nmazing / wx_sniffer

:pill: 微信公众号阅读数、点赞数获取 解决方案

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

#微信公众号 uin,key 捕获脚本

New Solution

使用 Android System Exploit 配合虚拟机抓取,且能拓展到其他一些用处上。

详情请看:wechat_webview_launch.md

Old Solution

环境:Windows, Python 2.7, Android SDK, Winpcap, dpkt, httplib2

执行步骤:

  • 创建并打开(多个)Android虚拟机
  • 修改模拟点击脚本 simulate.py
print '\n======================================='
print 'start simulate(use monkeyrunner)'
print '=======================================\n'
device = MonkeyRunner.waitForConnection(5, 'emulator-' + str(sys.argv[1]))
device.touch(234, 342, MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.press('KEYCODE_BACK', MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.touch(234, 586, MonkeyDevice.DOWN_AND_UP)
time.sleep(5)
device.press('KEYCODE_BACK', MonkeyDevice.DOWN_AND_UP)
print '\n======================================='
print 'simulate ended'
print '=======================================\n'
  • 修改 wxsniffer.py 脚本主逻辑
sniffer = WxSniffer()
sniffer.start_winpcap()
while True:
	# 5554为虚拟机设备号
	sniffer.simulate_open_wxarticle(5554)
	time.sleep(5)
	print sniffer.get_wxarticle_state('MzAwNTA2NjE2OA==', '205059655', '9fb1b7d533d39b65dde7c1d9eb9ab9c7', '1')
	time.sleep(30)
  • 执行脚本 wxsniffer.py

About

:pill: 微信公众号阅读数、点赞数获取 解决方案


Languages

Language:Python 100.0%