|
|
|
|
|
|
|
[悬赏]如何读取网页验证码?
wzyouni 第一次在咱们论坛发帖,好活跃啊,感谢大家回答我问题,谢谢,帮我把问题解决了,每人发20元红包,拜托了各位醒醒~ 别以为10块就能搞定图片文字识别。 我已经教给你了如何分析网页和自动下载验证马图片的方法。 这tm都超过10块了~~ |
|
|
|
|
|
[翻译]玩命的销售日志 2017.10.23 - 翻译《Prime in P》并实现AKS
http://www.lfd.uci.edu/~gohlke/pythonlibs/#gmpy gmpy 支持所有3.x版本 |
|
[悬赏]如何读取网页验证码?
先在网页源码里获得 seccode xxxxxxxx <span id="seccode_cSpFBrKK"></span> <script type="text/javascript" reload="1">updateseccode('cSpFBrKK', '<div class="rfm"><table><tr><th><span class="rq">*</span><sec>: </th><td><sec><br /><sec></td></tr></table></div>', 'member::register');</script> 跟踪updateseccode函数 function _updateseccode(idhash, tpl, modid) { if(!$('seccode_' + idhash)) { return; } if(tpl) { seccheck_tpl[idhash] = tpl; } var id = 'seccodejs_' + idhash; var src = 'misc.php?mod=seccode&action=update&idhash=' + idhash + '&' + Math.random() + '&modid=' + modid; if($(id)) { document.getElementsByTagName('head')[0].appendChild($(id)); } var scriptNode = document.createElement("script"); scriptNode.type = "text/javascript"; scriptNode.id = id; scriptNode.src = src; document.getElementsByTagName('head')[0].appendChild(scriptNode); } 这个函数在 head 插入个 script 元素,scr属性是: if($('seccode_cSpFBrKK')) { if(!$('vseccode_cSpFBrKK')) { var sectpl = seccheck_tpl['cSpFBrKK'] != '' ? seccheck_tpl['cSpFBrKK'].replace(/<hash>/g, 'codecSpFBrKK') : ''; var sectplcode = sectpl != '' ? sectpl.split('<sec>') : Array('<br />',': ','<br />',''); var string = '<input name="seccodehash" type="hidden" value="cSpFBrKK" /><input name="seccodemodid" type="hidden" value="member::register" />' + sectplcode[0] + '验证码' + sectplcode[1] + '<input name="seccodeverify" id="seccodeverify_cSpFBrKK" type="text" autocomplete="off" style="ime-mode:disabled;width:100px" class="txt px vm" onblur="checksec(\'code\', \'cSpFBrKK\', 0, null, \'member::register\')" />' + ' <a href="javascript:;" onclick="updateseccode(\'cSpFBrKK\');doane(event);" class="xi2">换一个</a>' + '<span id="checkseccodeverify_cSpFBrKK"><img src="' + STATICURL + 'image/common/none.gif" width="16" height="16" class="vm" /></span>' + sectplcode[2] + '<span id="vseccode_cSpFBrKK">请输入下面动画图片中的字符<br /><img onclick="updateseccode(\'cSpFBrKK\')" width="100" height="30" src="misc.php?mod=seccode&update=67431&idhash=cSpFBrKK" class="vm" alt="" /></span>' + sectplcode[3]; evalscript(string); $('seccode_cSpFBrKK').innerHTML = string; } else { var string = '请输入下面动画图片中的字符<br /><img onclick="updateseccode(\'cSpFBrKK\')" width="100" height="30" src="misc.php?mod=seccode&update=67431&idhash=cSpFBrKK" class="vm" alt="" />'; evalscript(string); $('vseccode_cSpFBrKK').innerHTML = string; } seccheck_mobile2(); } 其中 img 元素的 src属性就是验证马图片的地址: 下载这个图片,就看到验证码了。 |
|
[求助]关于汇编指令xor的16进制数据
xor 汇编记号 是 一簇有异或功能的多个机器指令的代称。 "xor edx,ebx" 有2种汇编方式: 31 /r XOR r/m32,r32 对 r/m32 同 r32 执行“异或”运算 33 /r XOR r32,r/m32 对 r32 同 r/m32 执行“异或”运算 |
|
[分享]鱼C工作室资源打包合集
鱼C所有的教程都收集了? |
|
|
|
|
|
[悬赏]fiddler 抓包还原
''' python3 ''' import gzip import base64 import io gzdata = {"data":"H4sIAAAAAAAAAMSUW2\/iVhDHnweJ78BTX7Yczv2CtKpMfAjWgkGFjZ28IGzskE24RHZIk0\/fcZV2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\nMzEwNTQ=\n","length":"917","filename":"460030973556053_99000640210079_171015133330273_bob2_265_01.gz"} with gzip.open(io.BytesIO(base64.decodebytes(bytes(gzdata["data"],'ascii'))))as gf: try: for i in gf: print(i.decode()) #显示解压后的内容 except:pass |
|
|
|
[悬赏]fiddler 抓包还原
呃~~ 悬赏给了谁? ''' python3 ''' import gzip import base64 gzdata = {"data":"H4sIAAAAAAAAAMSUW2\/iVhDHnweJ78BTX7Yczv2CtKpMfAjWgkGFjZ28IGzskE24RHZIk0\/fcZV2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\nMzEwNTQ=\n","length":"917","filename":"460030973556053_99000640210079_171015133330273_bob2_265_01.gz"} with open(gzdata['filename'],'w')as w: w.write(gzdata["data"]) # 写入txt文件 with open(gzdata['filename']) as r,\ open('x_'+gzdata['filename'],'wb') as w: base64.decode(r,w) #解码 base64 with gzip.open('x_'+gzdata['filename'])as gf: try: for i in gf: print(i.decode()) #显示解压后的内容 except:pass |
|
[悬赏]fiddler 抓包还原
FileInfo 1.0 EXP 3.39.12.AN.BN GSM+TD+WLAN 20171015133330330 99000640210079 24 E790A8E88E8EE4B8ADE5BF83 EX_H4 460030973556053 99000640210079 HM NOTE 1S 4.4.4 3.39.12.AN.BN 6 460 3 M8916EAAAANVZM-1.18170.1.26439.2,M8916EAAAANVZM-1.18170.1.26439.2 3.10.28-g1782916 7.6.8 e794b5e4bfa1e890a5e4b89ae58e85 com.ct.client 0 418166e5ffc74474b1c5209e7942d6fb EX_ALIVE4 20171015133330368 6 7 460 3 13995 6 24849 5377 90027 52 379 RCITY 20171015133330377 99000640210079 460030973556053 e6b2b3e58c97e79c81 e59490e5b1b1e5b882 SILENCE_PING4 20171015133317837 99000640210079 460030973556053 e6909ce78b900d0a 64 http://tv.sohu.com/20150305/n409368555.shtml 5 5 44 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -52 -7 -7 1 0.00000 0.00000 0 81 71 75 -1 192.168.1.167 36.98.99.226 6 0 192.168.1.167 SILENCE_DNS4 20171015133320257 99000640210079 460030973556053 e6909ce78b90 http://tv.sohu.com/20150305/n409368555.shtml 220.181.90.8 192.168.1.1 1 255 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -52 -7 -7 1 0.00000 0.00000 0 81 69 75 -1 192.168.1.167 36.98.99.226 6 0 192.168.1.167 SILENCE_MEDIA6 20171015133326066 99000640210079 460030973556053 e6909ce78b90 http://data.vod.itc.cn/?k=tWaizEIOfDWHWGeHN4wFf6sXupNvgEbA0hAdWYveWp4NDBXUyYk&a=XfGFjpCmhWqbzHsWjHqlXL3FXfvWsU5CO9quOfkIWh1tfh6Xwm43NMAcg8wtom8XDOWsqTdDTEydD447y4x4W6kBemvOhMcLZpfS0mEAZD6sfY6tWOeXWGs 1537886 647967 0 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -54 -7 -7 1 0.00000 0.00000 0 80 69 75 -1 192.168.1.167 36.98.99.226 6 220.181.90.8 1951677 0 0 192.168.1.167 -2.00 0.00 0.00 0 WIFI_DEV0 20171015133329518 ZTE_AP_2495 WPA/WPA2 PSK IEEE 802.11b/g/n 2437MHz 6 86 192.168.1.1 0.0.0.0 192.168.1.1 255.255.255.0 192.168.1.1 3600 seconds |
|
[翻译]英特尔®64和IA-32架构 软件开发者手册 第1卷: 基础架构 第3章 基本执行环境
http://scc.qibebt.cas.cn/docs/optimization/VTune(TM)%20User's%20Guide/mergedProjects/analyzer_ec/mergedProjects/reference_olh/whskin_homepage.htm 这里有些中文的词汇,也许有用~ |
|
[翻译]英特尔®64和IA-32架构 软件开发者手册 第1卷: 基础架构 第3章 基本执行环境
第二章看了,太多机翻的痕迹~ |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值