Skip to content
This repository has been archived by the owner on Oct 18, 2023. It is now read-only.

L #1

Open
vuhz opened this issue Oct 13, 2023 · 1 comment
Open

L #1

vuhz opened this issue Oct 13, 2023 · 1 comment

Comments

@vuhz
Copy link

vuhz commented Oct 13, 2023

Site using request to apiclient.blitly.io/api/ to get keyword_answer, with async frame. You cant just read page source and get base url lol.
Also there is hidden gcaptcha when submit answer. gl

@dragonx943
Copy link
Owner

Site using request to apiclient.blitly.io/api/ to get keyword_answer, with async frame. You cant just read page source and get base url lol. Also there is hidden gcaptcha when submit answer. gl

Dear vuhz,
Before i wrote this code, i discovered that the source of that page contained a variable named "url" and contained in that variable was the original website address that blitly.io was trying to hide, this was further confirmed when i went to the Sources section of Google Chrome and discovered that the extension name "Fast Forward" was also extracting that variable to Bypass this website. But i can't use Fast Forward because just some pages work, some pages don't even though the "url" variable always appears in every link belonging to this domain, so i wrote this tool to fix that bug...
A few days after writing the program, i discovered that the source code of this website had been changed. Its true that it requires an api and gcaptcha as u said, so now this tool cannot work normally. However, if the blitly.io link u are trying to bypass has a "404 error", u can use this tool to extract the original URL (because the website owner has not changed the src for the 404 page yet, so the variable "url" still appears there)
Thanks for ur interest in my stuff, have a nice day.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants