIALS] n******:s*******
==============================================
[Info] Opening New Browser Tab
```