Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Sign in
Toggle navigation
P
px3
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wangmingming
px3
Commits
c095dbf5
Commit
c095dbf5
authored
Nov 28, 2023
by
wang
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
开始按压验证码
parent
ac890656
Changes
9
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
487 additions
and
94 deletions
+487
-94
index.html
index.html
+3
-3
package-lock.json
package-lock.json
+356
-0
package.json
package.json
+1
-0
captcha.py
src/captcha.py
+1
-1
env_captcha.py
src/env_captcha.py
+64
-36
main.py
src/main.py
+4
-3
src.js
src/src.js
+39
-16
test_search.py
test_search.py
+17
-34
test_url.py
test_url.py
+2
-1
No files found.
index.html
View file @
c095dbf5
...
...
@@ -10,18 +10,18 @@
<body>
<script>
window
.
_pxVid
=
''
;
window
.
_pxUuid
=
'
81da0909-8d01-11ee-a0dc-c1014f687990
'
;
window
.
_pxUuid
=
'
4082bd4f-8d94-11ee-82c3-22aacb22c0fa
'
;
window
.
_pxAppId
=
'PXVb73hTEg'
;
window
.
_pxHostUrl
=
'https://collector-PXVb73hTEg.perimeterx.net'
;
window
.
_pxCustomLogo
=
''
;
window
.
_pxJsClientSrc
=
'//client.perimeterx.net/PXVb73hTEg/main.min.js'
;
window
.
_pxFirstPartyEnabled
=
'false'
;
var
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=
81da0909-8d01-11ee-a0dc-c1014f687990
&v=&m=0'
;
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=
4082bd4f-8d94-11ee-82c3-22aacb22c0fa
&v=&m=0'
;
document
.
head
.
appendChild
(
script
);
script
.
onerror
=
function
()
{
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=
81da0909-8d01-11ee-a0dc-c1014f687990
&v=&m=0'
;
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=
4082bd4f-8d94-11ee-82c3-22aacb22c0fa
&v=&m=0'
;
script
.
onerror
=
window
.
_pxDisplayErrorMessage
;
document
.
head
.
appendChild
(
script
);
};
...
...
package-lock.json
View file @
c095dbf5
This diff is collapsed.
Click to expand it.
package.json
View file @
c095dbf5
...
...
@@ -10,6 +10,7 @@
"license"
:
"
ISC
"
,
"dependencies"
:
{
"
acorn
"
:
"
^8.10.0
"
,
"
body-parser
"
:
"
^1.20.2
"
,
"
crypto-js
"
:
"
^4.2.0
"
,
"
md5
"
:
"
^2.3.0
"
},
...
...
src/captcha.py
View file @
c095dbf5
...
...
@@ -570,4 +570,4 @@ if __name__ == '__main__':
# pass
except
:
traceback
.
print_exc
()
#
time.sleep(1)
time
.
sleep
(
1
)
src/env_captcha.py
View file @
c095dbf5
...
...
@@ -7,10 +7,14 @@ import math
import
random
import
time
from
datetime
import
datetime
from
path
import
getRandomPath
import
execjs
import
requests
from
path
import
getRandomPath
ctx1
=
execjs
.
compile
(
open
(
'./src.js'
,
'r'
)
.
read
())
ctx1
=
execjs
.
compile
(
open
(
'./src.js'
,
'r'
)
.
read
())
def
left_shift
(
based
,
counter
):
# a << 5
...
...
@@ -76,7 +80,7 @@ def randomFloat(a, b):
class
PxEnv
():
def
__init__
(
self
,
url
,
sid
,
vid
,
ts
,
num1
,
num2
,
str1
,
uuid
,
startTs
,
startTs2
,
performanceNow
,
px11280
,
px755
=
''
,
token
=
''
,
token2
=
''
,
hash
=
''
,
hash2
=
''
,
hashv
=
''
):
hash
=
''
,
hash2
=
''
,
hashv
=
''
):
# o1oo11
self
.
hash
=
hash
self
.
hash2
=
hash2
...
...
