Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Sign in
Toggle navigation
P
px3
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wangmingming
px3
Commits
1a18d10e
Commit
1a18d10e
authored
Nov 21, 2023
by
wang
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
f9 ok
parent
7925694c
Changes
6
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
99 additions
and
73 deletions
+99
-73
decodeResult22_ok.js
ast/decodeResult22_ok.js
+1
-0
index.html
index.html
+4
-4
encodepayload.js
js/encodepayload.js
+2
-2
main.py
main.py
+23
-18
step2.js
step2.js
+66
-48
test_url.py
test_url.py
+3
-1
No files found.
ast/decodeResult22_ok.js
View file @
1a18d10e
...
@@ -2686,6 +2686,7 @@ try {
...
@@ -2686,6 +2686,7 @@ try {
function
oo
(
t
)
{
function
oo
(
t
)
{
var
r
=
qa
;
var
r
=
qa
;
var
a
=
i
;
var
a
=
i
;
console
.
log
(
t
)
!
Na
[
"PX12573"
]
&&
(
Na
[
"PX12573"
]
=
Ce
(
""
+
Math
[
"floor"
](
t
)));
!
Na
[
"PX12573"
]
&&
(
Na
[
"PX12573"
]
=
Ce
(
""
+
Math
[
"floor"
](
t
)));
}
}
function
io
()
{
function
io
()
{
...
...
index.html
View file @
1a18d10e
...
@@ -9,19 +9,19 @@
...
@@ -9,19 +9,19 @@
</head>
</head>
<body>
<body>
<script>
<script>
window
.
_pxVid
=
'a
00c865a-883c-11ee-9488-da4457dd0ef6
'
;
window
.
_pxVid
=
'a
2c1d73c-884d-11ee-ada5-d677706c2688
'
;
window
.
_pxUuid
=
'
1ff0199e-2953-439e-9dbc-fa6528799c44
'
;
window
.
_pxUuid
=
'
d1e079d9-64c6-449b-97eb-d697d559c0aa
'
;
window
.
_pxAppId
=
'PXVb73hTEg'
;
window
.
_pxAppId
=
'PXVb73hTEg'
;
window
.
_pxHostUrl
=
'https://collector-PXVb73hTEg.perimeterx.net'
;
window
.
_pxHostUrl
=
'https://collector-PXVb73hTEg.perimeterx.net'
;
window
.
_pxCustomLogo
=
''
;
window
.
_pxCustomLogo
=
''
;
window
.
_pxJsClientSrc
=
'//client.perimeterx.net/PXVb73hTEg/main.min.js'
;
window
.
_pxJsClientSrc
=
'//client.perimeterx.net/PXVb73hTEg/main.min.js'
;
window
.
_pxFirstPartyEnabled
=
'false'
;
window
.
_pxFirstPartyEnabled
=
'false'
;
var
script
=
document
.
createElement
(
'script'
);
var
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=
&u=1ff0199e-2953-439e-9dbc-fa6528799c44&v=a00c865a-883c-11ee-9488-da4457dd0ef6
&m=0'
;
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=
c&u=d1e079d9-64c6-449b-97eb-d697d559c0aa&v=a2c1d73c-884d-11ee-ada5-d677706c2688
&m=0'
;
document
.
head
.
appendChild
(
script
);
document
.
head
.
appendChild
(
script
);
script
.
onerror
=
function
()
{
script
.
onerror
=
function
()
{
script
=
document
.
createElement
(
'script'
);
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=
&u=1ff0199e-2953-439e-9dbc-fa6528799c44&v=a00c865a-883c-11ee-9488-da4457dd0ef6
&m=0'
;
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=
c&u=d1e079d9-64c6-449b-97eb-d697d559c0aa&v=a2c1d73c-884d-11ee-ada5-d677706c2688
&m=0'
;
script
.
onerror
=
window
.
_pxDisplayErrorMessage
;
script
.
onerror
=
window
.
_pxDisplayErrorMessage
;
document
.
head
.
appendChild
(
script
);
document
.
head
.
appendChild
(
script
);
};
};
...
...
js/encodepayload.js
View file @
1a18d10e
No preview for this file type
main.py
View file @
1a18d10e
...
@@ -65,7 +65,7 @@ class PxBypass():
...
@@ -65,7 +65,7 @@ class PxBypass():
prox
=
'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox
=
'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox
=
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox
=
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
prox
=
'http://127.0.0.1:
8
890'
prox
=
'http://127.0.0.1:
7
890'
session
.
proxies
=
{
session
.
proxies
=
{
'http'
:
prox
,
'http'
:
prox
,
'https'
:
prox
,
'https'
:
prox
,
...
@@ -109,7 +109,7 @@ class PxBypass():
...
@@ -109,7 +109,7 @@ class PxBypass():
else
:
else
:
data_str
=
data
data_str
=
data
self
.
log
.
info
(
f
'data_str {data_str}'
)
self
.
log
.
info
(
f
'data_str {data_str}'
)
self
.
log
.
info
(
f
"gen Payload {self.uuid}, {self.ts}"
)
payload
=
ctx
.
call
(
'encodePayload'
,
data_str
,
self
.
uuid
,
self
.
ts
)
payload
=
ctx
.
call
(
'encodePayload'
,
data_str
,
self
.
uuid
,
self
.
ts
)
self
.
log
.
info
(
f
'payload {payload}'
)
self
.
log
.
info
(
f
'payload {payload}'
)
pc
=
self
.
_gen_pc
(
data_str
,
f
'{self.uuid}:{self.tag}:{self.ft}'
)
pc
=
self
.
_gen_pc
(
data_str
,
f
'{self.uuid}:{self.tag}:{self.ft}'
)
...
@@ -137,7 +137,9 @@ class PxBypass():
...
@@ -137,7 +137,9 @@ class PxBypass():
cks
.
append
(
f
'{k}={v}'
)
cks
.
append
(
f
'{k}={v}'
)
self
.
log
.
info
(
'; '
.
join
(
cks
))
self
.
log
.
info
(
'; '
.
join
(
cks
))
self
.
inc
()
self
.
inc
()
self
.
performanceNow
=
int
(
time
.
time
()
*
1000
-
self
.
startTs
)
self
.
performanceNow
+=
int
(
time
.
time
()
*
1000
-
self
.
startTs
)
self
.
px12280
=
self
.
startTs2
+
self
.
performanceNow
def
run
(
self
):
def
run
(
self
):
...
@@ -145,22 +147,21 @@ class PxBypass():
...
@@ -145,22 +147,21 @@ class PxBypass():
self
.
seq
=
0
self
.
seq
=
0
self
.
rsc
=
1
self
.
rsc
=
1
self
.
_step_1
()
self
.
_step_1
()
self
.
seq
+=
1
# self.seq += 1
self
.
_step_11
()
# self._step_11()
# time.sleep(1.5)
# time.sleep(1.5)
self
.
_step_2
(
True
)
self
.
_step_2
(
True
)
# time.sleep(2)
# time.sleep(2)
self
.
_step_2
(
False
)
#
self._step_2(False)
#
#
# # # if self.session.cookies.get_dict().get('_px2', None) == None:
# # # if self.session.cookies.get_dict().get('_px2', None) == None:
# # time.sleep(2)
# # time.sleep(2)
self
.
_step_3
()
self
.
_step_3
()
#
time.sleep(2)
time
.
sleep
(
2
)
self
.
_token
()
self
.
_token
()
def
_init
(
self
):
def
_init
(
self
):
...
@@ -203,6 +204,7 @@ class PxBypass():
...
@@ -203,6 +204,7 @@ class PxBypass():
self
.
startTs
=
t1
self
.
startTs
=
t1
self
.
startTs2
=
t2
self
.
startTs2
=
t2
self
.
performanceNow
=
random
.
randint
(
2000
,
3000
)
self
.
performanceNow
=
random
.
randint
(
2000
,
3000
)
self
.
px12280
=
self
.
startTs2
+
self
.
performanceNow
self
.
uuid
=
self
.
__uuid
()
self
.
uuid
=
self
.
__uuid
()
# "[{"t":"PX12095","d":{"PX11645":self.target_url,"PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":3781,"PX12248":3600,
# "[{"t":"PX12095","d":{"PX11645":self.target_url,"PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":3781,"PX12248":3600,
# "PX11385":1698649702900,"PX12280":1698649702913,"PX11496":"1ce53d20-76f3-11ee-8971-a3e00c89b2ff","PX12564":null,"PX12565":-1,"PX11379":false}}]"
# "PX11385":1698649702900,"PX12280":1698649702913,"PX11496":"1ce53d20-76f3-11ee-8971-a3e00c89b2ff","PX12564":null,"PX12565":-1,"PX11379":false}}]"
...
@@ -250,7 +252,7 @@ class PxBypass():
...
@@ -250,7 +252,7 @@ class PxBypass():
# for k, v in self.session.cookies.get_dict().items():
# for k, v in self.session.cookies.get_dict().items():
# cks.append(f'{k}={v}')
# cks.append(f'{k}={v}')
# # resp = requests.post('http://127.0.0.1:59001/akamai/gen', json={
# # resp = requests.post('http://127.0.0.1:59001/akamai/gen', json={
self
.
prox
=
f
'http://user-uni001-region-us-sessid-{random.randint(1000, 5000)}-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
#
self.prox = f'http://user-uni001-region-us-sessid-{random.randint(1000, 5000)}-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# self.prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# self.prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
cks
=
[]
cks
=
[]
for
k
,
v
in
self
.
cookies
.
items
():
for
k
,
v
in
self
.
cookies
.
items
():
...
@@ -259,8 +261,8 @@ class PxBypass():
...
@@ -259,8 +261,8 @@ class PxBypass():
cks
.
append
(
f
'{k}={v}'
)
cks
.
append
(
f
'{k}={v}'
)
print
(
'; '
.
join
(
cks
))
print
(
'; '
.
join
(
cks
))
url
=
'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
url
=
'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
response
=
requests
.
post
(
'http://52.52.23.116/tls/forward'
,
#
response = requests.post('http://52.52.23.116/tls/forward',
#
response = requests.post('http://127.0.0.1:58000/tls/forward',
response
=
requests
.
post
(
'http://127.0.0.1:58000/tls/forward'
,
json
=
dict
(
url
=
url
,
headers
=
{
json
=
dict
(
url
=
url
,
headers
=
{
"authority"
:
"booking.flyfrontier.com"
,
"authority"
:
"booking.flyfrontier.com"
,
"accept"
:
"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"
,
"accept"
:
"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"
,
...
@@ -293,10 +295,11 @@ class PxBypass():
...
@@ -293,10 +295,11 @@ class PxBypass():
def
_step_2
(
self
,
nn
):
def
_step_2
(
self
,
nn
):
self
.
log
.
info
(
self
.
uuid
)
self
.
log
.
info
(
self
.
uuid
)
self
.
log
.
info
(
f
'performanceNow {self.performanceNow}'
)
# sid, vid,ts, num1 ,num2,str1, uuid
# sid, vid,ts, num1 ,num2,str1, uuid
data_str
=
ctxStep2
.
call
(
'genPayload2'
,
self
.
target_url
,
self
.
sid
,
self
.
vid
,
self
.
ts
,
self
.
num1
,
self
.
num2
,
data_str
=
ctxStep2
.
call
(
'genPayload2'
,
self
.
target_url
,
self
.
sid
,
self
.
vid
,
self
.
ts
,
self
.
num1
,
self
.
num2
,
self
.
str1
,
self
.
uuid
,
self
.
str1
,
self
.
uuid
,
self
.
startTs
,
self
.
startTs2
,
self
.
performanceNow
,
nn
)
self
.
startTs
,
self
.
startTs2
,
self
.
performanceNow
,
self
.
px12280
,
nn
)
data
=
json
.
loads
(
data_str
)
data
=
json
.
loads
(
data_str
)
# data_str2 = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
# data_str2 = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
...
@@ -340,10 +343,13 @@ class PxBypass():
...
@@ -340,10 +343,13 @@ class PxBypass():
return
data
return
data
def
_step_3
(
self
):
def
_step_3
(
self
):
self
.
log
.
info
(
f
'performanceNow {self.performanceNow}'
)
# sid, vid,ts, num1 ,num2,str1, uuid
# sid, vid,ts, num1 ,num2,str1, uuid
data_str
=
ctxStep2
.
call
(
'genPayload3'
,
self
.
target_url
,
self
.
sid
,
self
.
vid
,
self
.
ts
,
self
.
num1
,
self
.
num2
,
# genPayload4(url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs2, performanceNow, px11280, n)
self
.
str1
,
self
.
uuid
,
self
.
performanceNow
)
data_str
=
ctxStep2
.
call
(
'genPayload4'
,
self
.
target_url
,
self
.
sid
,
self
.
vid
,
self
.
ts
,
self
.
num1
,
self
.
num2
,
self
.
str1
,
self
.
uuid
,
self
.
startTs
,
self
.
startTs2
,
self
.
performanceNow
,
self
.
px12280
)
self
.
do_collector
(
data_str
)
self
.
do_collector
(
data_str
)
...
@@ -421,9 +427,8 @@ if __name__ == '__main__':
...
@@ -421,9 +427,8 @@ if __name__ == '__main__':
# while True:
# while True:
try
:
try
:
px
=
PxBypass
(
url
)
px
=
PxBypass
(
url
)
t1
=
'[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":2839,"PX12248":3600,"PX11385":1700206931539,"PX12280":1700206931543,"PX11496":"d17e7c10-851c-11ee-8b6a-39050a20a12c","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t1
=
'[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":4769,"PX12248":3600,"PX11385":1700553697276,"PX12280":1700553697286,"PX11496":"31fafcb0-8844-11ee-8d49-97ed9bc8f96f","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t2
=
'31fafcb0-8844-11ee-8d49-97ed9bc8f96f:v8.7.2:317'
t2
=
'd17e7c10-851c-11ee-8b6a-39050a20a12c:v8.7.2:317'
# print(px._gen_pc(t1, t2))
# print(px._gen_pc(t1, t2))
px
.
run
()
px
.
run
()
# except KeyError:
# except KeyError:
...
...
step2.js
View file @
1a18d10e
This diff is collapsed.
Click to expand it.
test_url.py
View file @
1a18d10e
...
@@ -8,7 +8,9 @@ session = tls_client.Session(client_identifier='chrome_112')
...
@@ -8,7 +8,9 @@ session = tls_client.Session(client_identifier='chrome_112')
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
cks
=
'_gcl_au=1.1.2022448120.1700472695; _ga=GA1.1.1937265584.1700472696; _uetsid=99538020878711ee80e79d4a6eaeab61; _uetvid=99537a90878711eeb031fbf9ed72ae51; pxcts=99918b7c-8787-11ee-b232-c7adea99781c; _pxvid=99917e25-8787-11ee-b232-a19e84f82da8; wisepops_visits=
%5
B
%222023
-11-20T09
%3
A31
%3
A35.370Z
%22%5
D; _pin_unauth=dWlkPU5tSXpaR0V4TlRndFpERTNNaTAwTjJZNUxUbG1OalV0WmpSaU5tUXpNbVF3TUdRMg; _px2=eyJ1IjoiOTkwYjY2YTAtODc4Ny0xMWVlLTkyNDMtOTNmMGVhNmM3MTUwIiwidiI6Ijk5OTE3ZTI1LTg3ODctMTFlZS1iMjMyLWExOWU4NGY4MmRhOCIsInQiOjYyMDIzMzg4MDAwNywiaCI6IjU0NzJiYWIxMjg2NjExODM1MjZjZDYzYjEwMGFlNjExNDAyNGZiMTJhNTRiY2VhYjk5NmYyY2Y2NjM4NzU0YjIifQ==; _tt_enable_cookie=1; _ttp=MkrQi_4SujhzWrPe_TAwCaNiXH2; wisepops=
%7
B
%22
csd
%22%3
A1
%2
C
%22
popups
%22%3
A
%7
B
%22429858%22%3
A
%7
B
%22
dc
%22%3
A1
%2
C
%22
d
%22%3
A1700472698738
%7
D
%7
D
%2
C
%22
sub
%22%3
A0
%2
C
%22
ucrn
%22%3
A41
%2
C
%22
cid
%22%3
A
%2278471%22%2
C
%22
v
%22%3
A4
%2
C
%22
bandit
%22%3
A
%7
B
%22
recos
%22%3
A
%7
B
%7
D
%7
D
%7
D; wisepops_session=
%7
B
%22
arrivalOnSite
%22%3
A
%222023
-11-20T09
%3
A31
%3
A35.370Z
%22%2
C
%22
mtime
%22%3
A1700472698739
%2
C
%22
pageviews
%22%3
A1
%2
C
%22
popups
%22%3
A
%7
B
%22429858%22%3
A0
%7
D
%2
C
%22
bars
%22%3
A
%7
B
%7
D
%2
C
%22
sticky
%22%3
A
%7
B
%7
D
%2
C
%22
countdowns
%22%3
A
%7
B
%7
D
%2
C
%22
src
%22%3
Anull
%2
C
%22
utm
%22%3
A
%7
B
%7
D
%2
C
%22
testIp
%22%3
Anull
%7
D; _up=1.2.115365150.1700472700; _ga_P2WLKWBNNW=GS1.1.1700472695.1.0.1700472703.52.0.0'
cks
=
'_pxvid=b61af38b-884d-11ee-a469-53cc9d07f922; pxcts=b61b06e0-884d-11ee-a469-ada452dc5d96; _px2=eyJ1IjoiODAxNDhmOGQtNDhhZi00MTkxLWE3OTctZGJmMWFlNTY3NTQ3IiwidiI6ImI2MWFmMzhiLTg4NGQtMTFlZS1hNDY5LTUzY2M5ZDA3ZjkyMiIsInQiOjE3MDA1NTgwODUxNzgsImgiOiJiY2U2MjhjODk3ODYyYzI3YzQzZWIxNjNiNTVmM2YyYWQ1NDllZGJmMGQ4YjFhMjVjZmIzNDU2YTA2ZDI1ZGZkIn0=; pxcts=b61b06e0-884d-11ee-a469-ada452dc5d96; _px2=eyJ1IjoiODAxNDhmOGQtNDhhZi00MTkxLWE3OTctZGJmMWFlNTY3NTQ3IiwidiI6ImI2MWFmMzhiLTg4NGQtMTFlZS1hNDY5LTUzY2M5ZDA3ZjkyMiIsInQiOjE3MDA1NTgwODUxNzgsImgiOiJiY2U2MjhjODk3ODYyYzI3YzQzZWIxNjNiNTVmM2YyYWQ1NDllZGJmMGQ4YjFhMjVjZmIzNDU2YTA2ZDI1ZGZkIn0='
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment