Pyhton模拟点击引蜘蛛软件逆向反汇编源码

申明:本文中的图片及文本资料均来源于网络,我站不提供任何软件及相关研究资料!如有不当之处请联系我站修改/删除!

以下代码为《Pyhton模拟点击引蜘蛛软件无限制版》的源码,除了几个自定义的资源库不知道是什么,运行模式是知道了的。

本代码由热心网友提供,有部分缺失,感兴趣的朋友可以体验一下,本文件已经附在源程序中。

Pyhton模拟点击引蜘蛛软件逆向反汇编源码-第1张图片

曹操博客独家分享,必属精品。

下面请看详细代码:

# uncompyle6 version 3.7.4
# Python bytecode 3.8 (3413)
# Decompiled from: Python 3.8.4 (tags/v3.8.4:dfa645a, Jul 13 2020, 16:46:45) [MSC v.1924 64 bit (AMD64)]
# Embedded file name: zhizhu.py
# Compiled at: 1995-09-28 00:18:56
# Size of source mod 2**32: 272 bytes
Instruction context:
   
 L.  71        46  LOAD_GLOBAL              kuandai
                  48  LOAD_FAST                'users'
                  50  LOAD_FAST                'pwds'
                  52  CALL_FUNCTION_2       2  ''
                  54  POP_TOP          
                  56  JUMP_FORWARD         58  'to 58'
->              58_0  COME_FROM            56  '56'
from selenium import webdriver
from requests.packages.urllib3.exceptions import InsecureRequestWarning
import time, configparser
from selenium.webdriver.chrome.options import Options
import re
from bs4 import BeautifulSoup
import requests, lxml, random, os, sys
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
py_file_path = os.path.dirname(os.path.abspath(__file__))
print(py_file_path)
sys.path.append(py_file_path)

def dakai():
    path = 'gjc.txt'
    js = 0
    url = open('wz.txt', 'r')
    urls = url.readlines()
    urlssl = len(urls)
    print(urlssl)
    with open(path, 'r') as (f):
        for line in f:
            print('首先进行宽带连接')
            conf = configparser.ConfigParser()
            conf.read_file(open('peizhi.ini'))
            users = conf.get('adsl', 'users')
            pwds = conf.get('adsl', 'pwds')
            shijian = conf.get('shijian', 'time')
            kuandai(users, pwds)
            sj = int(shijian)
            print(sj)
            js += 1
            if js == urlssl:
                js = 0
            value = line[:-1]
            print('★★★★★★★★★★开始搜索:' + value + ' 网址是:' + urls[js])
            surl = urls[js]
            surl = surl[:-1]
            qidong(value, surl, sj)
            os.system('@Rasdial 宽带连接 /DISCONNECT')


def kuandai--- This code section failed: ---

 L.  67         0  LOAD_GLOBAL              os
                2  LOAD_METHOD              system
                4  LOAD_STR                 '@Rasdial 宽带连接 /DISCONNECT'
                6  CALL_METHOD_1         1  ''
                8  POP_TOP          

 L.  68        10  LOAD_GLOBAL              os
               12  LOAD_METHOD              system
               14  LOAD_STR                 '@Rasdial 宽带连接 '
               16  LOAD_FAST                'users'
               18  BINARY_ADD       
               20  LOAD_STR                 ' '
               22  BINARY_ADD       
               24  LOAD_FAST                'pwds'
               26  BINARY_ADD       
               28  CALL_METHOD_1         1  ''
               30  POP_TOP          

 L.  69        32  LOAD_GLOBAL              os
               34  LOAD_METHOD              system
               36  LOAD_STR                 'ping www.baidu.com'
               38  CALL_METHOD_1         1  ''
               40  STORE_FAST               'res'

 L.  70        42  LOAD_FAST                'res'
               44  POP_JUMP_IF_FALSE    58  'to 58'

 L.  71        46  LOAD_GLOBAL              kuandai
               48  LOAD_FAST                'users'
               50  LOAD_FAST                'pwds'
               52  CALL_FUNCTION_2       2  ''
               54  POP_TOP          
               56  JUMP_FORWARD         58  'to 58'
             58_0  COME_FROM            56  '56'
             58_1  COME_FROM            44  '44'

Parse error at or near `COME_FROM' instruction at offset 58_0


def qidong(gjc, wz, shijian):
    try:
        driver = webdriver.Chrome()
        driver.maximize_window()
        driver.get('https://www.baidu.com')
        driver.implicitly_wait(5)
        driver.find_element_by_id('kw').send_keys(gjc)
        time.sleep(2)
        driver.find_element_by_id('su').click()
        time.sleep(3)
        js = 'document.documentElement.scrollTop=10000'
        js2 = 'document.documentElement.scrollTop=0'
        driver.execute_script(js)
        time.sleep(2)
        driver.execute_script(js2)
        zhuye = driver.current_window_handle
        zj = driver.find_elements_by_tag_name('h3')
        print(len(zj))
        yuansu = driver.find_elements_by_tag_name('h3')[random.randint(4, 6)]
        lianjie = yuansu.find_element_by_tag_name('a')
        thjs = "arguments[0].href = '" + wz + "'"
        driver.execute_script(thjs, lianjie)
        print(lianjie.get_attribute('href'))
        yuansu.click()
        time.sleep(shijian)
        driver.switch_to.window(zhuye)
        time.sleep(2)
        driver.close()
        driver.quit()
    except:
        driver.close()
        driver.quit()
        os.system('@Rasdial 宽带连接 /DISCONNECT')
while True:
    dakai()
本站所有内容仅限用于学习和研究目的,程序仅供本地断网测试,转载请说明出处!
站群SEO » Pyhton模拟点击引蜘蛛软件逆向反汇编源码

发表评论

欢迎 访客 发表评论

聚合全网站群程序及推送工具!

联系站长 联系客服