Commit c095dbf5 authored by wang's avatar wang

开始按压验证码

parent ac890656
......@@ -10,18 +10,18 @@
<body>
<script>
window._pxVid = '';
window._pxUuid = '81da0909-8d01-11ee-a0dc-c1014f687990';
window._pxUuid = '4082bd4f-8d94-11ee-82c3-22aacb22c0fa';
window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=81da0909-8d01-11ee-a0dc-c1014f687990&v=&m=0';
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=4082bd4f-8d94-11ee-82c3-22aacb22c0fa&v=&m=0';
document.head.appendChild(script);
script.onerror = function () {
script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=81da0909-8d01-11ee-a0dc-c1014f687990&v=&m=0';
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=4082bd4f-8d94-11ee-82c3-22aacb22c0fa&v=&m=0';
script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script);
};
......
This diff is collapsed.
......@@ -10,6 +10,7 @@
"license": "ISC",
"dependencies": {
"acorn": "^8.10.0",
"body-parser": "^1.20.2",
"crypto-js": "^4.2.0",
"md5": "^2.3.0"
},
......
......@@ -570,4 +570,4 @@ if __name__ == '__main__':
# pass
except:
traceback.print_exc()
# time.sleep(1)
time.sleep(1)
......@@ -7,10 +7,14 @@ import math
import random
import time
from datetime import datetime
from path import getRandomPath
import execjs
import requests
from path import getRandomPath
ctx1 = execjs.compile(open('./src.js', 'r').read())
ctx1 = execjs.compile(open('./src.js','r').read())
def left_shift(based, counter):
# a << 5
......@@ -76,7 +80,7 @@ def randomFloat(a, b):
class PxEnv():
def __init__(self, url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs2, performanceNow, px11280,
px755='', token='', token2='',
hash='',hash2='',hashv=''):
hash='', hash2='', hashv=''):
# o1oo11
self.hash = hash
self.hash2 = hash2
......@@ -145,9 +149,9 @@ class PxEnv():
"PX11883": "a3d12c4",
"PX11959": "82002457",
"PX12483": "a3d12c4",
"PX12477":True,
"PX11847":True,
"PX12588":"unknown",
"PX12477": True,
"PX11847": True,
"PX12588": "unknown",
"PX12555": {
"plugext": {
"0": {
......@@ -334,7 +338,7 @@ class PxEnv():
def get_px11547(self):
px11547_d = {
# todo
"PX12492": "c505c10e26a1b7a7741437db9f82916b",
"PX12492": "78f763eab3a2082c63c66cf47f9e05a0",
"PX12570": "78f763eab3a2082c63c66cf47f9e05a0",
"PX11352": "e089aa3d700a35da7244dd4da7a68f9c",
"PX12292": "WebKit",
......@@ -606,10 +610,23 @@ class PxEnv():
}
def get_px561(self):
ctx1.call('call_12590_12610',self.uuid, self.hash, self.hash2, self.hashv)
px1132 = ''
px12590 = ''
px12610 = ''
r = requests.get('http://127.0.0.1:3000', params={
'uuid': self.uuid,
'hash': self.hash,
'hash2': self.hash2,
'hashv': self.hashv,
})
print(r.json())
px1132 = r.json()[0]
px12590 = r.json()[1]
px12610 = r.json()[2]
touchX = round(random.randint(240, 293) + random.random(), 2)
touchScreenX = round(random.randint(2668, 2695) + random.random(), 6)
touchY = round(random.randint(25, 30) + random.random(), 2)
touchScreenY = round(random.randint(640, 660) + random.random(), 6)
downTime = random.randint()
return {
"t": "PX561",
"d": {
......@@ -701,33 +718,36 @@ class PxEnv():
"nodeName",
"nodeName"
],
"PX11945": 273,
"PX12174": 23.89,
# 按下的点
"PX11945": touchX,
"PX12174": touchY,
"PX11882": "pointerdown",
"PX11642": 2695.99609375,
"PX11313": 645.44921875,
"PX11772": 5787,
"PX11642": touchScreenX,
"PX11313": touchScreenY,
"PX11772": downTime,
"PX11529": 9232191,
"PX11555": 4294705152,
"PX11833": 16707175,
"PX12024": 273.22,
"PX11759": 23.89,
# 松开的
"PX12024": touchX,
"PX11759": touchY,
"PX11896": "pointerup",
"PX11633": 2696.22265625,
"PX11445": 645.44921875,
"PX12417": 11157,
"PX11633": round(touchScreenX + random.random(), 6),
"PX11445": touchScreenY,
"PX12417": upTime,
"PX12382": [
5367
],
"PX11360": 374,
"PX11735": True,
"PX11874": "en-US",
"PX12205": self.token,
# todo
"PX11357": 5053,
# todo challengeTime sha256
"PX11360": 374,
"PX12563": "51db060f8b387c240edbcff07da87103e9af772f8533f456663d9a565e0b8274",
"PX11321": 11171,
"PX11321": random.randint(11179, 12179),
"PX11351": False,
"PX11919": False,
"PX11710": False,
......@@ -754,7 +774,7 @@ class PxEnv():
# createPX1132
"PX1132": px1132,
"PX12610": px12610,
"PX12504": 11179,
"PX12504": random.randint(11179, 12179),
"PX12547": False,
"PX11902": 5,
"PX11560": self.performanceNow,
......@@ -768,13 +788,13 @@ class PxEnv():
def createPX11393(self):
# "-9,-6,2889|-8,-6,2903|-7,-7,2926|-6,-6,2931|-5,-5,2946|-8,-7,2962|-6,-7,2976|-13,-12,3006|-5,-2,3035|-8,-8,3039"
res = []
t = random.randint(2260,3360)
for i in range(random.randint(3,10)):
x = random.randint(-20,-2)
y = random.randint(-20,-2)
t = random.randint(2260, 3360)
for i in range(random.randint(3, 10)):
x = random.randint(-20, -2)
y = random.randint(-20, -2)
res.append(f'{x},{y},{t}')
t += random.randint(4,8)
t += random.randint(4, 8)
return '|'.join(res)
def createPX11698(self, all=False):
......@@ -786,11 +806,11 @@ class PxEnv():
# "774,557,3732"
# "756,543,3792"
# ]
lens = len(self.mouses)if all else random.randint(3,5)
t = random.randint(3260,3560)
lens = len(self.mouses) if all else random.randint(3, 5)
t = random.randint(3260, 3560)
res = []
for i in self.mouses[:lens]:
x,y = i
x, y = i
res.append(f'{x},{y},{t}')
t += random.randint(25, 45)
......@@ -810,6 +830,7 @@ class PxEnv():
if __name__ == '__main__':
a2 = "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"
a2 = 'B1lZWQcHB1kUWV9YWVlbX1BdXFhYXBYWFhZZWVkHWQcUXlFQX19YWV9dUF9aXl5fXF9fX14WFhYWB1kHWVlZFAsdFhYWFllZWQcHWRQOGBReWBRZFhYWFgdZBwdZWRRZFA0NWg5cDQpZDVBYX1sMDlwOWA5eXlsNWQpaXFANCVANDF8OXVtbX1hQXgpZDV9QDlsMXl9fXglRDVpQWQ4UCVBaWF1eXVwJXlBbDFAKWVpQW15dWg5ZX1AMXlhZCVhcDlBfUVwMCwpfXgleWVsOWl9cDlheCQtQC1oLWl4OWBRZWhQOCQQbDRYWFhZZWVkHB1kUCwsUXlgUPVouHDI+JhgMLz1RPC8uXCcfVVUWFhYWB1kHB1kHFFxRW1sLUFhYRVAMUVxFWVkNDUVQW1xdRV5aCw5eWl8LDA0MXhRbWV1bXlhYWBQcGh0NFhYWFllZWQcHWRQaDhReWBRZFhYWFgdZWVkHBwcHFF1cXhYWFhZZB1kHB1kUCwsLUlgWFhYWWVkHWVlZFFsJX1gJWF8KCVtaWg1bWAxZCV8KCQ1cXgxaXF9fX1BRCV8JUVEMCV0NX1xfDF9RXlhYDQ1QWgoNXVpaWVhYCg4WFhYWB1lZB1lZBwcUXAlQW10MWFBFUAxRXEVZWQ0NRQoOCQxFCQxeWVsNCgleW19YFBwaHQ0WFhYWB1lZB1lZFFwJUFtdX1xfRVAMUVxFWVkNDUUKDgkMRQkMXllbDQoJXltfWBYWFhZZBwcHB1kUCwQBAxoOCloJGwIBWFldBwYbDFgWFhYWWVkHB1kHFFkUXAlQXlgOXFhFUAxRXEVZWQ0NRVFRXFhFCwwMXg1aC10JCwlcFF5QXVwUXV5ZXl0JWFAODl0NDgxaCQkLUVFRW1EJX19QXVoLXgpaWlxRXgtYXFgLW1gNUF9fWQwMWV1fDAxQUVFQXQoKC1FZXl5ZWgpdWVFfCgtbDg0MXVgMUFEKCloMXFkNDFEOC1kLDA0KDl5ZDlBQDVlcDVFRDFpYX1FbWgtbWVoKDQw3V1tTVBRYFCYp'
b2 = base64.b64decode(a2.encode())
for i in bytes(encrypt(b2, 872 % 128)).decode().split('~~~~'):
print('o11o111o' in i, i)
......@@ -818,6 +839,13 @@ if __name__ == '__main__':
px755 = tmp[2]
token = tmp[4].split('_')[0]
token2 = tmp[4].split('_')[1]
if tmp[0] == 'o1oo11':
# "o1oo11|1|22b0f3c54180124fd02b1bcce129b9992f252bc858988104f0632a9640099
# |5393fe46579bdd80d081f53b9bb41917d06401059d4db662cafd3aa36748aa2b
# |12|false"
hash = tmp[2]
hash2 = tmp[3]
hashv = tmp[4]
if tmp[0] == 'o111ooo1':
ts = tmp[1]
if tmp[0] == 'o111oooo':
......@@ -836,12 +864,12 @@ if __name__ == '__main__':
cs = tmp[1]
if tmp[0] == 'o11o11oo':
cts = tmp[1]
uuid = '81da0909-8d01-11ee-a0dc-c1014f687990'
uuid = '4082bd4f-8d94-11ee-82c3-22aacb22c0fa'
px = PxEnv('https://www.flyfrontier.com/',
sid, vid, ts, num1, num2, str1, uuid
, 1700552863875, 1700464712550
, 1700552863903, 1700552863903, px755=px755, token=token,token2=token2)
print(json.dumps(px.get_px12419()))
, 1700552863903, 1700552863903, px755=px755, token=token, token2=token2, hash=hash, hash2=hash2,
hashv=hashv)
print(json.dumps(px.get_px561()))
print(json.dumps([px.get_px11590()]))
......@@ -94,7 +94,7 @@ class PxBypass():
prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# prox = 'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://127.0.0.1:7890'
self.session.proxies = {
'http': prox,
......@@ -343,7 +343,7 @@ class PxBypass():
print('; '.join(cks))
url = 'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
response = requests.post('http://52.52.23.116/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
json=dict(url=url, headers={
"authority": "booking.flyfrontier.com",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
......@@ -363,6 +363,7 @@ class PxBypass():
}, method="GET", proxy=self.prox,
debug=True
# ,allow_redirects=True
))
response = response.json()
print(response)
......@@ -372,7 +373,7 @@ class PxBypass():
with open('index.html', 'w') as f:
f.write(response['text'])
print(response['status_code'])
if response['status_code'] == 302:
if response['status_code'] != 403:
self.add_header()
def _step_2(self, nn):
......
......@@ -690,6 +690,9 @@ function Ie() {
return u;
}, t["wbg"]["__wbg_get_e6ae480a4b8df368"] = function (r, u, v) {
var n = o(r)[d(u, v)];
if (d(u, v) === '_pxUuid'){
n = window._pxUuid
}
return y(n) ? 0 : P(n);
}, t["wbg"]["__wbg_crypto_c48a774b022d20ac"] = function (r) {
var u = v;
......@@ -993,27 +996,47 @@ function createPX1132(hash, hash2, hashv) {
// }, 300)
function call_12590_12610(uuid, hash, hash2, hashv) {
console.log(uuid, hash, hash2, hashv)
_pxUuid = uuid
window._pxUuid = uuid
var u = createPX1132(hash, hash2, hashv)
var res = undefined
console.log(res)
var id = setInterval(function () {
try {
res = [u, Ce.a(), Ce.b(u)]
clearInterval(id)
return res
} catch (e) {
}
}, 100)
while (!res){
console.log(res)
}
// var res = undefined
// console.log(res)
// var id = setInterval(function () {
// try {
// res = [u, Ce.a(), Ce.b(u)]
// clearInterval(id)
// return res
// } catch (e) {
// }
// }, 100)
// while (!res){
// console.log(res)
// }
return res
// return res
// return [u,Ce.a(), Ce.b(u)]
return JSON.stringify([u,Ce.a(), Ce.b(u)])
}
console.log(call_12590_12610('79a192f9-8d13-11ee-8468-c5b80e39512d', 'dbab1d29712830bb280868d05bb0c2b96bf116192a0d66a468fab254999c3', 'd81cb335323dec439f94b1601b95c7679dd405cf4ac044e57ddc79c953e6cff3', '12'))
\ No newline at end of file
// console.log(call_12590_12610('79a192f9-8d13-11ee-8468-c5b80e39512d', 'dbab1d29712830bb280868d05bb0c2b96bf116192a0d66a468fab254999c3', 'd81cb335323dec439f94b1601b95c7679dd405cf4ac044e57ddc79c953e6cff3', '12'))
// nodejs 启动http 服务
const http = require('http');
const url = require('url');
const server = http.createServer((req, res) => {
res.statusCode = 200;
var params = url.parse(req.url, true).query;
let uuid = params.uuid;
let hash = params.hash;
let hash2 = params.hash2;
let hashv = params.hashv;
res.end(call_12590_12610(uuid, hash, hash2, hashv));
});
server.listen(3000, () => {
console.log('Server running at http://localhost:3000/');
});
from urllib.parse import quote
import requests
import tls_client
session = tls_client.Session(client_identifier='chrome_117')
headers = {
"authority": "booking.flyfrontier.com",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
"accept-language": "en-US,en;q=0.9",
"cache-control": "no-cache",
"pragma": "no-cache",
"sec-ch-ua": "\"Google Chrome\";v=\"117\", \"Not;A=Brand\";v=\"8\", \"Chromium\";v=\"117\"",
"sec-ch-ua-mobile": "?0",
"sec-ch-ua-platform": "\"macOS\"",
"sec-fetch-dest": "document",
"sec-fetch-mode": "navigate",
"sec-fetch-site": "none",
"sec-fetch-user": "?1",
"upgrade-insecure-requests": "1",
"user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36"
}
cookies = {
'ASP.NET_SessionId': 'gm0ekqtq4ufxeanlhzko1wuy',
'_px2': 'eyJ1IjoiODA4ZGMyMWYtM2QwZS00MTNmLWJlNjItODYwOTAzMDVjOWQwIiwidiI6ImZlMjE1MTcyLTg4NTktMTFlZS1iYWVkLTgwY2VmNjkxM2JlNiIsInQiOjE3MDA1NjMzNTk4OTcsImgiOiIxOTk3YWIwZDFjNzIzY2NiNzNmYzVhNzc4NjJhNDI1NGMzYzA2MGE4OGQwODAxNTdiM2M2MDMxMDA0NzAwZWQ3In0=',
'_pxhd': 'a25465aaeb919f0cef210e033d7bf3763515e8e1b3da1b1962a63ab49d5a004b:fe215172-8859-11ee-baed-80cef6913be6',
'_pxvid': 'fe215172-8859-11ee-baed-80cef6913be6',
'dotrez': '!GXhq2g0adhQDRzOTrUml75WCHShI8dKmhwO24zsWlZZIxIKy7MWb0nhRo58w4mxSC02yjCwSgSt4TwU=',
'pxcts': 'fe216239-8859-11ee-baed-d5b6a8e05d7b'
}
headers = {"authority": "booking.flyfrontier.com", "accept-language": "en-US,en;q=0.9",
"sec-ch-ua": "\"Google Chrome\";v=\"117\", \"Not;A=Brand\";v=\"8\", \"Chromium\";v=\"117\"",
"sec-fetch-user": "?1", "upgrade-insecure-requests": "1",
"cookie": "pxcts=e7eaeb42-8d9a-11ee-b677-5a4cf97d8a4d; _px2=eyJ1IjoiZTdiNzE3NDAtOGQ5YS0xMWVlLTkxNWEtMjJkZTZmNjFhOTk1IiwidiI6ImU3YTliYjI4LThkOWEtMTFlZS04MTI2LWQwYWYxNzUyODI5NyIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjVmODRiMDc4OTFiOWM3ZTQ2OWM2MmJjZjc4NzI1NmZhNjNhODMwMTIzMzczNDk0NGNjNDY2YmIxNGU5ZDAwMzQifQ==; _pxvid=e7a9bb28-8d9a-11ee-8126-d0af17528297; _px2=eyJ1IjoiZTdiNzE3NDAtOGQ5YS0xMWVlLTkxNWEtMjJkZTZmNjFhOTk1IiwidiI6ImU3YTliYjI4LThkOWEtMTFlZS04MTI2LWQwYWYxNzUyODI5NyIsInQiOjYyMDIzMzg4MDAwNCwiaCI6IjVmODRiMDc4OTFiOWM3ZTQ2OWM2MmJjZjc4NzI1NmZhNjNhODMwMTIzMzczNDk0NGNjNDY2YmIxNGU5ZDAwMzQifQ==; pxcts=e7eaeb42-8d9a-11ee-b677-5a4cf97d8a4d; _pxhd=12d4b5dcbc5ace0ae7e1fdb84439a7b7dbe1dce363eefefda1c3c8ffee5f1abd:e7a9bb28-8d9a-11ee-8126-d0af17528297"
,
"cache-control": "no-cache", "sec-ch-ua-mobile": "?0", "sec-ch-ua-platform": "\"macOS\"",
"sec-fetch-dest": "document", "sec-fetch-site": "none",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
"pragma": "no-cache", "sec-fetch-mode": "navigate",
"user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36"}
url = "https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true"
cks = []
for k, v in cookies.items():
cks.append(f'{k}={quote(v)}')
headers['cookie'] = '; '.join(cks)
# cks = []
# for k, v in cookies.items():
# cks.append(f'{k}={quote(v)}')
# headers['cookie'] = '; '.join(cks)
# headers['cookie'] = '_gcl_au=1.1.844575581.1700477194; _ga=GA1.1.705703545.1700477194; _pxvid=128f1e30-8792-11ee-b443-7061c4ff223f; pxcts=128f28dc-8792-11ee-b443-4e8857f971f4; _uetsid=129d89b0879211ee977771ce32cb65b6; _uetvid=129db280879211ee860d19abd0f03584; wisepops_visits=%5B%222023-11-20T10%3A46%3A33.550Z%22%5D; _tt_enable_cookie=1; _ttp=SUWxt4jqEaMrt1QTUoALn84Sjv4; _pin_unauth=dWlkPU5USXhPREF3WXpndE5qRTBOaTAwTW1aaUxUZ3hNR0V0Wm1NM05tRmxaalJtTTJVMg; _up=1.2.1708435651.1700477197; ORA_FPC=id=c98a5e29-4762-4b94-8d64-abd94c3da5d9; WTPERSIST=; wisepops=%7B%22csd%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A%7B%22dc%22%3A1%2C%22d%22%3A1700477197690%7D%7D%2C%22sub%22%3A0%2C%22ucrn%22%3A36%2C%22cid%22%3A%2278471%22%2C%22v%22%3A4%2C%22bandit%22%3A%7B%22recos%22%3A%7B%7D%7D%7D; wisepops_session=%7B%22arrivalOnSite%22%3A%222023-11-20T10%3A46%3A33.550Z%22%2C%22mtime%22%3A1700477197690%2C%22pageviews%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A0%7D%2C%22bars%22%3A%7B%7D%2C%22sticky%22%3A%7B%7D%2C%22countdowns%22%3A%7B%7D%2C%22src%22%3Anull%2C%22utm%22%3A%7B%7D%2C%22testIp%22%3Anull%7D; _px2=eyJ1IjoiMTIzNzQwZDAtODc5Mi0xMWVlLWI5MDYtMTc3Y2I5NjUwMjE0IiwidiI6IjEyOGYxZTMwLTg3OTItMTFlZS1iNDQzLTcwNjFjNGZmMjIzZiIsInQiOjE3MDA0Nzc3NjA1MjcsImgiOiI0YWU4NDRjZTgyYmQ0ZWVhYmEzMjkyZjdiYTRhMWE2YzA2M2M4ZTA0YmQ3NzU2MTRiNWY5ZTcyNWY2MzA0MTRkIn0=; _ga_P2WLKWBNNW=GS1.1.1700477193.1.1.1700477480.58.0.0'
prox = 'http://user-uni001-region-us-sessid-1115-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox = 'http://user-uni001-region-us-sessid-1114-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# prox = 'http://127.0.0.1:7890'
response = requests.post('http://52.52.23.116/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
json=dict(url=url, method="GET", proxy=prox, headers=headers, debug=True)
)
# response = session.post(url, headers=h, data=data, proxy={
......@@ -54,5 +39,3 @@ response = requests.post('http://52.52.23.116/tls/forward',
print(response.json()['status_code'])
print(response.json()['text'])
# 冒泡排序
......@@ -9,7 +9,8 @@ session = tls_client.Session(client_identifier='chrome_112')
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
cks = ('_px2=eyJ1IjoiOGRjYjQ3NjAt1ODljYi011xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ==')
cks = '_px2=eyJ1IjoiOGRjYjQ3NjAt1ODljYi011xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment