Advertisement
Guest User

Robot validateur bitcoin

a guest
Dec 18th, 2017
492
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 64.08 KB | None | 0 0
  1.  
  2.  
  3. SET !EXTRACT_TEST_POPUP NO
  4.  
  5. SET !ERRORIGNORE YES
  6.  
  7. SET !TIMEOUT_PAGE 300
  8.  
  9. SET !TIMEOUT_STEP 300
  10.  
  11. TAB T=1
  12.  
  13. TAB CLOSEALLOTHERS
  14.  
  15. SET apikey "YourAPI"
  16.  
  17. SET prio 5
  18.  
  19. ' Do not change
  20.  
  21. SET anchor "6LeBxRMUAAAAAEsQ2ksGdqQoVKfG247dH8jHQsWq"
  22.  
  23. TAB T=1
  24.  
  25. URL GOTO=http://bitfun.co/games
  26.  
  27. TAG POS=1 TYPE=BUTTON ATTR=TXT:Claim<SP>now!<SP>Please<SP>wait
  28.  
  29. WAIT SECONDS=3
  30.  
  31. ' Step 2: Save the captcha key and show the field for the answer
  32.  
  33. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  34.  
  35. WAIT SECONDS=5
  36.  
  37. 'Syntaxcheck: API Key, prio
  38.  
  39. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  40.  
  41. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  42.  
  43. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  44.  
  45. WAIT SECONDS=5
  46.  
  47. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  48.  
  49. TAB OPEN
  50.  
  51. TAB T=2
  52.  
  53. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  54.  
  55. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  56.  
  57. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  58.  
  59. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  60.  
  61. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  62.  
  63. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  64.  
  65. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  66.  
  67. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  68.  
  69. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  70.  
  71. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  72.  
  73. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  74.  
  75. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  76.  
  77. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  78.  
  79. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  80.  
  81. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  82.  
  83. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  84.  
  85. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{anchor}}
  86.  
  87. 'Submit the formdata to 9kw.eu
  88.  
  89. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  90.  
  91. 'Extract the captchaid from your captcha submit
  92.  
  93. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  94.  
  95. SET captchaid {{!EXTRACT}}
  96.  
  97. 'Clean the !EXTRACT variable for the next task
  98.  
  99. SET !EXTRACT NULL
  100.  
  101. 'Extract the characters that are recoginzed from the picture of captcha.
  102.  
  103. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  104.  
  105. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  106.  
  107. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  108.  
  109. 'Clean the !EXTRACT variable for the next task
  110.  
  111. SET !EXTRACT NULL
  112.  
  113. TAB CLOSE
  114.  
  115. 'Display extracted data (only for debug)
  116.  
  117. 'PROMPT {{captchaid}}
  118.  
  119. 'Step 5: Fill the recognized characters to the verification box
  120.  
  121. TAB T=1
  122.  
  123. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  124.  
  125. WAIT SECONDS=5
  126.  
  127. TAG POS=1 TYPE=BUTTON ATTR=TXT:Claim
  128.  
  129. WAIT SECONDS=50
  130.  
  131. SET !EXTRACT_TEST_POPUP NO
  132. SET !ERRORIGNORE YES
  133. SET !TIMEOUT_PAGE 60
  134. SET !LOOP -99999
  135. TAB T=1
  136. TAB CLOSEALLOTHERS
  137. URL GOTO=https://bagi.co.in/bitcoin/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  138. TAG POS=1 TYPE=BUTTON FORM=ACTION:captha.php ATTR=TXT:NEXT
  139. TAG POS=1 TYPE=BUTTON FORM=ACTION:index.php?c=1 ATTR=ID:submit
  140. WAIT SECONDS=3
  141.  
  142. ' Step 2: Save the captcha key and show the field for the answer
  143. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  144. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  145. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  146. WAIT SECONDS=5
  147. 'Syntaxcheck: API Key, prio
  148. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  149. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  150. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  151. WAIT SECONDS=5
  152. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  153. TAB OPEN
  154. TAB T=2
  155. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  156. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  157. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  158. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  159. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  160. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  161. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  162. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  163. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  164. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  165. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  166. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  167. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  168. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  169. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  170. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  171. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  172. 'Submit the formdata to 9kw.eu
  173. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  174. 'Extract the captchaid from your captcha submit
  175. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  176. SET captchaid {{!EXTRACT}}
  177. 'Clean the !EXTRACT variable for the next task
  178. SET !EXTRACT NULL
  179. 'Extract the characters that are recoginzed from the picture of captcha.
  180. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  181. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  182. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  183. 'Clean the !EXTRACT variable for the next task
  184. SET !EXTRACT NULL
  185. TAB CLOSE
  186.  
  187. 'Display extracted data (only for debug)
  188. 'PROMPT {{captchaid}}
  189.  
  190. 'Step 5: Fill the recognized characters to the verification box
  191. TAB T=1
  192. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  193. WAIT SECONDS=5
  194. TAG POS=1 TYPE=BUTTON FORM=ACTION:index.php?c=1 ATTR=TXT:Claim<SP>Bitcoin
  195. WAIT SECONDS=50
  196.  
  197.  
  198. SET !EXTRACT_TEST_POPUP NO
  199. SET !ERRORIGNORE YES
  200. SET !TIMEOUT_PAGE 60
  201. SET !LOOP -99999
  202. TAB T=1
  203. TAB CLOSEALLOTHERS
  204. URL GOTO=https://getyourbtc.net/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  205. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  206. TAG POS=1 TYPE=A ATTR=TXT:Claim
  207. FILEDELETE NAME=C:\Captcha\getyourbtc.jpg
  208. ONDOWNLOAD FOLDER=C:\Captcha FILE=getyourbtc.jpg
  209. WAIT SECONDS=7
  210. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  211. TAB OPEN
  212. TAB T=2
  213. URL GOTO=http://www.9kw.eu/grafik/form.html
  214. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  215. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  216. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  217. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  218. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  219. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  220. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\getyourbtc.jpg
  221. SET !TIMEOUT_STEP 120
  222. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  223. SET !EXTRACT NULL
  224. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  225. SET !TIMEOUT_STEP 0
  226. WAIT SECONDS=1
  227. TAB CLOSE
  228. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  229. WAIT SECONDS=1
  230. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  231. WAIT SECONDS=50
  232.  
  233.  
  234. SET !EXTRACT_TEST_POPUP NO
  235. SET !ERRORIGNORE YES
  236. SET !TIMEOUT_PAGE 60
  237. SET !LOOP -99999
  238. TAB T=1
  239. TAB CLOSEALLOTHERS
  240. URL GOTO=https://btc4clicks.com/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  241. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  242. TAG POS=1 TYPE=A ATTR=TXT:Claim
  243. FILEDELETE NAME=C:\Captcha\btc4clicks.jpg
  244. ONDOWNLOAD FOLDER=C:\Captcha FILE=btc4clicks.jpg
  245. WAIT SECONDS=7
  246. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  247. TAB OPEN
  248. TAB T=2
  249. URL GOTO=http://www.9kw.eu/grafik/form.html
  250. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  251. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  252. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  253. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  254. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  255. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  256. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\btc4clicks.jpg
  257. SET !TIMEOUT_STEP 120
  258. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  259. SET !EXTRACT NULL
  260. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  261. SET !TIMEOUT_STEP 0
  262. WAIT SECONDS=1
  263. TAB CLOSE
  264. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  265. WAIT SECONDS=1
  266. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  267. WAIT SECONDS=50
  268.  
  269.  
  270.  
  271. SET !EXTRACT_TEST_POPUP NO
  272. SET !ERRORIGNORE YES
  273. SET !TIMEOUT_PAGE 60
  274. SET !LOOP -99999
  275. TAB T=1
  276. TAB CLOSEALLOTHERS
  277. URL GOTO=https://bitlucky.io/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  278. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  279. TAG POS=1 TYPE=A ATTR=TXT:Claim
  280. FILEDELETE NAME=C:\Captcha\bitlucky.jpg
  281. ONDOWNLOAD FOLDER=C:\Captcha FILE=bitlucky.jpg
  282. WAIT SECONDS=7
  283. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  284. TAB OPEN
  285. TAB T=2
  286. URL GOTO=http://www.9kw.eu/grafik/form.html
  287. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  288. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  289. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  290. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  291. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  292. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  293. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\bitlucky.jpg
  294. SET !TIMEOUT_STEP 120
  295. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  296. SET !EXTRACT NULL
  297. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  298. SET !TIMEOUT_STEP 0
  299. WAIT SECONDS=1
  300. TAB CLOSE
  301. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  302. WAIT SECONDS=1
  303. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  304. WAIT SECONDS=50
  305.  
  306. SET !EXTRACT_TEST_POPUP NO
  307. SET !ERRORIGNORE NO
  308. SET !TIMEOUT_PAGE 300
  309. SET !TIMEOUT_STEP 300
  310.  
  311. TAB T=1
  312. TAB CLOSEALLOTHERS
  313.  
  314. SET apikey "YOURAPI"
  315. SET prio 5
  316. URL GOTO=http://coinfreebtc.cf/btc/
  317. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:wpbf_address CONTENT=put your bitcoin address here
  318. WAIT SECONDS=3
  319.  
  320. ' Step 2: Save the captcha key and show the field for the answer
  321. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  322. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  323. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  324. WAIT SECONDS=5
  325. 'Syntaxcheck: API Key, prio
  326. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  327. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  328. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  329. WAIT SECONDS=5
  330. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  331. TAB OPEN
  332. TAB T=2
  333. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  334. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  335. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  336. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  337. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  338. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  339. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  340. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  341. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  342. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  343. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  344. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  345. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  346. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  347. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  348. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  349. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  350. 'Submit the formdata to 9kw.eu
  351. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  352. 'Extract the captchaid from your captcha submit
  353. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  354. SET captchaid {{!EXTRACT}}
  355. 'Clean the !EXTRACT variable for the next task
  356. SET !EXTRACT NULL
  357. 'Extract the characters that are recoginzed from the picture of captcha.
  358. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  359. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  360. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  361. 'Clean the !EXTRACT variable for the next task
  362. SET !EXTRACT NULL
  363. TAB CLOSE
  364.  
  365. 'Display extracted data (only for debug)
  366. 'PROMPT {{captchaid}}
  367.  
  368. 'Step 5: Fill the recognized characters to the verification box
  369. TAB T=1
  370. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  371. WAIT SECONDS=5
  372. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ID:wpbf-claim-form ATTR=*
  373. WAIT SECONDS=50
  374.  
  375. SET !EXTRACT_TEST_POPUP NO
  376. SET !ERRORIGNORE YES
  377. SET !TIMEOUT_PAGE 60
  378. SET !LOOP -99999
  379. TAB T=1
  380. TAB CLOSEALLOTHERS
  381. URL GOTO=https://bituniverse.net/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  382. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  383. TAG POS=1 TYPE=A ATTR=TXT:Claim
  384. FILEDELETE NAME=C:\Captcha\bituniverse.jpg
  385. ONDOWNLOAD FOLDER=C:\Captcha FILE=bituniverse.jpg
  386. WAIT SECONDS=7
  387. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  388. TAB OPEN
  389. TAB T=2
  390. URL GOTO=http://www.9kw.eu/grafik/form.html
  391. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  392. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  393. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  394. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  395. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  396. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  397. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\bituniverse.jpg
  398. SET !TIMEOUT_STEP 120
  399. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  400. SET !EXTRACT NULL
  401. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  402. SET !TIMEOUT_STEP 0
  403. WAIT SECONDS=1
  404. TAB CLOSE
  405. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  406. WAIT SECONDS=1
  407. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  408. WAIT SECONDS=50
  409.  
  410.  
  411.  
  412. SET !EXTRACT_TEST_POPUP NO
  413. SET !ERRORIGNORE YES
  414. SET !TIMEOUT_PAGE 60
  415. SET !LOOP -99999
  416. TAB T=1
  417. TAB CLOSEALLOTHERS
  418. URL GOTO=https://huefaucet.xyz/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  419. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  420. TAG POS=1 TYPE=A ATTR=TXT:Claim
  421. FILEDELETE NAME=C:\Captcha\huefaucet.jpg
  422. ONDOWNLOAD FOLDER=C:\Captcha FILE=huefaucet.jpg
  423. WAIT SECONDS=7
  424. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  425. TAB OPEN
  426. TAB T=2
  427. URL GOTO=http://www.9kw.eu/grafik/form.html
  428. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  429. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  430. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  431. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  432. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  433. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  434. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\huefaucet.jpg
  435. SET !TIMEOUT_STEP 120
  436. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  437. SET !EXTRACT NULL
  438. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  439. SET !TIMEOUT_STEP 0
  440. WAIT SECONDS=1
  441. TAB CLOSE
  442. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  443. WAIT SECONDS=1
  444. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  445. WAIT SECONDS=50
  446.  
  447.  
  448.  
  449.  
  450. SET !EXTRACT_TEST_POPUP NO
  451. SET !ERRORIGNORE YES
  452. SET !TIMEOUT_PAGE 60
  453. SET !LOOP -99999
  454. TAB T=1
  455. TAB CLOSEALLOTHERS
  456. URL GOTO=https://bitgolden.io/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  457. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  458. TAG POS=1 TYPE=A ATTR=TXT:Claim
  459. FILEDELETE NAME=C:\Captcha\bitgolden.jpg
  460. ONDOWNLOAD FOLDER=C:\Captcha FILE=bitgolden.jpg
  461. WAIT SECONDS=7
  462. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  463. TAB OPEN
  464. TAB T=2
  465. URL GOTO=http://www.9kw.eu/grafik/form.html
  466. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  467. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  468. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  469. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  470. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  471. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  472. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=D:\bitgolden.jpg
  473. SET !TIMEOUT_STEP 120
  474. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  475. SET !EXTRACT NULL
  476. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  477. SET !TIMEOUT_STEP 0
  478. WAIT SECONDS=1
  479. TAB CLOSE
  480. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  481. WAIT SECONDS=1
  482. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  483. WAIT SECONDS=50
  484.  
  485.  
  486.  
  487. SET !EXTRACT_TEST_POPUP NO
  488. SET !ERRORIGNORE YES
  489. SET !TIMEOUT_PAGE 60
  490. SET !LOOP -99999
  491. TAB T=1
  492. TAB CLOSEALLOTHERS
  493. URL GOTO=https://bitsilver.io/ref/13k3kuVzZTuu4wzXNtSg293Kv9WV8eJTQ6
  494. TAG POS=1 TYPE=BUTTON FORM=ACTION:claim ATTR=ID:button
  495. TAG POS=1 TYPE=A ATTR=TXT:Claim
  496. FILEDELETE NAME=C:\Captcha\btcforclicks.jpg
  497. ONDOWNLOAD FOLDER=C:\Captcha FILE=btcforclicks.jpg
  498. WAIT SECONDS=7
  499. TAG POS=1 TYPE=IMG ATTR=ID:adcopy-puzzle-image-image CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  500. TAB OPEN
  501. TAB T=2
  502. URL GOTO=http://www.9kw.eu/grafik/form.html
  503. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  504. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  505. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  506. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  507. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  508. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  509. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\btcforclicks.jpg
  510. SET !TIMEOUT_STEP 120
  511. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  512. SET !EXTRACT NULL
  513. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  514. SET !TIMEOUT_STEP 0
  515. WAIT SECONDS=1
  516. TAB CLOSE
  517. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  518. WAIT SECONDS=1
  519. TAG POS=1 TYPE=BUTTON FORM=ACTION:faucet ATTR=ID:button
  520.  
  521.  
  522. SET !EXTRACT_TEST_POPUP NO
  523. SET !ERRORIGNORE NO
  524. SET !TIMEOUT_PAGE 300
  525. SET !TIMEOUT_STEP 300
  526.  
  527. TAB T=1
  528. TAB CLOSEALLOTHERS
  529.  
  530. SET apikey "YOURAPI"
  531. SET prio 5
  532. URL GOTO=https://ryanbitcoin.com/
  533. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:wpbf_address CONTENT=put your bitcoin address here
  534. WAIT SECONDS=3
  535.  
  536. ' Step 2: Save the captcha key and show the field for the answer
  537. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  538. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  539. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  540. WAIT SECONDS=5
  541. 'Syntaxcheck: API Key, prio
  542. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  543. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  544. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  545. WAIT SECONDS=5
  546. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  547. TAB OPEN
  548. TAB T=2
  549. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  550. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  551. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  552. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  553. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  554. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  555. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  556. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  557. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  558. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  559. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  560. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  561. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  562. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  563. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  564. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  565. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  566. 'Submit the formdata to 9kw.eu
  567. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  568. 'Extract the captchaid from your captcha submit
  569. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  570. SET captchaid {{!EXTRACT}}
  571. 'Clean the !EXTRACT variable for the next task
  572. SET !EXTRACT NULL
  573. 'Extract the characters that are recoginzed from the picture of captcha.
  574. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  575. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  576. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  577. 'Clean the !EXTRACT variable for the next task
  578. SET !EXTRACT NULL
  579. TAB CLOSE
  580.  
  581. 'Display extracted data (only for debug)
  582. 'PROMPT {{captchaid}}
  583.  
  584. 'Step 5: Fill the recognized characters to the verification box
  585. TAB T=1
  586. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  587. WAIT SECONDS=5
  588. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ID:wpbf-claim-form ATTR=*
  589.  
  590.  
  591.  
  592.  
  593.  
  594. SET !EXTRACT_TEST_POPUP NO
  595. SET !ERRORIGNORE NO
  596. SET !TIMEOUT_PAGE 300
  597. SET !TIMEOUT_STEP 300
  598.  
  599. TAB T=1
  600. TAB CLOSEALLOTHERS
  601.  
  602. SET apikey "YOURAPI"
  603. SET prio 5
  604. URL GOTO=https://bitbitcoin.website/work.php
  605. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:https://bitbitcoin.website/work.php ATTR=NAME:address CONTENT=put your bitcoin address here
  606.  
  607. WAIT SECONDS=3
  608.  
  609. ' Step 2: Save the captcha key and show the field for the answer
  610. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  611. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  612. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  613. WAIT SECONDS=5
  614. 'Syntaxcheck: API Key, prio
  615. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  616. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  617. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  618. WAIT SECONDS=5
  619. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  620. TAB OPEN
  621. TAB T=2
  622. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  623. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  624. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  625. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  626. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  627. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  628. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  629. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  630. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  631. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  632. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  633. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  634. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  635. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  636. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  637. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  638. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  639. 'Submit the formdata to 9kw.eu
  640. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  641. 'Extract the captchaid from your captcha submit
  642. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  643. SET captchaid {{!EXTRACT}}
  644. 'Clean the !EXTRACT variable for the next task
  645. SET !EXTRACT NULL
  646. 'Extract the characters that are recoginzed from the picture of captcha.
  647. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  648. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  649. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  650. 'Clean the !EXTRACT variable for the next task
  651. SET !EXTRACT NULL
  652. TAB CLOSE
  653.  
  654. 'Display extracted data (only for debug)
  655. 'PROMPT {{captchaid}}
  656.  
  657. 'Step 5: Fill the recognized characters to the verification box
  658. TAB T=1
  659. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  660. WAIT SECONDS=5
  661. TAG POS=1 TYPE=BUTTON FORM=ACTION:https://bitbitcoin.website/work.php ATTR=ID:claim
  662.  
  663.  
  664. SET !EXTRACT_TEST_POPUP NO
  665. SET !ERRORIGNORE YES
  666. SET !TIMEOUT_PAGE 60
  667. SET !LOOP -99999
  668. TAB T=1
  669. TAB CLOSEALLOTHERS
  670. URL GOTO=http://www.ssbitcoin.url.ng/
  671. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:wpbf_address CONTENT=put your bitcoin address here
  672. TAG POS=1 TYPE=I ATTR=ID:pc-close-times-1
  673. WAIT SECONDS=3
  674.  
  675. FILEDELETE NAME=C:\Captcha\ssbitcoin.jpg
  676. ONDOWNLOAD FOLDER=C:\Captcha FILE=ssbitcoin.jpg
  677. WAIT SECONDS=7
  678. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  679. TAB OPEN
  680. TAB T=2
  681. URL GOTO=http://www.9kw.eu/grafik/form.html
  682. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  683. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  684. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  685. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  686. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  687. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  688. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\morebtc.jpg
  689. SET !TIMEOUT_STEP 120
  690. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  691. SET !EXTRACT NULL
  692. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  693. SET !TIMEOUT_STEP 0
  694. WAIT SECONDS=1
  695. TAB CLOSE
  696. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  697. WAIT SECONDS=1
  698. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ID:wpbf-claim-form ATTR=*
  699.  
  700.  
  701. SET !EXTRACT_TEST_POPUP NO
  702. SET !ERRORIGNORE YES
  703. SET !TIMEOUT_PAGE 60
  704. SET !LOOP -99999
  705. TAB T=1
  706. TAB CLOSEALLOTHERS
  707. URL GOTO=http://bit.ly/2CHb7Xg
  708.  
  709. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:libs/ctrl.php ATTR=NAME:addy CONTENT=put your bitcoin address here
  710.  
  711. WAIT SECONDS=3
  712.  
  713. ' Step 2: Save the captcha key and show the field for the answer
  714. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  715. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  716. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  717. WAIT SECONDS=5
  718. 'Syntaxcheck: API Key, prio
  719. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  720. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  721. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  722. WAIT SECONDS=5
  723. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  724. TAB OPEN
  725. TAB T=2
  726. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  727. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  728. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  729. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  730. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  731. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  732. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  733. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  734. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  735. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  736. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  737. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  738. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  739. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  740. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  741. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  742. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  743. 'Submit the formdata to 9kw.eu
  744. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  745. 'Extract the captchaid from your captcha submit
  746. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  747. SET captchaid {{!EXTRACT}}
  748. 'Clean the !EXTRACT variable for the next task
  749. SET !EXTRACT NULL
  750. 'Extract the characters that are recoginzed from the picture of captcha.
  751. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  752. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  753. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  754. 'Clean the !EXTRACT variable for the next task
  755. SET !EXTRACT NULL
  756. TAB CLOSE
  757.  
  758. 'Display extracted data (only for debug)
  759. 'PROMPT {{captchaid}}
  760.  
  761. 'Step 5: Fill the recognized characters to the verification box
  762. TAB T=1
  763. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  764. WAIT SECONDS=5
  765. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ACTION:libs/ctrl.php ATTR=*
  766. WAIT SECONDS=50
  767.  
  768. SET !EXTRACT_TEST_POPUP NO
  769. SET !ERRORIGNORE YES
  770. SET !TIMEOUT_PAGE 60
  771. TAB T=1
  772. TAB CLOSEALLOTHERS
  773.  
  774. SET API "YOUR API"
  775.  
  776. URL GOTO=https://mammafaucet.tk/btcfaucet/
  777. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:https://mammafaucet.tk/btcfaucet ATTR=NAME:address CONTENT=put your bitcoin address here
  778. FILEDELETE NAME=C:\Captcha\mammafaucet.jpg
  779. ONDOWNLOAD FOLDER=C:\Captcha FILE=mammafaucet.jpg
  780. WAIT SECONDS=7
  781. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  782. TAB OPEN
  783. TAB T=2
  784. URL GOTO=http://www.9kw.eu/grafik/form.html
  785. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  786. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  787. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  788. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  789. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  790. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  791. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\mammafaucet.jpg
  792. SET !TIMEOUT_STEP 120
  793. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  794. SET !EXTRACT NULL
  795. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  796. SET !TIMEOUT_STEP 0
  797. WAIT SECONDS=1
  798. TAB CLOSE
  799.  
  800. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:https://mammafaucet.tk/btcfaucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  801. WAIT SECONDS=1
  802. TAG POS=9 TYPE=INPUT:BUTTON FORM=ACTION:https://mammafaucet.tk/btcfaucet ATTR=NAME:claim_coins
  803. WAIT SECONDS=50
  804.  
  805.  
  806. SET !EXTRACT_TEST_POPUP NO
  807. SET !ERRORIGNORE YES
  808. SET !TIMEOUT_PAGE 60
  809. TAB T=1
  810. TAB CLOSEALLOTHERS
  811.  
  812. SET API "YOUR API"
  813.  
  814. URL GOTO=http://ilhafaucet.tk/
  815. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://ilhafaucet.tk/btc-faucet ATTR=NAME:address CONTENT=put your bitcoin address here
  816. FILEDELETE NAME=C:\Captcha\ilha.jpg
  817. ONDOWNLOAD FOLDER=C:\Captcha FILE=ilha.jpg
  818. WAIT SECONDS=7
  819. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  820. TAB OPEN
  821. TAB T=2
  822. URL GOTO=http://www.9kw.eu/grafik/form.html
  823. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  824. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  825. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  826. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  827. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  828. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  829. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\ilha.jpg
  830. SET !TIMEOUT_STEP 120
  831. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  832. SET !EXTRACT NULL
  833. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  834. SET !TIMEOUT_STEP 0
  835. WAIT SECONDS=1
  836. TAB CLOSE
  837.  
  838. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://ilhafaucet.tk/btc-faucet ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  839. WAIT SECONDS=1
  840. TAG POS=9 TYPE=INPUT:BUTTON FORM=ACTION:http://ilhafaucet.tk/btc-faucet ATTR=NAME:claim_coins
  841. WAIT SECONDS=50
  842.  
  843.  
  844.  
  845.  
  846. SET !EXTRACT_TEST_POPUP NO
  847. SET !ERRORIGNORE YES
  848. SET !TIMEOUT_PAGE 60
  849. TAB T=1
  850. TAB CLOSEALLOTHERS
  851.  
  852. SET API "YOUR API"
  853.  
  854. URL GOTO=http://meuautosurf.tk/
  855. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://meuautosurf.tk/btc-faucet/ ATTR=NAME:address CONTENT=put your bitcoin address here
  856. FILEDELETE NAME=C:\Captcha\surf.jpg
  857. ONDOWNLOAD FOLDER=C:\Captcha FILE=surf.jpg
  858. WAIT SECONDS=7
  859. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  860. TAB OPEN
  861. TAB T=2
  862. URL GOTO=http://www.9kw.eu/grafik/form.html
  863. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  864. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  865. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  866. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  867. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  868. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  869. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\surf.jpg
  870. SET !TIMEOUT_STEP 120
  871. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  872. SET !EXTRACT NULL
  873. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  874. SET !TIMEOUT_STEP 0
  875. WAIT SECONDS=1
  876. TAB CLOSE
  877.  
  878. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://meuautosurf.tk/btc-faucet/ ATTR=ID:adcopy_response CONTENT={!EXTRACT}}
  879. WAIT SECONDS=1
  880. TAG POS=5 TYPE=INPUT:BUTTON FORM=ACTION:http://meuautosurf.tk/btc-faucet/ ATTR=NAME:claim_coins
  881. WAIT SECONDS=50
  882.  
  883.  
  884.  
  885. SET !EXTRACT_TEST_POPUP NO
  886. SET !ERRORIGNORE YES
  887. SET !TIMEOUT_PAGE 60
  888. TAB T=1
  889. TAB CLOSEALLOTHERS
  890.  
  891. SET API "YOUR API"
  892.  
  893. URL GOTO=http://riodejaneirofaucet.tk/
  894. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://riodejaneirofaucet.tk/btc-faucet ATTR=NAME:address CONTENT=put your bitcoin address here
  895. FILEDELETE NAME=C:\Captcha\riodejaneirofaucet.jpg
  896. ONDOWNLOAD FOLDER=C:\Captcha FILE=riodejaneirofaucet.jpg
  897. WAIT SECONDS=7
  898. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  899. TAB OPEN
  900. TAB T=2
  901. URL GOTO=http://www.9kw.eu/grafik/form.html
  902. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  903. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  904. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  905. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  906. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  907. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  908. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\riodejaneirofaucet.jpg
  909. SET !TIMEOUT_STEP 120
  910. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  911. SET !EXTRACT NULL
  912. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  913. SET !TIMEOUT_STEP 0
  914. WAIT SECONDS=1
  915. TAB CLOSE
  916.  
  917. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:http://riodejaneirofaucet.tk/btc-faucet ATTR=ID:adcopy_response CONTENT={!EXTRACT}}
  918. WAIT SECONDS=1
  919. TAG POS=1 TYPE=INPUT:BUTTON FORM=ACTION:http://riodejaneirofaucet.tk/btc-faucet ATTR=NAME:claim_coins
  920. WAIT SECONDS=50
  921.  
  922. SET !EXTRACT_TEST_POPUP NO
  923. SET !ERRORIGNORE YES
  924. SET !TIMEOUT_PAGE 300
  925. SET !TIMEOUT_STEP 10
  926.  
  927. SET RAND1 EVAL("var min = 300; var max = 335; var randomNumber = Math.floor(Math.random() * (max - min + 1)) + min; randomNumber;")
  928. SET apikey "API"
  929.  
  930. TAB T=1
  931. URL GOTO=http://bit.ly/2zgDWKk
  932.  
  933. WAIT SECONDS=2
  934. ONDOWNLOAD FOLDER=C:\Captcha FILE=faucetpig.jpg
  935. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-puzzle-image CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  936.  
  937. TAB OPEN
  938. TAB T=2
  939. URL GOTO=http://www.9kw.eu/grafik/form.html
  940. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  941. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=5
  942. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  943. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  944. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  945. TAG POS=1 TYPE=INPUT:TEXT FORM=ACTION:/index.cgi ATTR=NAME:maxtimeout CONTENT=200
  946. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  947. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\faucetpig.jpg
  948. SET !TIMEOUT_STEP 200
  949. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  950. SET !EXTRACT NULL
  951. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  952. SET !TIMEOUT_STEP 0
  953. WAIT SECONDS=1
  954. TAB CLOSE
  955. TAB T=1
  956. TAG POS=1 TYPE=INPUT:TEXT ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  957.  
  958. TAG POS=1 TYPE=A ATTR=TXT:Claim<SP>Satoshis
  959. WAIT SECONDS={{RAND1}}
  960. FILEDELETE NAME=C:\Captcha\faucetpig.jpg
  961.  
  962.  
  963. SET !EXTRACT_TEST_POPUP NO
  964. SET !ERRORIGNORE NO
  965. SET !TIMEOUT_PAGE 300
  966. SET !TIMEOUT_STEP 300
  967.  
  968. TAB T=1
  969. TAB CLOSEALLOTHERS
  970.  
  971. SET apikey "YOURAPI"
  972. SET prio 5
  973. URL GOTO=http://bit.ly/2ATZJd7
  974. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  975. WAIT SECONDS=3
  976.  
  977. ' Step 2: Save the captcha key and show the field for the answer
  978. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  979. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  980. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  981. WAIT SECONDS=5
  982. 'Syntaxcheck: API Key, prio
  983. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  984. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  985. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  986. WAIT SECONDS=5
  987. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  988. TAB OPEN
  989. TAB T=2
  990. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  991. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  992. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  993. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  994. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  995. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  996. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  997. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  998. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  999. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1000. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1001. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1002. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1003. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1004. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1005. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1006. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1007. 'Submit the formdata to 9kw.eu
  1008. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1009. 'Extract the captchaid from your captcha submit
  1010. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1011. SET captchaid {{!EXTRACT}}
  1012. 'Clean the !EXTRACT variable for the next task
  1013. SET !EXTRACT NULL
  1014. 'Extract the characters that are recoginzed from the picture of captcha.
  1015. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1016. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1017. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1018. 'Clean the !EXTRACT variable for the next task
  1019. SET !EXTRACT NULL
  1020. TAB CLOSE
  1021.  
  1022. 'Display extracted data (only for debug)
  1023. 'PROMPT {{captchaid}}
  1024.  
  1025. 'Step 5: Fill the recognized characters to the verification box
  1026. TAB T=1
  1027. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1028. WAIT SECONDS=5
  1029. TAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1030.  
  1031.  
  1032.  
  1033.  
  1034. SET !EXTRACT_TEST_POPUP NO
  1035. SET !ERRORIGNORE NO
  1036. SET !TIMEOUT_PAGE 300
  1037. SET !TIMEOUT_STEP 300
  1038.  
  1039. TAB T=1
  1040. TAB CLOSEALLOTHERS
  1041.  
  1042. SET apikey "YOURAPI"
  1043. SET prio 5
  1044. URL GOTO=http://bit.ly/2ADn5zv
  1045. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  1046. WAIT SECONDS=3
  1047.  
  1048. ' Step 2: Save the captcha key and show the field for the answer
  1049. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1050. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1051. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1052. WAIT SECONDS=5
  1053. 'Syntaxcheck: API Key, prio
  1054. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1055. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1056. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1057. WAIT SECONDS=5
  1058. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1059. TAB OPEN
  1060. TAB T=2
  1061. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1062. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1063. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1064. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1065. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1066. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1067. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1068. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1069. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1070. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1071. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1072. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1073. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1074. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1075. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1076. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1077. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1078. 'Submit the formdata to 9kw.eu
  1079. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1080. 'Extract the captchaid from your captcha submit
  1081. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1082. SET captchaid {{!EXTRACT}}
  1083. 'Clean the !EXTRACT variable for the next task
  1084. SET !EXTRACT NULL
  1085. 'Extract the characters that are recoginzed from the picture of captcha.
  1086. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1087. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1088. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1089. 'Clean the !EXTRACT variable for the next task
  1090. SET !EXTRACT NULL
  1091. TAB CLOSE
  1092.  
  1093. 'Display extracted data (only for debug)
  1094. 'PROMPT {{captchaid}}
  1095.  
  1096. 'Step 5: Fill the recognized characters to the verification box
  1097. TAB T=1
  1098. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1099. WAIT SECONDS=5
  1100. TAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1101.  
  1102.  
  1103.  
  1104. SET !EXTRACT_TEST_POPUP NO
  1105. SET !ERRORIGNORE NO
  1106. SET !TIMEOUT_PAGE 300
  1107. SET !TIMEOUT_STEP 300
  1108.  
  1109. TAB T=1
  1110. TAB CLOSEALLOTHERS
  1111.  
  1112. SET apikey "YOURAPI"
  1113. SET prio 5
  1114. URL GOTO=http://bit.ly/2kynSuS
  1115. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  1116. WAIT SECONDS=3
  1117.  
  1118. ' Step 2: Save the captcha key and show the field for the answer
  1119. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1120. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1121. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1122. WAIT SECONDS=5
  1123. 'Syntaxcheck: API Key, prio
  1124. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1125. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1126. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1127. WAIT SECONDS=5
  1128. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1129. TAB OPEN
  1130. TAB T=2
  1131. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1132. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1133. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1134. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1135. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1136. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1137. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1138. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1139. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1140. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1141. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1142. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1143. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1144. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1145. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1146. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1147. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1148. 'Submit the formdata to 9kw.eu
  1149. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1150. 'Extract the captchaid from your captcha submit
  1151. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1152. SET captchaid {{!EXTRACT}}
  1153. 'Clean the !EXTRACT variable for the next task
  1154. SET !EXTRACT NULL
  1155. 'Extract the characters that are recoginzed from the picture of captcha.
  1156. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1157. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1158. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1159. 'Clean the !EXTRACT variable for the next task
  1160. SET !EXTRACT NULL
  1161. TAB CLOSE
  1162.  
  1163. 'Display extracted data (only for debug)
  1164. 'PROMPT {{captchaid}}
  1165.  
  1166. 'Step 5: Fill the recognized characters to the verification box
  1167. TAB T=1
  1168. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1169. WAIT SECONDS=5
  1170. TTAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1171.  
  1172.  
  1173.  
  1174. SET !EXTRACT_TEST_POPUP NO
  1175. SET !ERRORIGNORE NO
  1176. SET !TIMEOUT_PAGE 300
  1177. SET !TIMEOUT_STEP 300
  1178.  
  1179. TAB T=1
  1180. TAB CLOSEALLOTHERS
  1181.  
  1182. SET apikey "YOURAPI"
  1183. SET prio 5
  1184. URL GOTO=http://bit.ly/2j7MDxy
  1185. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  1186. WAIT SECONDS=3
  1187.  
  1188. ' Step 2: Save the captcha key and show the field for the answer
  1189. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1190. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1191. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1192. WAIT SECONDS=5
  1193. 'Syntaxcheck: API Key, prio
  1194. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1195. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1196. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1197. WAIT SECONDS=5
  1198. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1199. TAB OPEN
  1200. TAB T=2
  1201. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1202. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1203. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1204. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1205. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1206. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1207. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1208. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1209. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1210. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1211. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1212. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1213. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1214. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1215. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1216. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1217. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1218. 'Submit the formdata to 9kw.eu
  1219. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1220. 'Extract the captchaid from your captcha submit
  1221. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1222. SET captchaid {{!EXTRACT}}
  1223. 'Clean the !EXTRACT variable for the next task
  1224. SET !EXTRACT NULL
  1225. 'Extract the characters that are recoginzed from the picture of captcha.
  1226. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1227. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1228. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1229. 'Clean the !EXTRACT variable for the next task
  1230. SET !EXTRACT NULL
  1231. TAB CLOSE
  1232.  
  1233. 'Display extracted data (only for debug)
  1234. 'PROMPT {{captchaid}}
  1235.  
  1236. 'Step 5: Fill the recognized characters to the verification box
  1237. TAB T=1
  1238. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1239. WAIT SECONDS=5
  1240. TAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1241.  
  1242.  
  1243.  
  1244. SET !EXTRACT_TEST_POPUP NO
  1245. SET !ERRORIGNORE NO
  1246. SET !TIMEOUT_PAGE 300
  1247. SET !TIMEOUT_STEP 300
  1248.  
  1249. TAB T=1
  1250. TAB CLOSEALLOTHERS
  1251.  
  1252. SET apikey "YOURAPI"
  1253. SET prio 5
  1254. URL GOTO=http://bit.ly/2yGQjvD
  1255. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  1256. WAIT SECONDS=3
  1257.  
  1258. ' Step 2: Save the captcha key and show the field for the answer
  1259. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1260. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1261. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1262. WAIT SECONDS=5
  1263. 'Syntaxcheck: API Key, prio
  1264. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1265. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1266. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1267. WAIT SECONDS=5
  1268. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1269. TAB OPEN
  1270. TAB T=2
  1271. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1272. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1273. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1274. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1275. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1276. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1277. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1278. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1279. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1280. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1281. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1282. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1283. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1284. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1285. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1286. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1287. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1288. 'Submit the formdata to 9kw.eu
  1289. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1290. 'Extract the captchaid from your captcha submit
  1291. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1292. SET captchaid {{!EXTRACT}}
  1293. 'Clean the !EXTRACT variable for the next task
  1294. SET !EXTRACT NULL
  1295. 'Extract the characters that are recoginzed from the picture of captcha.
  1296. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1297. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1298. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1299. 'Clean the !EXTRACT variable for the next task
  1300. SET !EXTRACT NULL
  1301. TAB CLOSE
  1302.  
  1303. 'Display extracted data (only for debug)
  1304. 'PROMPT {{captchaid}}
  1305.  
  1306. 'Step 5: Fill the recognized characters to the verification box
  1307. TAB T=1
  1308. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1309. WAIT SECONDS=5
  1310. TAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1311.  
  1312.  
  1313.  
  1314.  
  1315.  
  1316.  
  1317.  
  1318. SET !EXTRACT_TEST_POPUP NO
  1319. SET !ERRORIGNORE NO
  1320. SET !TIMEOUT_PAGE 300
  1321. SET !TIMEOUT_STEP 300
  1322.  
  1323. TAB T=1
  1324. TAB CLOSEALLOTHERS
  1325.  
  1326. SET apikey "YOURAPI"
  1327. SET prio 5
  1328. URL GOTO=http://bit.ly/2ohTHNE
  1329. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:new_payout ATTR=ID:payout_to CONTENT=put your bitcoin address here
  1330. WAIT SECONDS=3
  1331.  
  1332. ' Step 2: Save the captcha key and show the field for the answer
  1333. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1334. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1335. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1336. WAIT SECONDS=5
  1337. 'Syntaxcheck: API Key, prio
  1338. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1339. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1340. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1341. WAIT SECONDS=5
  1342. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1343. TAB OPEN
  1344. TAB T=2
  1345. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1346. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1347. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1348. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1349. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1350. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1351. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1352. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1353. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1354. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1355. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1356. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1357. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1358. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1359. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1360. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1361. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1362. 'Submit the formdata to 9kw.eu
  1363. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1364. 'Extract the captchaid from your captcha submit
  1365. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1366. SET captchaid {{!EXTRACT}}
  1367. 'Clean the !EXTRACT variable for the next task
  1368. SET !EXTRACT NULL
  1369. 'Extract the characters that are recoginzed from the picture of captcha.
  1370. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1371. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1372. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1373. 'Clean the !EXTRACT variable for the next task
  1374. SET !EXTRACT NULL
  1375. TAB CLOSE
  1376.  
  1377. 'Display extracted data (only for debug)
  1378. 'PROMPT {{captchaid}}
  1379.  
  1380. 'Step 5: Fill the recognized characters to the verification box
  1381. TAB T=1
  1382. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1383. WAIT SECONDS=5
  1384. TAG POS=1 TYPE=BUTTON FORM=ID:new_payout ATTR=NAME:button
  1385.  
  1386.  
  1387. SET !EXTRACT_TEST_POPUP NO
  1388. SET !ERRORIGNORE YES
  1389. SET !TIMEOUT_PAGE 60
  1390. SET !LOOP -99999
  1391. TAB T=1
  1392. TAB CLOSEALLOTHERS
  1393. URL GOTO=http://bit.ly/2zfDJqJ
  1394. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:wpbf_address CONTENT=put your bitcoin address here
  1395. FILEDELETE NAME=C:\Captcha\many-free-bitcoin.jpg
  1396. ONDOWNLOAD FOLDER=C:\Captcha FILE=many-free-bitcoin.jpg
  1397. WAIT SECONDS=7
  1398. TAG POS=1 TYPE=DIV ATTR=ID:adcopy-outer CONTENT=EVENT:SAVE_ELEMENT_SCREENSHOT
  1399. TAB OPEN
  1400. TAB T=2
  1401. URL GOTO=http://www.9kw.eu/grafik/form.html
  1402. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT=put your 9kw api here
  1403. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT=0
  1404. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1405. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1406. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1407. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1408. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT=C:\Captcha\many-free-bitcoin.jpg
  1409. SET !TIMEOUT_STEP 120
  1410. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1411. SET !EXTRACT NULL
  1412. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1413. SET !TIMEOUT_STEP 0
  1414. WAIT SECONDS=1
  1415. TAB CLOSE
  1416. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:adcopy_response CONTENT={{!EXTRACT}}
  1417. WAIT SECONDS=1
  1418. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ID:wpbf-claim-form ATTR=*
  1419.  
  1420.  
  1421.  
  1422. SET !EXTRACT_TEST_POPUP NO
  1423. SET !ERRORIGNORE NO
  1424. SET !TIMEOUT_PAGE 300
  1425. SET !TIMEOUT_STEP 300
  1426.  
  1427. TAB T=1
  1428. TAB CLOSEALLOTHERS
  1429.  
  1430. SET apikey "YOURAPI"
  1431. SET prio 5
  1432. URL GOTO=http://bit.ly/2ornELx
  1433. TAG POS=1 TYPE=INPUT:TEXT FORM=ID:wpbf-claim-form ATTR=ID:wpbf_address CONTENT=put your bitcoin address here
  1434. WAIT SECONDS=3
  1435.  
  1436. ' Step 2: Save the captcha key and show the field for the answer
  1437. URL GOTO=javascript:(function(){var<SP>x<SP>=<SP>document.getElementById("g-recaptcha-response");x.style.display<SP>=<SP>"";})();
  1438. TAG POS=1 TYPE=DIV ATTR=CLASS:g-recaptcha EXTRACT=HTM
  1439. SET datasitekey EVAL("var sitekey = \"{{!EXTRACT}}\";var rx = new RegExp('sitekey=\"([^\"]+)\"','i'); var x = sitekey.match(rx)[1]; x;")
  1440. WAIT SECONDS=5
  1441. 'Syntaxcheck: API Key, prio
  1442. SET apikey EVAL("var s=\"{{apikey}}\"; if(s.match(/^[a-zA-Z0-9]+$/) && s.length <= 50 && s.length >= 5) s; else MacroError(\"API Key is wrong.\")")
  1443. SET prio EVAL("var s=\"{{prio}}\", d = parseFloat(s); if(d >= 0 && d <= 20) d; else MacroError(\"Value(Prio) is not in the set range.\")")
  1444. SET pageurl EVAL("domain = \"{{!URLCURRENT}}\".split(\"://\")[1];domain.split(\"/\")[0];")
  1445. WAIT SECONDS=5
  1446. 'Step 3: Open the a new tab, and go to 9kw.eu, and submit the captcha picture
  1447. TAB OPEN
  1448. TAB T=2
  1449. URL GOTO=http://www.9kw.eu/grafik/form_base64.html
  1450. 'The apikey is used to identify each of our customers, which you can get from the our page. It is assigned to the CONTENT.
  1451. TAG POS=1 TYPE=INPUT ATTR=NAME:apikey CONTENT={{apikey}}
  1452. 'Priority in our system like min. 0 to max. 20 (cost +0-20)
  1453. TAG POS=1 TYPE=INPUT ATTR=NAME:prio CONTENT={{prio}}
  1454. 'Options for the form. See more under http://www.9kw.eu/grafik/form_base64.html and http://www.9kw.eu/api.html
  1455. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:selfsolve CONTENT=NO
  1456. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:confirm CONTENT=NO
  1457. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:base64 CONTENT=NO
  1458. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:interactive CONTENT=YES
  1459. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:case-sensitive CONTENT=NO
  1460. TAG POS=1 TYPE=INPUT:CHECKBOX FORM=ACTION:/index.cgi ATTR=NAME:nomd5 CONTENT=YES
  1461. TAG POS=1 TYPE=INPUT ATTR=NAME:maxtimeout CONTENT=300
  1462. TAG POS=1 TYPE=INPUT ATTR=NAME:source CONTENT=imacros
  1463. TAG POS=1 TYPE=INPUT ATTR=NAME:oldsource CONTENT=recaptchav2
  1464. TAG POS=1 TYPE=INPUT ATTR=NAME:pageurl CONTENT={{pageurl}}
  1465. TAG POS=1 TYPE=INPUT ATTR=NAME:file-upload-01 CONTENT={{datasitekey}}
  1466. 'Submit the formdata to 9kw.eu
  1467. TAG POS=1 TYPE=INPUT ATTR=TYPE:submit
  1468. 'Extract the captchaid from your captcha submit
  1469. TAG POS=1 TYPE=INPUT ATTR=NAME:captchaid EXTRACT=TXT
  1470. SET captchaid {{!EXTRACT}}
  1471. 'Clean the !EXTRACT variable for the next task
  1472. SET !EXTRACT NULL
  1473. 'Extract the characters that are recoginzed from the picture of captcha.
  1474. TAG POS=1 TYPE=INPUT ATTR=NAME:result EXTRACT=TXT
  1475. 'Step 4: Check the captcha answer (text or nothing like #EANF# = Extraction Anchor Not Found)
  1476. SET answer EVAL("if (\"{{!EXTRACT}}\" == \"#EANF#\") {var x = \"\";} else {var x = \"{{!EXTRACT}}\";} x;")
  1477. 'Clean the !EXTRACT variable for the next task
  1478. SET !EXTRACT NULL
  1479. TAB CLOSE
  1480.  
  1481. 'Display extracted data (only for debug)
  1482. 'PROMPT {{captchaid}}
  1483.  
  1484. 'Step 5: Fill the recognized characters to the verification box
  1485. TAB T=1
  1486. TAG POS=1 TYPE=TEXTAREA ATTR=ID:g-recaptcha-response CONTENT={{answer}}
  1487. WAIT SECONDS=5
  1488. TAG POS=1 TYPE=INPUT:SUBMIT FORM=ID:wpbf-claim-form ATTR=*
  1489.  
  1490. WAIT SECONDS=300
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement