Pyhton模拟点击引蜘蛛软件逆向反汇编源码
以下代码为《Pyhton模拟点击引蜘蛛软件无限制版》的源码,除了几个自定义的资源库不知道是什么,运行模式是知道了的。
本代码由热心网友提供,有部分缺失,感兴趣的朋友可以体验一下,本文件已经附在源程序中。
佛系seo博客独家分享,必属精品。
下面请看详细代码:
# uncompyle6 version 3.7.4 # Python bytecode 3.8 (3413) # Decompiled from: Python 3.8.4 (tags/v3.8.4:dfa645a, Jul 13 2020, 16:46:45) [MSC v.1924 64 bit (AMD64)] # Embedded file name: zhizhu.py # Compiled at: 1995-09-28 00:18:56 # Size of source mod 2**32: 272 bytes Instruction context: L. 71 46 LOAD_GLOBAL kuandai 48 LOAD_FAST 'users' 50 LOAD_FAST 'pwds' 52 CALL_FUNCTION_2 2 '' 54 POP_TOP 56 JUMP_FORWARD 58 'to 58' -> 58_0 COME_FROM 56 '56' from selenium import webdriver from requests.packages.urllib3.exceptions import InsecureRequestWarning import time, configparser from selenium.webdriver.chrome.options import Options import re from bs4 import BeautifulSoup import requests, lxml, random, os, sys requests.packages.urllib3.disable_warnings(InsecureRequestWarning) py_file_path = os.path.dirname(os.path.abspath(__file__)) print(py_file_path) sys.path.append(py_file_path) def dakai(): path = 'gjc.txt' js = 0 url = open('wz.txt', 'r') urls = url.readlines() urlssl = len(urls) print(urlssl) with open(path, 'r') as (f): for line in f: print('首先进行宽带连接') conf = configparser.ConfigParser() conf.read_file(open('peizhi.ini')) users = conf.get('adsl', 'users') pwds = conf.get('adsl', 'pwds') shijian = conf.get('shijian', 'time') kuandai(users, pwds) sj = int(shijian) print(sj) js += 1 if js == urlssl: js = 0 value = line[:-1] print('★★★★★★★★★★开始搜索:' + value + ' 网址是:' + urls[js]) surl = urls[js] surl = surl[:-1] qidong(value, surl, sj) os.system('@Rasdial 宽带连接 /DISCONNECT') def kuandai--- This code section failed: --- L. 67 0 LOAD_GLOBAL os 2 LOAD_METHOD system 4 LOAD_STR '@Rasdial 宽带连接 /DISCONNECT' 6 CALL_METHOD_1 1 '' 8 POP_TOP L. 68 10 LOAD_GLOBAL os 12 LOAD_METHOD system 14 LOAD_STR '@Rasdial 宽带连接 ' 16 LOAD_FAST 'users' 18 BINARY_ADD 20 LOAD_STR ' ' 22 BINARY_ADD 24 LOAD_FAST 'pwds' 26 BINARY_ADD 28 CALL_METHOD_1 1 '' 30 POP_TOP L. 69 32 LOAD_GLOBAL os 34 LOAD_METHOD system 36 LOAD_STR 'ping www.baidu.com' 38 CALL_METHOD_1 1 '' 40 STORE_FAST 'res' L. 70 42 LOAD_FAST 'res' 44 POP_JUMP_IF_FALSE 58 'to 58' L. 71 46 LOAD_GLOBAL kuandai 48 LOAD_FAST 'users' 50 LOAD_FAST 'pwds' 52 CALL_FUNCTION_2 2 '' 54 POP_TOP 56 JUMP_FORWARD 58 'to 58' 58_0 COME_FROM 56 '56' 58_1 COME_FROM 44 '44' Parse error at or near `COME_FROM' instruction at offset 58_0 def qidong(gjc, wz, shijian): try: driver = webdriver.Chrome() driver.maximize_window() driver.get('https://www.baidu.com') driver.implicitly_wait(5) driver.find_element_by_id('kw').send_keys(gjc) time.sleep(2) driver.find_element_by_id('su').click() time.sleep(3) js = 'document.documentElement.scrollTop=10000' js2 = 'document.documentElement.scrollTop=0' driver.execute_script(js) time.sleep(2) driver.execute_script(js2) zhuye = driver.current_window_handle zj = driver.find_elements_by_tag_name('h3') print(len(zj)) yuansu = driver.find_elements_by_tag_name('h3')[random.randint(4, 6)] lianjie = yuansu.find_element_by_tag_name('a') thjs = "arguments[0].href = '" + wz + "'" driver.execute_script(thjs, lianjie) print(lianjie.get_attribute('href')) yuansu.click() time.sleep(shijian) driver.switch_to.window(zhuye) time.sleep(2) driver.close() driver.quit() except: driver.close() driver.quit() os.system('@Rasdial 宽带连接 /DISCONNECT') while True: dakai()