@@ -145,9 +149,9 @@ class PxEnv():
"PX11883"
:
"a3d12c4"
,
"PX11959"
:
"82002457"
,
"PX12483"
:
"a3d12c4"
,
"PX12477"
:
True
,
"PX11847"
:
True
,
"PX12588"
:
"unknown"
,
"PX12477"
:
True
,
"PX11847"
:
True
,
"PX12588"
:
"unknown"
,
"PX12555"
:
{
"plugext"
:
{
"0"
:
{
...
...
@@ -334,7 +338,7 @@ class PxEnv():
def
get_px11547
(
self
):
px11547_d
=
{
# todo
"PX12492"
:
"
c505c10e26a1b7a7741437db9f82916b
"
,
"PX12492"
:
"
78f763eab3a2082c63c66cf47f9e05a0
"
,
"PX12570"
:
"78f763eab3a2082c63c66cf47f9e05a0"
,
"PX11352"
:
"e089aa3d700a35da7244dd4da7a68f9c"
,
"PX12292"
:
"WebKit"
,
...
...
@@ -606,10 +610,23 @@ class PxEnv():
}
def
get_px561
(
self
):
ctx1
.
call
(
'call_12590_12610'
,
self
.
uuid
,
self
.
hash
,
self
.
hash2
,
self
.
hashv
)
px1132
=
''
px12590
=
''
px12610
=
''
r
=
requests
.
get
(
'http://127.0.0.1:3000'
,
params
=
{
'uuid'
:
self
.
uuid
,
'hash'
:
self
.
hash
,
'hash2'
:
self
.
hash2
,
'hashv'
:
self
.
hashv
,
})
print
(
r
.
json
())
px1132
=
r
.
json
()[
0
]
px12590
=
r
.
json
()[
1
]
px12610
=
r
.
json
()[
2
]
touchX
=
round
(
random
.
randint
(
240
,
293
)
+
random
.
random
(),
2
)
touchScreenX
=
round
(
random
.
randint
(
2668
,
2695
)
+
random
.
random
(),
6
)
touchY
=
round
(
random
.
randint
(
25
,
30
)
+
random
.
random
(),
2
)
touchScreenY
=
round
(
random
.
randint
(
640
,
660
)
+
random
.
random
(),
6
)
downTime
=
random
.
randint
()
return
{
"t"
:
"PX561"
,
"d"
:
{
...
...
@@ -701,33 +718,36 @@ class PxEnv():
"nodeName"
,
"nodeName"
],
"PX11945"
:
273
,
"PX12174"
:
23.89
,
# 按下的点
"PX11945"
:
touchX
,
"PX12174"
:
touchY
,
"PX11882"
:
"pointerdown"
,
"PX11642"
:
2695.99609375
,
"PX11313"
:
645.44921875
,
"PX11772"
:
5787
,
"PX11642"
:
touchScreenX
,
"PX11313"
:
touchScreenY
,
"PX11772"
:
downTime
,
"PX11529"
:
9232191
,
"PX11555"
:
4294705152
,
"PX11833"
:
16707175
,
"PX12024"
:
273.22
,
"PX11759"
:
23.89
,
# 松开的
"PX12024"
:
touchX
,
"PX11759"
:
touchY
,
"PX11896"
:
"pointerup"
,
"PX11633"
:
2696.22265625
,
"PX11445"
:
645.44921875
,
"PX12417"
:
11157
,
"PX11633"
:
round
(
touchScreenX
+
random
.
random
(),
6
)
,
"PX11445"
:
touchScreenY
,
"PX12417"
:
upTime
,
"PX12382"
:
[
5367
],
"PX11360"
:
374
,
"PX11735"
:
True
,
"PX11874"
:
"en-US"
,
"PX12205"
:
self
.
token
,
# todo
"PX11357"
:
5053
,
# todo challengeTime sha256
"PX11360"
:
374
,
"PX12563"
:
"51db060f8b387c240edbcff07da87103e9af772f8533f456663d9a565e0b8274"
,
"PX11321"
:
11171
,
"PX11321"
:
random
.
randint
(
11179
,
12179
)
,
"PX11351"
:
False
,
"PX11919"
:
False
,
"PX11710"
:
False
,
...
...
@@ -754,7 +774,7 @@ class PxEnv():
# createPX1132
"PX1132"
:
px1132
,
"PX12610"
:
px12610
,
"PX12504"
:
11179
,
"PX12504"
:
random
.
randint
(
11179
,
12179
)
,
"PX12547"
:
False
,
"PX11902"
:
5
,
"PX11560"
:
self
.
performanceNow
,
...
...
@@ -768,13 +788,13 @@ class PxEnv():
def
createPX11393
(
self
):
# "-9,-6,2889|-8,-6,2903|-7,-7,2926|-6,-6,2931|-5,-5,2946|-8,-7,2962|-6,-7,2976|-13,-12,3006|-5,-2,3035|-8,-8,3039"
res
=
[]
t
=
random
.
randint
(
2260
,
3360
)
for
i
in
range
(
random
.
randint
(
3
,
10
)):
x
=
random
.
randint
(
-
20
,
-
2
)
y
=
random
.
randint
(
-
20
,
-
2
)
t
=
random
.
randint
(
2260
,
3360
)
for
i
in
range
(
random
.
randint
(
3
,
10
)):
x
=
random
.
randint
(
-
20
,
-
2
)
y
=
random
.
randint
(
-
20
,
-
2
)
res
.
append
(
f
'{x},{y},{t}'
)
t
+=
random
.
randint
(
4
,
8
)
t
+=
random
.
randint
(
4
,
8
)
return
'|'
.
join
(
res
)
def
createPX11698
(
self
,
all
=
False
):
...
...
@@ -786,11 +806,11 @@ class PxEnv():
# "774,557,3732"
# "756,543,3792"
# ]
lens
=
len
(
self
.
mouses
)
if
all
else
random
.
randint
(
3
,
5
)
t
=
random
.
randint
(
3260
,
3560
)
lens
=
len
(
self
.
mouses
)
if
all
else
random
.
randint
(
3
,
5
)
t
=
random
.
randint
(
3260
,
3560
)
res
=
[]
for
i
in
self
.
mouses
[:
lens
]:
x
,
y
=
i
x
,
y
=
i
res
.
append
(
f
'{x},{y},{t}'
)
t
+=
random
.
randint
(
25
,
45
)
...
...
@@ -810,6 +830,7 @@ class PxEnv():
if
__name__
==
'__main__'
:
a2
=
"WQcHBwdZFAsEAV0OWFobCxwGAVhZX14LWVgPFhYWFgdZWQdZWQcHFFBdWF4KDVENRVAMWFlFWVkNDUUJCgwJRV4LCVBQX1xQC1xQCxQcGh0NFhYWFllZB1lZWRRQW11bDltZCV5ZX1xaXl9eCQtYDl1RW1pRDl5cDl5QXw4LW1FfClgLXwxQWVtbDFBeX11RXFlfCVsKClkNUF9eFhYWFgdZWVkHBwcHFF9aX1kWFhYWWVlZBwdZFAsLFF5YFD1aLhwyPiYYDC89UTwvLlwnH1VVFhYWFgdZWVkHBwdZFFlfWFlYX1xQWV5ZXlgWFhYWWVlZB1kHFFlbWFFcXFFaWl5ZXF1ZUVxYWl9ZFhYWFlkHWQcHWRQLCwtSWBYWFhZZWVkHB1kUDhgUXlgUWRYWFhYHWQcHWQcUUF1YXgkJXQ1FUAxYWUVZWQ0NRQkKDAlFWlpdDFENDlxaC1xYFFtZXVteWFhYFBwaHQ0WFhYWB1kHB1lZFFkUXQ5bClBfDFBRWFFZWVkKCQ5YXVlfXw4NCgsLDA5dWFFbUVxcXgxRWAkNWVoKWwxZDgkNCg5RDAsKWF8LXBRRWVEMWV1RXlhcWV1aCg5eDlteCl1cCl8LC18KDlxeCQpaCVtYW1BRUFlfXV9dXlAKClpcUVhbCgsOCQpfXQpfFFlaFA4JBBsNFhYWFllZBwdZBxRZFFBdWAleCVhYRVAMWFlFWVkNDUUJCwkMRV1dUFAKW1hfC1gMCxRQWllYFApaW1hcXwlRDQsKDA0KWAleDlgLUFtfC1kKCQ4NXVxYDVBbXFheXFgJWFwJW1xaCVwLWAkKXVxdXllaClFfUVFdXQpfC18OCQxYDVpZXwlcWlAJXVtaDF9fXVpYC11dCgtbXw5RXF4KCV5aDVkNC1heWQtQC14KDFwMClBcX15cN1dSVlMUWBQmKRYWFhYHWVkHWVkUUF1YXgpQCg1FUAxYWUVZWQ0NRQkKDAlFXgsJUFBfXFALXFALFhYWFllZWQcHWRQaDhReWBRZFhYWFgdZB1lZWRQLHQ=="
a2
=
'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'
b2
=
base64
.
b64decode
(
a2
.
encode
())
for
i
in
bytes
(
encrypt
(
b2
,
872
%
128
))
.
decode
()
.
split
(
'~~~~'
):
print
(
'o11o111o'
in
i
,
i
)
...
...
@@ -818,6 +839,13 @@ if __name__ == '__main__':
px755
=
tmp
[
2
]
token
=
tmp
[
4
]
.
split
(
'_'
)[
0
]
token2
=
tmp
[
4
]
.
split
(
'_'
)[
1
]
if
tmp
[
0
]
==
'o1oo11'
:
# "o1oo11|1|22b0f3c54180124fd02b1bcce129b9992f252bc858988104f0632a9640099
# |5393fe46579bdd80d081f53b9bb41917d06401059d4db662cafd3aa36748aa2b
# |12|false"
hash
=
tmp
[
2
]
hash2
=
tmp
[
3
]
hashv
=
tmp
[
4
]
if
tmp
[
0
]
==
'o111ooo1'
:
ts
=
tmp
[
1
]
if
tmp
[
0
]
==
'o111oooo'
:
...
...
@@ -836,12 +864,12 @@ if __name__ == '__main__':
cs
=
tmp
[
1
]
if
tmp
[
0
]
==
'o11o11oo'
:
cts
=
tmp
[
1
]
uuid
=
'
81da0909-8d01-11ee-a0dc-c1014f687990
'
uuid
=
'
4082bd4f-8d94-11ee-82c3-22aacb22c0fa
'
px
=
PxEnv
(
'https://www.flyfrontier.com/'
,
sid
,
vid
,
ts
,
num1
,
num2
,
str1
,
uuid
,
1700552863875
,
1700464712550
,
1700552863903
,
1700552863903
,
px755
=
px755
,
token
=
token
,
token2
=
token2
)
print
(
json
.
dumps
(
px
.
get_px12419
()))
,
1700552863903
,
1700552863903
,
px755
=
px755
,
token
=
token
,
token2
=
token2
,
hash
=
hash
,
hash2
=
hash2
,
hashv
=
hashv
)
print
(
json
.
dumps
(
px
.
get_px561
()))
print
(
json
.
dumps
([
px
.
get_px11590
()]))
src/main.py
View file @
c095dbf5
...
...
@@ -94,7 +94,7 @@ class PxBypass():
prox
=
'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# prox = 'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
#
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://127.0.0.1:7890'
self
.
session
.
proxies
=
{
'http'
:
prox
,
...
...
@@ -343,7 +343,7 @@ class PxBypass():
print
(
'; '
.
join
(
cks
))
url
=
'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
response
=
requests
.
post
(
'http://52.52.23.116/tls/forward'
,
# response = requests.post('http://127.0.0.1:58000/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
json
=
dict
(
url
=
url
,
headers
=
{
"authority"
:
"booking.flyfrontier.com"
,
"accept"
:
"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"
,
...
...
@@ -363,6 +363,7 @@ class PxBypass():
},
method
=
"GET"
,
proxy
=
self
.
prox
,
debug
=
True
# ,allow_redirects=True
))
response
=
response
.
json
()
print
(
response
)
...
...
@@ -372,7 +373,7 @@ class PxBypass():
with
open
(
'index.html'
,
'w'
)
as
f
:
f
.
write
(
response
[
'text'
])
print
(
response
[
'status_code'
])
if
response
[
'status_code'
]
==
302
:
if
response
[
'status_code'
]
!=
403
:
self
.
add_header
()
def
_step_2
(
self
,
nn
):
...
...
src/src.js
View file @
c095dbf5
...
...
@@ -690,6 +690,9 @@ function Ie() {
return
u
;
},
t
[
"wbg"
][
"__wbg_get_e6ae480a4b8df368"
]
=
function
(
r
,
u
,
v
)
{
var
n
=
o
(
r
)[
d
(
u
,
v
)];
if
(
d
(
u
,
v
)
===
'_pxUuid'
){
n
=
window
.
_pxUuid
}
return
y
(
n
)
?
0
:
P
(
n
);
},
t
[
"wbg"
][
"__wbg_crypto_c48a774b022d20ac"
]
=
function
(
r
)
{
var
u
=
v
;
...
...
@@ -993,27 +996,47 @@ function createPX1132(hash, hash2, hashv) {
// }, 300)
function
call_12590_12610
(
uuid
,
hash
,
hash2
,
hashv
)
{
console
.
log
(
uuid
,
hash
,
hash2
,
hashv
)
_pxUuid
=
uuid
window
.
_pxUuid
=
uuid
var
u
=
createPX1132
(
hash
,
hash2
,
hashv
)
var
res
=
undefined
console
.
log
(
res
)
var
id
=
setInterval
(
function
()
{
try
{
res
=
[
u
,
Ce
.
a
(),
Ce
.
b
(
u
)]
clearInterval
(
id
)
return
res
}
catch
(
e
)
{
}
},
100
)
while
(
!
res
){
console
.
log
(
res
)
}
//
var res = undefined
//
console.log(res)
//
var id = setInterval(function () {
//
try {
//
res = [u, Ce.a(), Ce.b(u)]
//
clearInterval(id)
//
return res
//
} catch (e) {
//
}
//
}, 100)
//
while (!res){
//
console.log(res)
//
}
return
res
//
return res
// return [u,Ce.a(), Ce.b(u)]
return
JSON
.
stringify
([
u
,
Ce
.
a
(),
Ce
.
b
(
u
)])
}
console
.
log
(
call_12590_12610
(
'79a192f9-8d13-11ee-8468-c5b80e39512d'
,
'dbab1d29712830bb280868d05bb0c2b96bf116192a0d66a468fab254999c3'
,
'd81cb335323dec439f94b1601b95c7679dd405cf4ac044e57ddc79c953e6cff3'
,
'12'
))
\ No newline at end of file
// console.log(call_12590_12610('79a192f9-8d13-11ee-8468-c5b80e39512d', 'dbab1d29712830bb280868d05bb0c2b96bf116192a0d66a468fab254999c3', 'd81cb335323dec439f94b1601b95c7679dd405cf4ac044e57ddc79c953e6cff3', '12'))
// nodejs 启动http 服务
const
http
=
require
(
'http'
);
const
url
=
require
(
'url'
);
const
server
=
http
.
createServer
((
req
,
res
)
=>
{
res
.
statusCode
=
200
;
var
params
=
url
.
parse
(
req
.
url
,
true
).
query
;
let
uuid
=
params
.
uuid
;
let
hash
=
params
.
hash
;
let
hash2
=
params
.
hash2
;
let
hashv
=
params
.
hashv
;
res
.
end
(
call_12590_12610
(
uuid
,
hash
,
hash2
,
hashv
));
});
server
.
listen
(
3000
,
()
=>
{
console
.
log
(
'Server running at http://localhost:3000/'
);
});
test_search.py
View file @
c095dbf5
from
urllib.parse
import
quote
import
requests
import
tls_client
session
=
tls_client
.
Session
(
client_identifier
=
'chrome_117'
)
headers
=
{
"authority"
:
"booking.flyfrontier.com"
,
"accept"
:
"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"
,
"accept-language"
:
"en-US,en;q=0.9"
,
"cache-control"
:
"no-cache"
,
"pragma"
:
"no-cache"
,
"sec-ch-ua"
:
"
\"
Google Chrome
\"
;v=
\"
117
\"
,
\"
Not;A=Brand
\"
;v=
\"
8
\"
,
\"
Chromium
\"
;v=
\"
117
\"
"
,
"sec-ch-ua-mobile"
:
"?0"
,
"sec-ch-ua-platform"
:
"
\"
macOS
\"
"
,
"sec-fetch-dest"
:
"document"
,
"sec-fetch-mode"
:
"navigate"
,
"sec-fetch-site"
:
"none"
,
"sec-fetch-user"
:
"?1"
,
"upgrade-insecure-requests"
:
"1"
,
"user-agent"
:
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36"
}
cookies
=
{
'ASP.NET_SessionId'
:
'gm0ekqtq4ufxeanlhzko1wuy'
,
'_px2'
:
'eyJ1IjoiODA4ZGMyMWYtM2QwZS00MTNmLWJlNjItODYwOTAzMDVjOWQwIiwidiI6ImZlMjE1MTcyLTg4NTktMTFlZS1iYWVkLTgwY2VmNjkxM2JlNiIsInQiOjE3MDA1NjMzNTk4OTcsImgiOiIxOTk3YWIwZDFjNzIzY2NiNzNmYzVhNzc4NjJhNDI1NGMzYzA2MGE4OGQwODAxNTdiM2M2MDMxMDA0NzAwZWQ3In0='
,
'_pxhd'
:
'a25465aaeb919f0cef210e033d7bf3763515e8e1b3da1b1962a63ab49d5a004b:fe215172-8859-11ee-baed-80cef6913be6'
,
'_pxvid'
:
'fe215172-8859-11ee-baed-80cef6913be6'
,
'dotrez'
:
'!GXhq2g0adhQDRzOTrUml75WCHShI8dKmhwO24zsWlZZIxIKy7MWb0nhRo58w4mxSC02yjCwSgSt4TwU='
,
'pxcts'
:
'fe216239-8859-11ee-baed-d5b6a8e05d7b'
}
headers
=
{
"authority"
:
"booking.flyfrontier.com"
,
"accept-language"
:
"en-US,en;q=0.9"
,
"sec-ch-ua"
:
"
\"
Google Chrome
\"
;v=
\"
117
\"
,
\"
Not;A=Brand
\"
;v=
\"
8
\"
,
\"
Chromium
\"
;v=
\"
117
\"
"
,
"sec-fetch-user"
:
"?1"
,
"upgrade-insecure-requests"
:
"1"
,
"cookie"
:
"pxcts=e7eaeb42-8d9a-11ee-b677-5a4cf97d8a4d; _px2=eyJ1IjoiZTdiNzE3NDAtOGQ5YS0xMWVlLTkxNWEtMjJkZTZmNjFhOTk1IiwidiI6ImU3YTliYjI4LThkOWEtMTFlZS04MTI2LWQwYWYxNzUyODI5NyIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjVmODRiMDc4OTFiOWM3ZTQ2OWM2MmJjZjc4NzI1NmZhNjNhODMwMTIzMzczNDk0NGNjNDY2YmIxNGU5ZDAwMzQifQ==; _pxvid=e7a9bb28-8d9a-11ee-8126-d0af17528297; _px2=eyJ1IjoiZTdiNzE3NDAtOGQ5YS0xMWVlLTkxNWEtMjJkZTZmNjFhOTk1IiwidiI6ImU3YTliYjI4LThkOWEtMTFlZS04MTI2LWQwYWYxNzUyODI5NyIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjVmODRiMDc4OTFiOWM3ZTQ2OWM2MmJjZjc4NzI1NmZhNjNhODMwMTIzMzczNDk0NGNjNDY2YmIxNGU5ZDAwMzQifQ==; pxcts=e7eaeb42-8d9a-11ee-b677-5a4cf97d8a4d; _pxhd=12d4b5dcbc5ace0ae7e1fdb84439a7b7dbe1dce363eefefda1c3c8ffee5f1abd:e7a9bb28-8d9a-11ee-8126-d0af17528297"
,
"cache-control"
:
"no-cache"
,
"sec-ch-ua-mobile"
:
"?0"
,
"sec-ch-ua-platform"
:
"
\"
macOS
\"
"
,
"sec-fetch-dest"
:
"document"
,
"sec-fetch-site"
:
"none"
,
"accept"
:
"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"
,
"pragma"
:
"no-cache"
,
"sec-fetch-mode"
:
"navigate"
,
"user-agent"
:
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36"
}
url
=
"https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true"
cks
=
[]
for
k
,
v
in
cookies
.
items
():
cks
.
append
(
f
'{k}={quote(v)}'
)
headers
[
'cookie'
]
=
'; '
.
join
(
cks
)
#
cks = []
#
for k, v in cookies.items():
#
cks.append(f'{k}={quote(v)}')
#
headers['cookie'] = '; '.join(cks)
# headers['cookie'] = '_gcl_au=1.1.844575581.1700477194; _ga=GA1.1.705703545.1700477194; _pxvid=128f1e30-8792-11ee-b443-7061c4ff223f; pxcts=128f28dc-8792-11ee-b443-4e8857f971f4; _uetsid=129d89b0879211ee977771ce32cb65b6; _uetvid=129db280879211ee860d19abd0f03584; wisepops_visits=%5B%222023-11-20T10%3A46%3A33.550Z%22%5D; _tt_enable_cookie=1; _ttp=SUWxt4jqEaMrt1QTUoALn84Sjv4; _pin_unauth=dWlkPU5USXhPREF3WXpndE5qRTBOaTAwTW1aaUxUZ3hNR0V0Wm1NM05tRmxaalJtTTJVMg; _up=1.2.1708435651.1700477197; ORA_FPC=id=c98a5e29-4762-4b94-8d64-abd94c3da5d9; WTPERSIST=; wisepops=%7B%22csd%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A%7B%22dc%22%3A1%2C%22d%22%3A1700477197690%7D%7D%2C%22sub%22%3A0%2C%22ucrn%22%3A36%2C%22cid%22%3A%2278471%22%2C%22v%22%3A4%2C%22bandit%22%3A%7B%22recos%22%3A%7B%7D%7D%7D; wisepops_session=%7B%22arrivalOnSite%22%3A%222023-11-20T10%3A46%3A33.550Z%22%2C%22mtime%22%3A1700477197690%2C%22pageviews%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A0%7D%2C%22bars%22%3A%7B%7D%2C%22sticky%22%3A%7B%7D%2C%22countdowns%22%3A%7B%7D%2C%22src%22%3Anull%2C%22utm%22%3A%7B%7D%2C%22testIp%22%3Anull%7D; _px2=eyJ1IjoiMTIzNzQwZDAtODc5Mi0xMWVlLWI5MDYtMTc3Y2I5NjUwMjE0IiwidiI6IjEyOGYxZTMwLTg3OTItMTFlZS1iNDQzLTcwNjFjNGZmMjIzZiIsInQiOjE3MDA0Nzc3NjA1MjcsImgiOiI0YWU4NDRjZTgyYmQ0ZWVhYmEzMjkyZjdiYTRhMWE2YzA2M2M4ZTA0YmQ3NzU2MTRiNWY5ZTcyNWY2MzA0MTRkIn0=; _ga_P2WLKWBNNW=GS1.1.1700477193.1.1.1700477480.58.0.0'
prox
=
'http://user-uni001-region-us-sessid-111
5
-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox
=
'http://user-uni001-region-us-sessid-111
4
-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# prox = 'http://127.0.0.1:7890'
response
=
requests
.
post
(
'http://52.52.23.116/tls/forward'
,
# response = requests.post('http://127.0.0.1:58000/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
json
=
dict
(
url
=
url
,
method
=
"GET"
,
proxy
=
prox
,
headers
=
headers
,
debug
=
True
)
)
# response = session.post(url, headers=h, data=data, proxy={
...
...
@@ -54,5 +39,3 @@ response = requests.post('http://52.52.23.116/tls/forward',
print
(
response
.
json
()[
'status_code'
])
print
(
response
.
json
()[
'text'
])
# 冒泡排序
test_url.py
View file @
c095dbf5
...
...
@@ -9,7 +9,8 @@ session = tls_client.Session(client_identifier='chrome_112')
prox
=
f
'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
cks
=
(
'_px2=eyJ1IjoiOGRjYjQ3NjAt1ODljYi011xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
)
cks
=
'_px2=eyJ1IjoiOGRjYjQ3NjAt1ODljYi011xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment