Goop can perform google searches without being blocked by the CAPTCHA or hitting any rate limits.
Facebook provides a debugger tool for its scraper. Interestingly, Google doesn’t limit the requests made by this debugger (whitelisted?) and hence it can be used to scrap the google search results without being blocked by the CAPTCHA.
Since facebook is involved, a facebook session Cookie
must be supplied to the library with each request.
Also Read – Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning
pip install goop
from goop import goop
page_1 = goop.search(‘red shoes’, ”)
page_2 = goop.search(‘red_shoes’, ”, page=’1′)
include_omitted_results = goop.search(‘red_shoes’, ”, page=’8′, full=True)
The returned is a dict
of following structure
{
“0”: {
“url”: “https://example.com”,
“text”: “Example webpage”,
“summary”: “This is an example webpage whose aim is to demonstrate the usage of …”
},
“1”: {
…
cli.py
demonstrates the usage by performing google searches from the terminal with the following command
python cli.py <query> <number_of_pages>
Disclaimer
Scraping google search results is illegal. This library is merely a proof of concept of the bypass. The author isn’t responsible for the actions of the end users.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…