Commit 1016623f authored by wang's avatar wang

解密脚本编写

parent 358360be
......@@ -5335,6 +5335,7 @@ window["_pxAppId"] = "PXVb73hTEg";
}
}
function Rl(t) {
console.log(JSON.stringify(t[0]))
console["log"](t[0]);
for (var m = i, d = xc(), v = 0; v < t["length"]; v++) {
var p = t[v];
......@@ -5376,6 +5377,7 @@ window["_pxAppId"] = "PXVb73hTEg";
"pc": g
};
var y = vs(t, B);
console.log([t,B,y])
var j = [Es + y, Ys + gl[Wn], Rs + gl[Tn], Os + lf, Cs + gl[In], _s + rl++, Gs + Ks];
var b = zf();
b && j["push"](Ns + b);
......
......@@ -35,7 +35,6 @@ class PxBypass():
}
code1 = ''
code2 = ''
tag = ''
vid = ''
uuid = ''
token = ''
......@@ -50,16 +49,25 @@ class PxBypass():
# 'https': "http://user-unifflcc-region-us:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600",
# }
tag = "v8.7.2"
ft = "317"
def __init__(self, target_url):
self.target_url = target_url
self.log = logger.bind(module_name='px')
def run(self):
self._init()
self.seq = 0
self.rsc = 1
self._step_1()
self.inc()
self._step_2()
self.inc()
self._step_3()
self.inc()
c = self.__token()
# if c == 403:
# self._step_1()
......@@ -159,36 +167,37 @@ class PxBypass():
def process_ob(self, resp):
m = {}
if 'ob' in resp:
cookies = self.encrypt(base64.b64decode(resp['ob'].encode()), 866 % 128).decode()
print(cookies.split('~~~~'))
for i in cookies.split('~~~~'):
cookies = self.encrypt(base64.b64decode(resp['ob'].encode()), self._decode_resp()).decode()
cks = cookies.split('~~~~')
self.log.info(json.dumps(cks, indent=True))
for i in cks:
tmp = i.split('|')
m[tmp[0]] = tmp[1]
key = tmp[0]
data = tmp[1:]
if key == 'I00II0':
if key == '11oo1o':
t = data[3].split('_')
self.token = t[0]
self.ci = t[1]
self.ci = ''.join([chr(ord(i) ^ 10) for i in self.ci])
if key == '0III0III':
if key == 'o111ooo1':
self.sts = data[0]
if key == 'I0I0I0':
if key == 'o1oo11':
self.hash = data[1]
self.hash2 = data[2]
self.hashv = data[3]
if key == 'I0I0II':
if key == 'o11o11':
self.sid = data[0]
if key == 'I000I0':
if key == 'o1oo1o':
self.vid = data[0]
if key == 'I00III':
self.code2 = data[0]
if key == 'IIII00':
self.tag = data[0]
if key == '0III00I0':
if key == 'o111oooo':
self.num1 = data[0]
if key == '111o1o':
self.num2 = data[0]
if key == 'o11o11oo':
self.cts = data[0]
if key == '0III0II0':
self.code1 = data[0]
if key == '1oooo1':
self.str1 = data[0]
if 'pxde' in i:
self.session.cookies.update({
'_pxde': tmp[3]
......@@ -253,16 +262,14 @@ class PxBypass():
payload = ctx.call('encodePayload', data_str, self.uuid, '')
self.log.info(f'payload {payload}')
tag = "v8.6.6"
ft = "316"
pc = self.__gen_pc(data_str, f'{self.uuid}:{tag}:{ft}')
pc = self.__gen_pc(data_str, f'{self.uuid}:{self.tag}:{self.ft}')
print(pc)
body = {
"payload": payload,
"appId": "PXVb73hTEg",
"tag": tag,
"tag": self.tag,
"uuid": self.uuid,
"ft": ft,
"ft": self.ft,
"seq": "0",
"en": "NTA",
"pc": pc,
......@@ -348,31 +355,27 @@ class PxBypass():
def _step_2(self):
self.log.info(self.m)
# genPayload2(vid, sid, uuid, sts, code1, code2, tag)
data_str = ctxStep2.call('genPayload2', self.vid, self.sid, self.uuid, self.sts, self.code1, self.code2,
self.tag)
data_str = ctxStep2.call('genPayload2', self.vid, self.sid, self.uuid, self.sts, self.num1, self.num2,
self.str1)
self.log.info(f'data_str2 {data_str}')
payload = ctx.call('encodePayload', data_str, self.uuid, self.sts)
self.log.info(f'payload {payload}')
tag = "v8.6.6"
ft = "316"
pc = self.__gen_pc(data_str, f'{self.uuid}:{tag}:{ft}')
pc = self.__gen_pc(data_str, f'{self.uuid}:{self.tag}:{self.ft}')
body = {
"payload": payload,
"appId": "PXVb73hTEg",
"tag": tag,
"tag": self.tag,
"uuid": self.uuid,
"ft": ft,
"seq": "1",
"ft": self.ft,
"seq": self.seq,
"en": "NTA",
"cs": self.cs,
"pc": pc,
"sid": self.sid,
"vid": self.vid,
"cts": self.cts,
"rsc": "1"
"rsc": self.rsc
}
body = self.update_sid_vid(body)
url = "https://collector-pxvb73hteg.px-cloud.net/assets/js/bundle"
headers = {
"authority": "collector-PXVb73hTEg.px-cloud.net",
......@@ -394,41 +397,10 @@ class PxBypass():
response = self.session.post(url, headers=headers, data=body)
self.log.info(f'collector2 {response.text}')
resp = response.json()
m = {}
if 'ob' in resp:
cookies = self.encrypt(base64.b64decode(resp['ob'].encode()), 866 % 128).decode()
print(cookies.split('~~~~'))
for i in cookies.split('~~~~'):
tmp = i.split('|')
m[tmp[0]] = tmp[1]
if 'pxde' in i:
self.session.cookies.update({
'_pxde': tmp[3]
})
elif '_px2' in i:
self.session.cookies.update({
'_px2': tmp[3]
})
elif '31536000' in i:
self.session.cookies.update({
'_pxvid': tmp[1]
})
else:
for i in resp['do']:
tmp = i.split('|')
# print(len(tmp), tmp)
if len(tmp) == 6 and tmp[1] in ['_px', '_px3', '_pxde']:
self.session.cookies.update({
tmp[1]: tmp[3]
})
elif len(tmp) in [3, 4] and tmp[1] in ['cts', 'vid']:
self.session.cookies.update({
tmp[0]: tmp[1]
})
self.process_ob(resp)
self.log.info(f'cookies2 {self.session.cookies.keys()}')
self.m = m
self.log.info(self.m)
# self.m = m
# self.log.info(self.m)
def _step_3(self):
# self.log.info(self.m)
......@@ -445,15 +417,13 @@ class PxBypass():
payload = ctx.call('encodePayload', data_str, self.uuid, self.sts)
self.log.info(f'payload {payload}')
tag = "v8.6.6"
ft = "316"
pc = self.__gen_pc(data_str, f'{self.uuid}:{tag}:{ft}')
pc = self.__gen_pc(data_str, f'{self.uuid}:{self.tag}:{self.ft}')
body = {
"payload": payload,
"appId": "PXVb73hTEg",
"tag": tag,
"tag": self.tag,
"uuid": self.uuid,
"ft": ft,
"ft": self.ft,
"seq": "4",
"en": "NTA",
"cs": self.cs,
......@@ -485,41 +455,32 @@ class PxBypass():
response = self.session.post(url, headers=headers, data=body)
self.log.info(f'collector3 {response.text}')
resp = response.json()
m = {}
if 'ob' in resp:
cookies = self.encrypt(base64.b64decode(resp['ob'].encode()), 866 % 128).decode()
print(cookies.split('~~~~'))
for i in cookies.split('~~~~'):
tmp = i.split('|')
m[tmp[0]] = tmp[1]
if 'pxde' in i:
self.session.cookies.update({
'_pxde': tmp[3]
})
elif '_px2' in i:
self.session.cookies.update({
'_px2': tmp[3]
})
elif '31536000' in i:
self.session.cookies.update({
'_pxvid': tmp[1]
})
else:
for i in resp['do']:
tmp = i.split('|')
# print(len(tmp), tmp)
if len(tmp) == 6 and tmp[1] in ['_px', '_px3', '_pxde']:
self.session.cookies.update({
tmp[1]: tmp[3]
})
elif len(tmp) in [3, 4] and tmp[1] in ['cts', 'vid']:
self.session.cookies.update({
tmp[0]: tmp[1]
})
self.process_ob(resp)
self.log.info(f'cookies2 {self.session.cookies.keys()}')
self.m = m
self.log.info(self.m)
def _decode_resp(self):
a = int(self.tag.replace('v', '').replace('.', ''))
return a % 128
def update_sid_vid(self, data: dict):
if self.vid != "":
data.update({
'vid': self.vid
})
if self.cts != "":
data.update({
'cts': self.cts
})
if self.sid != "":
data.update({
'sid': self.sid
})
return data
def inc(self):
self.seq += 1
self.rsc += 1
self.log.info(f'seq: {self.seq} rsc:{self.rsc}')
if __name__ == '__main__':
......
......@@ -4,6 +4,7 @@ import ctypes
import json
import random
import time
from urllib.parse import quote
import execjs
......@@ -84,14 +85,15 @@ class PxBypass():
self.inc()
self._step_2(True)
time.sleep(2)
self._step_2(False)
time.sleep(2)
self.inc()
if self.session.cookies.get_dict().get('_px2', None) == None:
self._step_3()
# time.sleep(3)
self.inc()
time.sleep(2)
# if self.session.cookies.get_dict().get('_px2', None) == None:
self._step_3()
# time.sleep(3)
self.inc()
time.sleep(2)
self.__token()
def _init(self):
......@@ -336,6 +338,11 @@ class PxBypass():
# }
)
print(response.status_code)
ckss = []
for k, v in self.session.cookies.get_dict().items():
ckss.append(f'{k}={quote(v)}')
cks = '; '.join(ckss)
self.log.info(f'{cks}')
with open('index.html', 'w') as f:
f.write(response.text)
......
......@@ -4937,9 +4937,9 @@ function genPayload2(sid, vid, ts, num1, num2, str1, uuid, n) {
"PX12330": "109|66|66|70|80", // ["webstore", 'runtime', 'app', "csi", "loadTimes"];构造函数 长度
"PX11705": 1182, //fetch+''
"PX11938": false, //caches
"PX11602": false, //caches
"PX11705": 540, //fetch+''
"PX11938": true, //caches
"PX11602": true, //caches
"PX12021": "false", // webdriver
"PX12421": "false",//webdriver
"PX12124": 1,// 'webdriver' in navigator?1:0
......@@ -4947,70 +4947,70 @@ function genPayload2(sid, vid, ts, num1, num2, str1, uuid, n) {
"PX12291": "",
"PX11881": ["loadTimes", "csi", "app"],// chrome 属性
"PX12036":true,
"PX12356":true,
"PX11522":true,
"PX12204":true,
"PX12408":[
{
"tagName":"INPUT",
"id":"origin",
"type":"text",
"name":"origin",
"height":41,
"width":184.65625,
"x":29.8125,
"y":384.546875
},
{
"tagName":"INPUT",
"id":"destination",
"type":"text",
"name":"destination",
"height":41,
"width":184.65625,
"x":219.796875,
"y":384.546875
},
{
"tagName":"INPUT",
"id":"departureDate",
"type":"text",
"name":"departureDate",
"height":43,
"width":184.671875,
"x":29.8125,
"y":464.546875
},
{
"tagName":"INPUT",
"id":"returnDate",
"type":"text",
"name":"returnDate",
"height":43,
"width":184.671875,
"x":219.796875,
"y":464.546875
},
{
"tagName":"INPUT",
"id":"passengersInput",
"type":"text",
"name":"passengersInput",
"height":41,
"width":380,
"x":29.8125,
"y":556.546875
},
{
"tagName":"INPUT",
"id":"promocode",
"type":"text",
"name":"promocode",
"height":43,
"width":180.5,
"x":27.8125,
"y":652.546875
}],
// "PX12356":true,
// "PX11522":true,
// "PX12204":true,
// "PX12408":[
// {
// "tagName":"INPUT",
// "id":"origin",
// "type":"text",
// "name":"origin",
// "height":41,
// "width":184.65625,
// "x":29.8125,
// "y":384.546875
// },
// {
// "tagName":"INPUT",
// "id":"destination",
// "type":"text",
// "name":"destination",
// "height":41,
// "width":184.65625,
// "x":219.796875,
// "y":384.546875
// },
// {
// "tagName":"INPUT",
// "id":"departureDate",
// "type":"text",
// "name":"departureDate",
// "height":43,
// "width":184.671875,
// "x":29.8125,
// "y":464.546875
// },
// {
// "tagName":"INPUT",
// "id":"returnDate",
// "type":"text",
// "name":"returnDate",
// "height":43,
// "width":184.671875,
// "x":219.796875,
// "y":464.546875
// },
// {
// "tagName":"INPUT",
// "id":"passengersInput",
// "type":"text",
// "name":"passengersInput",
// "height":41,
// "width":380,
// "x":29.8125,
// "y":556.546875
// },
// {
// "tagName":"INPUT",
// "id":"promocode",
// "type":"text",
// "name":"promocode",
// "height":43,
// "width":180.5,
// "x":27.8125,
// "y":652.546875
// }],
"PX12207": 0, //v["self"] === v["top"] ? 0 : 1
"PX11538": 2, // history.length
"PX11984": "TypeError: Cannot read properties of null (reading '0')\n at de (https://client.px-cloud.net/PXVb73hTEg/main.min.js:796:13)\n at Eo (https://client.px-cloud.net/PXVb73hTEg/main.min.js:2294:31)\n at Co (https://client.px-cloud.net/PXVb73hTEg/main.min.js:2316:23)\n at https://client.px-cloud.net/PXVb73hTEg/main.min.js:2152:9",
......@@ -5108,11 +5108,11 @@ function genPayload2(sid, vid, ts, num1, num2, str1, uuid, n) {
// }
// }, "plugins_len": 5
// },
"PX12583": {
"smd": {
"ok": true, "ex": false
}
},
// "PX12583": {
// "smd": {
// "ok": true, "ex": false
// }
// },
"PX12578": {},
"PX12579": {
"support": true, "status": {
......@@ -5412,7 +5412,7 @@ let m = {
console.log(genPayload2(
"b74b24ce-7f94-11ee-83a7-84a2582391ce", "b74b1cb2-7f94-11ee-83a7-89dee014eb2a", "1699598720259", 3103, "64443316018828296776", "cl6t303s61jd2hujpks0", "b664a2c0-7f94-11ee-be94-7b5c5218c18c"
"6d7a2d88-81d5-11ee-8d54-3772cad84fd1", "6d7a1eeb-81d5-11ee-8d54-b98219fe0724", "1699846416003", 4724, "75794514472377698407", "cl8pi3r023nd2hpolnug", "6cd88390-81d5-11ee-bb85-cf79995a1409"
, true
)
)
......
......@@ -57,9 +57,7 @@ a2 ="WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBMiw5XCUvPVglEikcJhILHyYBWBAlPz4EJDwPEjI8MRw
# a2 = "WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBMT89EiUFIRExEikcJhIyBSYrWBAlPz4EJDwAAiUsLRwmPyIBJT8xHyUsLVgxAgwDIQEfAQwBIV4hBS4EMQI5XSYsDxIkPAtaMgI5HCU8LgQyO1hcMTwiBSQ8PVwxAg8SMgU6AyY8DxIyKyEbIQY5AScCMRElLCESJRIPXCUsKR8mER8BCSshXiECMVomPzIAJgI5ESUvOgIlWjFbMT8lWCU/JRInPyERJz8lECU8MgUxEiYAJzwpETE8IV0nPCkfJgI9Eic8KREmPzIFJS8mAyY8BAMmAioEJiw5XTI/LQEOOVVVFBwaHQ0UW1hYFhYWFgdZB1lZWRQLHQ=="
a2 = "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"
a2 = "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"
# 0III0I00 判断是否通过
......@@ -92,7 +90,7 @@ for i in cks:
if tmp[0] == 'o11o11oo':
cts = tmp[1]
uuid = 'b664a2c0-7f94-11ee-be94-7b5c5218c18c'
uuid = '6cd88390-81d5-11ee-bb85-cf79995a1409'
print( json.dumps([sid, vid, ts, num1, num2, str1, uuid]))
......
import requests
import tls_client
session = tls_client.Session(client_identifier='chrome_117')
......@@ -6,7 +7,7 @@ session.proxies = {
'https': 'http://127.0.0.1:7890',
}
# prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox = 'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
# prox = 'http://127.0.0.1:7890'
session.proxies = {
......@@ -34,7 +35,13 @@ headers = {
"user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36"
}
# headers['cookie'] = '_gcl_au=1.1.726924981.1699598720; _pxvid=b74b1cb2-7f94-11ee-83a7-89dee014eb2a; pxcts=b74b27a3-7f94-11ee-83a7-84a2582391ce; _gid=GA1.2.580919944.1699600731; wisepops_visits=%5B%222023-11-10T07%3A17%3A48.502Z%22%5D; _fbp=fb.1.1699600731146.1032395715; _tt_enable_cookie=1; _ttp=ghP5iSyJORmIAKv76hmBa_TZu5j; dtCookie=v_4_srv_-2D28_sn_3LHJRJS3Q1PA2L6OV2SPPRAJ7V16VQPP; rxVisitor=1699600767663CLC4JQ88C4B8N5POH4POJ9EO37AP5SV0; _up=1.2.1441192683.1699600769; _px2=eyJ1IjoiN2I3NWRkZjAtN2Y5OS0xMWVlLTk3NWMtYmQ0MjRhZjJjNzAxIiwidiI6ImI3NDc1ZTljLTdmOTQtMTFlZS05MTVlLTBmMTAxNGRjNzM4ZCIsInQiOjE2OTk2MDEwNjk0ODUsImgiOiIzZWRiNjc5YThiY2U0YzkzOTg3YzYwMmJlZmMzOWNjMmJlODZlMTU5ZDFlZjU0YzI3NmFhZTQzMWJhMWIyYzZjIn0=; _pin_unauth=dWlkPVpqRmhaakF3T0dFdE16azJaaTAwWlRoaExXSTJNR0V0TWprMU5XTmxZV0UyWm1Waw; ORA_FPC=id=59c89cda-a84e-4777-87eb-c07c97c31009; WTPERSIST=; wisepops_session=%7B%22arrivalOnSite%22%3A%222023-11-10T07%3A17%3A48.502Z%22%2C%22mtime%22%3A1699600787915%2C%22pageviews%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A0%7D%2C%22bars%22%3A%7B%7D%2C%22sticky%22%3A%7B%7D%2C%22countdowns%22%3A%7B%7D%2C%22src%22%3Anull%2C%22utm%22%3A%7B%7D%2C%22testIp%22%3Anull%7D; wisepops=%7B%22csd%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A%7B%22dc%22%3A1%2C%22d%22%3A1699600787915%2C%22cl%22%3A1%7D%7D%2C%22sub%22%3A0%2C%22ucrn%22%3A28%2C%22cid%22%3A%2278471%22%2C%22v%22%3A4%2C%22bandit%22%3A%7B%22recos%22%3A%7B%7D%7D%7D; _gat_UA-2678252-1=1; _ga=GA1.1.1994578306.1699600664; _uetsid=65a28a407f9911ee99ceefb6078a614e; _uetvid=65a278207f9911eea2e91366805ea7ec; rxvt=1699602634427|1699600767664; dtSa=false%7Cxhr%7C6%7Cx%7Cx%7C1699600834426%7C400832784_691%7Chttps%3A%2F%2Fbooking.flyfrontier.com%2FFlight%2FSelect%7C%7C%7C%7C; _ga_P2WLKWBNNW=GS1.1.1699600664.1.1.1699600834.18.0.0; dtPC=-28$400832784_691h-vSFRPRLFMCKQAFEBMELMRDRQHPLHRODHG-0e0'
headers['cookie'] = '__RequestVerificationToken=dSbBAJ4jQKtA3uADEP14gJ4sAXL--acwii9UQ0-LhXoI5OC4z2T_2OtbqKEfnuIR4CDPHns_XZ38Oosz1AUfPQiK4nonPzPwzK9ky7GtF5qdb1HZQPdHhaiaOg2Kz9NYpX-jNA2; _pxhd=ad07ce96e23e11029a06ba82910f6ca606784662403d705043e1ba5c70763a1d%3A01a6b3a6-81fd-11ee-9815-a93c87894b4e; _pxvid=01a6b3a6-81fd-11ee-9815-a93c87894b4e; pxcts=03c7018c-81fd-11ee-9df3-4022d22223c0; _px2=eyJ1IjoiMDMxYzI4MzAtODFmZC0xMWVlLTgxYWUtNGQwNjhkYTMzMmYwIiwidiI6IjAxYTZiM2E2LTgxZmQtMTFlZS05ODE1LWE5M2M4Nzg5NGI0ZSIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjhkNzIwNzNhZDBlYjJkMWE5MmMxN2UwMGUyZGZmZTcwNjRlNmMxN2VmNjBjMGVlYmJkZDYxZmI3ZDNiMGMzNzQifQ%3D%3D'
# cks = {'_px2': 'eyJ1IjoiOTY0ODdjMzAtNzk4OC0xMWVlLTgxYTktMjUyZjY0MDdjMTYxIiwidiI6Ijk3NmYxYzBlLTc5ODgtMTFlZS1iODYwLTAyNTVmY2JmZTU2MCIsInQiOjYyMDIzMzg4MDAwNCwiaCI6ImViY2U4ZmQ2ZjA3ZGIxNTkxY2YzMmI0MTg3OTcwZWI5NGY5ZDZkN2I2YjY4NGUxZjJiMjE2MGZlZjQxYWI0MzQifQ==', '_pxvid': '976f1c0e-7988-11ee-b860-0255fcbfe560', 'pxcts': '976f338c-7988-11ee-b860-865043e6e7b4'}
......@@ -57,15 +64,21 @@ params = {
"adt": "1"
}
# , cookies=cks
response = session.get(url, headers=headers, params=params
, cookies=
{
'_pxhd': 'e33ffa239c65b81580fac5ff09060127bd0d0473a764327efb3b6fe47e696b6b:7750d29f-81d0-11ee-bcac-2b37f29a1872',
'pxcts': '78fa88a4-81d0-11ee-9190-18bd99a3852f',
'_pxvid': '7750d29f-81d0-11ee-bcac-2b37f29a1872',
'_px2': 'eyJ1IjoiNzc3OGYzMjAtODFkMC0xMWVlLTkyMGItOGZjZTQ5ZmUwMzRhIiwidiI6Ijc3NTBkMjlmLTgxZDAtMTFlZS1iY2FjLTJiMzdmMjlhMTg3MiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjkwMWYwZDNiMzU0ZjA0ZDMwZjQxNTVmODgxNjcyMjBjOWNjZDY0MTg4YzNiNDhmZDZiZWU1OWJkMjBkODM1MzYifQ=='}
response = requests.post('http://52.52.23.116/tls/forward', json=dict(url=url,headers=headers,params=params, method="GET", proxy=prox, debug=True
# # ,allow_redirects=True
))
, allow_redirects=False)
# response = session.get(url, headers=headers, params=params
# # , cookies=
# # {
# # '_pxhd': 'e33ffa239c65b81580fac5ff09060127bd0d0473a764327efb3b6fe47e696b6b:7750d29f-81d0-11ee-bcac-2b37f29a1872',
# # 'pxcts': '78fa88a4-81d0-11ee-9190-18bd99a3852f',
# # '_pxvid': '7750d29f-81d0-11ee-bcac-2b37f29a1872',
# # '_px2': 'eyJ1IjoiNzc3OGYzMjAtODFkMC0xMWVlLTkyMGItOGZjZTQ5ZmUwMzRhIiwidiI6Ijc3NTBkMjlmLTgxZDAtMTFlZS1iY2FjLTJiMzdmMjlhMTg3MiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjkwMWYwZDNiMzU0ZjA0ZDMwZjQxNTVmODgxNjcyMjBjOWNjZDY0MTg4YzNiNDhmZDZiZWU1OWJkMjBkODM1MzYifQ=='}
#
# , allow_redirects=False)
print(response.text)
print(response.url)
print(response.json()['status_code'])
print(response.json()['text'])
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment