CIntruder: pentesting tool to bypass captchas


[12/2016] - CINtruder v0.3 has been released!!!


Captcha Intruder is an automatic pentesting tool to bypass captchas.


* Shell: Banner [ +Zoom ]


* Shell: Cracking [ +Zoom ]


* GUI: Index [ +Zoom ]


* GUI: Training [ +Zoom ]


* GUI: Cracking [ +Zoom ]


* Video: Cracking captcha from url (Old Version!)


Current version: v0.3

git clone

+ Packages:

- CIntruder-v0.3 (.zip) (md5:ec77d74b84f1dd80bd36febd351089df) - torrent

- CIntruder-v0.3 (.tar.gz) (md5:b61976ef6ef0dfd0b455174e193121dc) - torrent


+ Previous:

- CIntruder-v0.2 (.tar.gz) (md5:0db5c5cafba21f0224fa9281622a3f45)



Code runs on many platforms. It requires Python and the following libraries: On Debian-based systems (ex: Ubuntu), run:

sudo apt-get install python-pycurl python-libxml2 python-imaging


    cintruder [OPTIONS]

      --version            show program's version number and exit
      -h, --help           show this help message and exit
      -v, --verbose        active verbose mode output results
      --proxy=PROXY        use proxy server (tor: http://localhost:8118)
      --gui                run GUI (CIntruder Web Interface)
      --update             check for latest stable version

        --track=TRACK      download captchas from url (to: 'inputs/')
        --track-num=S_NUM  set number of captchas to download (default: 5)

        --train=TRAIN      train using common OCR techniques
        --set-id=SETIDS    set colour's ID manually (use -v for details)

        --crack=CRACK      brute force using local dictionary

      ->Modules (training/cracking):
        --list             list available modules (from: 'mods/')
        --mod=NAME         set a specific OCR exploiting module

      ->Post-Exploitation (cracking):
        --xml=XML          export result to xml format
        --tool=COMMAND     replace suggested word on commands of another tool. use
                           'CINT' marker like flag (ex: 'txtCaptcha=CINT')


* View help:

./cintruder --help

* Update to latest version:

./cintruder --update

* Launch web interface (GUI):

./cintruder --gui

* Simple crack from file:

./cintruder --crack "inputs/captcha.gif"

* Simple crack from URL:

./cintruder --crack ""

* Simple crack from local, exporting results to a xml file:

./cintruder --crack "inputs/captcha.gif" --xml "test.xml"

* Simple crack from url, with proxy TOR and verbose output:

./cintruder --crack "" --proxy="" -v

* Train captcha(s) from url, with proxy TOR and verbose output:

./cintruder --train "" --proxy "" -v

* Track 50 captcha(s) from url, with proxy TOR:

./cintruder --track "" --track-num "50" --proxy ""

* List available modules (from "mods/"):

./cintruder --list

* Launch an OCR module to train a specific local captcha:

$ ./cintruder --train "inputs/easycaptcha.gif" --mod "module_invocation_name"

* Launch an OCR module to crack a specific online captcha, with verbose output:

./cintruder --crack "" --mod "module_invocation_name" -v

* Replace suggested word by CIntruder after cracking a remote url on commands of another tool (ex: "XSSer"):

$ ./cintruder --crack "" --tool "xsser -u"


CIntruder is released under the terms of the General Public License v3 and is copyrighted by psy.


To make donations use the following hash: If you want to contribute to development, reporting a bug, providing a patch, commenting on the code base or simply need to find help to run it, please go to: Also you can subscribe to the mailing list: If nobody gets back to you, then drop me an e-mail.