Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nekocode/wx_sniffer
抓取微信公众号文章阅读数、点赞数
https://github.com/nekocode/wx_sniffer
tool
Last synced: 3 months ago
JSON representation
抓取微信公众号文章阅读数、点赞数
- Host: GitHub
- URL: https://github.com/nekocode/wx_sniffer
- Owner: nekocode
- Created: 2015-08-29T02:50:35.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2015-11-25T02:00:20.000Z (about 9 years ago)
- Last Synced: 2023-03-02T19:55:55.470Z (almost 2 years ago)
- Topics: tool
- Language: Python
- Homepage:
- Size: 1.16 MB
- Stars: 76
- Watchers: 11
- Forks: 40
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
#微信公众号 uin,key 捕获脚本
## New Solution
**使用 Android System Exploit 配合虚拟机抓取,且能拓展到其他一些用处上。**详情请看:[**wechat_webview_launch.md**](wechat_webview_launch.md)
## Old Solution
环境:`Windows`, `Python 2.7`, `Android SDK`, `Winpcap`, `dpkt`, `httplib2`**执行步骤:**
- 创建并打开(多个)Android虚拟机
- 修改模拟点击脚本 `simulate.py```` python
print '\n======================================='
print 'start simulate(use monkeyrunner)'
print '=======================================\n'
device = MonkeyRunner.waitForConnection(5, 'emulator-' + str(sys.argv[1]))
device.touch(234, 342, MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.press('KEYCODE_BACK', MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.touch(234, 586, MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.press('KEYCODE_BACK', MonkeyDevice.DOWN_AND_UP)
print '\n======================================='
print 'simulate ended'
print '=======================================\n'
```- 修改 `wxsniffer.py` 脚本主逻辑
``` python
sniffer = WxSniffer()
sniffer.start_winpcap()
while True:
# 5554为虚拟机设备号
sniffer.simulate_open_wxarticle(5554)
time.sleep(5)
print sniffer.get_wxarticle_state('MzAwNTA2NjE2OA==', '205059655', '9fb1b7d533d39b65dde7c1d9eb9ab9c7', '1')
time.sleep(30)
```- 执行脚本 `wxsniffer.py`