Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Sign in
Toggle navigation
P
px3
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wangmingming
px3
Commits
de1fa49f
Commit
de1fa49f
authored
Nov 26, 2023
by
wangmingming
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
解密payload
parent
7ee4b71f
Changes
7
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
38 additions
and
127 deletions
+38
-127
captcha.py
captcha.py
+5
-5
index.html
index.html
+3
-3
decodePayload.js
js/decodePayload.js
+4
-114
captcha.py
src/captcha.py
+22
-0
main.py
src/main.py
+0
-1
test.py
test.py
+1
-4
test_search.py
test_search.py
+3
-0
No files found.
captcha.py
View file @
de1fa49f
...
...
@@ -31,8 +31,8 @@ class PxBypass():
session
=
tls_client
.
Session
(
client_identifier
=
'chrome_112'
)
# session = requests.Session()
session
.
proxies
=
{
'http'
:
'http://127.0.0.1:
7
890'
,
'https'
:
'http://127.0.0.1:
7
890'
,
'http'
:
'http://127.0.0.1:
8
890'
,
'https'
:
'http://127.0.0.1:
8
890'
,
}
code1
=
''
code2
=
''
...
...
@@ -169,7 +169,7 @@ class PxBypass():
def
process_ob
(
self
,
resp
):
m
=
{}
if
'ob'
in
resp
:
cookies
=
self
.
encrypt
(
base64
.
b64decode
(
resp
[
'ob'
]
.
encode
()),
8
66
%
128
)
.
decode
()
cookies
=
self
.
encrypt
(
base64
.
b64decode
(
resp
[
'ob'
]
.
encode
()),
8
72
%
128
)
.
decode
()
print
(
cookies
.
split
(
'~~~~'
))
for
i
in
cookies
.
split
(
'~~~~'
):
tmp
=
i
.
split
(
'|'
)
...
...
@@ -262,8 +262,8 @@ class PxBypass():
payload
=
ctx
.
call
(
'encodePayload'
,
data_str
,
self
.
uuid
,
''
)
self
.
log
.
info
(
f
'payload {payload}'
)
tag
=
"v8.
6.6
"
ft
=
"31
6
"
tag
=
"v8.
7.2
"
ft
=
"31
7
"
pc
=
self
.
__gen_pc
(
data_str
,
f
'{self.uuid}:{tag}:{ft}'
)
print
(
pc
)
body
=
{
...
...
index.html
View file @
de1fa49f
...
...
@@ -10,18 +10,18 @@
<body>
<script>
window
.
_pxVid
=
''
;
window
.
_pxUuid
=
'
6d650541-8ab1-11ee-bff9-5ba7b1e8c527
'
;
window
.
_pxUuid
=
'
3e4390db-8c12-11ee-add0-1b021979ffba
'
;
window
.
_pxAppId
=
'PXVb73hTEg'
;
window
.
_pxHostUrl
=
'https://collector-PXVb73hTEg.perimeterx.net'
;
window
.
_pxCustomLogo
=
''
;
window
.
_pxJsClientSrc
=
'//client.perimeterx.net/PXVb73hTEg/main.min.js'
;
window
.
_pxFirstPartyEnabled
=
'false'
;
var
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=
6d650541-8ab1-11ee-bff9-5ba7b1e8c527
&v=&m=0'
;
script
.
src
=
'//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=
3e4390db-8c12-11ee-add0-1b021979ffba
&v=&m=0'
;
document
.
head
.
appendChild
(
script
);
script
.
onerror
=
function
()
{
script
=
document
.
createElement
(
'script'
);
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=
6d650541-8ab1-11ee-bff9-5ba7b1e8c527
&v=&m=0'
;
script
.
src
=
'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=
3e4390db-8c12-11ee-add0-1b021979ffba
&v=&m=0'
;
script
.
onerror
=
window
.
_pxDisplayErrorMessage
;
document
.
head
.
appendChild
(
script
);
};
...
...
js/decodePayload.js
View file @
de1fa49f
This diff is collapsed.
Click to expand it.
src/captcha.py
View file @
de1fa49f
...
...
@@ -300,6 +300,28 @@ class PxCaptchaBypass():
"PX11496"
:
self
.
uuid
,
"PX12564"
:
None
,
"PX12565"
:
-
1
,
# "PX11379": True
}}]
data
=
[
{
"t"
:
"PX12095"
,
"d"
:
{
"PX11645"
:
self
.
target_url
,
"PX12207"
:
0
,
"PX12458"
:
"MacIntel"
,
"PX11902"
:
0
,
"PX11560"
:
self
.
performanceNow
,
"PX12248"
:
3600
,
"PX11385"
:
t1
,
"PX12280"
:
t2
,
"PX11496"
:
self
.
uuid
,
"PX12564"
:
None
,
"PX12565"
:
-
1
,
"PX11379"
:
False
,
"PX12307"
:
"PX11745"
,
"PX11668"
:
"pxhc"
,
"PX12348"
:
False
}
}]
self
.
do_collector
(
data
)
def
encrypt
(
self
,
data
,
param
):
...
...
src/main.py
View file @
de1fa49f
...
...
@@ -15,7 +15,6 @@ import tls_client
from
loguru
import
logger
from
env
import
PxEnv
from
utils
import
PxUtils
# with open('js/encodepayload.js', 'r', encoding='utf-8') as f:
# jsCode = f.read()
# # ctx = execjs.compile(jsCode)
...
...
test.py
View file @
de1fa49f
...
...
@@ -60,10 +60,7 @@ a2 = "KysrKytSHj0SGlAeUVFSHgcbKFMrCA0LLBg3GjgmLxUvJTcWLCY7UiwbUhovNTQOLjUnFSw1Mx
a2
=
"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"
a2
=
'WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBJy86AjECOVsmAikcJywEAjEBWBAlPz4EJDwDHyUFPRwnLC1cJTwLECUCOgInPCoEIQEfAQwBIV4hAg8SJRIDXSUvMgEkPAAAMTwPHCU8LgQyO1kBJSwlWyQ8Cx8mWjIDJQILESc8OgQyKyEbIQY5AScCLVslLClcJTwDEic8OVwlAgsbIQUPAScBIgImBTlbJRILHyUFMgUnPy1dMTwtECUSC1wlPCICMQU6AjE/OREnPDkRJywmBCUSORInLAwEMRIAADECMRAxPDldJgU5XCc8CxExAg9YJTwyBTESLRIhBlhVFBwaHQ0UW1hYFhYWFgdZWQdZWVkHFEVZFhYWFgdZB1lZWRQLHQ=='
a2
=
"WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBJVouADE8AAUmPCUcJy8iASYRWBAlPz4EJD8hEiUvPRwnLCoEJQItWDIvIgEyPzICIQEfAQwBIV4hAjFbMQUhXCcsIgQkPAABMQIxHCU8LgQyO1kAJQUhWCQ8LVwyAilZMgItXDFaMRExESEbIQY5AScCLVslLCldJRIlESc8A1omAjEbIQUPAScBIgAxBSVYMRItXSU/MVglEiUfJjwuASYvPVkmPDERMVotEDI/LV0xAjESMgI6AzIsBAUxPz4FMRImADECKgAlPCVdJS8hWDECLgQxAiVbJRIDECUFLREhBlhVFBwaHQ0UW1hYFhYWFgdZB1lZWRQLHQ=="
b2
=
base64
.
b64decode
(
a2
.
encode
())
for
i
in
bytes
(
encrypt
(
b2
,
872
%
128
))
.
decode
()
.
split
(
'~~~~'
):
print
(
'o11o111o'
in
i
,
i
)
...
...
test_search.py
View file @
de1fa49f
...
...
@@ -53,3 +53,6 @@ response = requests.post('http://52.52.23.116/tls/forward',
print
(
response
.
json
()[
'status_code'
])
print
(
response
.
json
()[
'text'
])
# 冒泡排序
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment