| skipped 1 lines |
2 | 2 | | |
3 | 3 | | class ParsingActivator: |
4 | 4 | | @staticmethod |
5 | | - | def twitter(site, logger): |
| 5 | + | def twitter(site, logger, cookies={}): |
6 | 6 | | headers = dict(site.headers) |
7 | 7 | | del headers['x-guest-token'] |
8 | 8 | | r = requests.post(site.activation['url'], headers=headers) |
| skipped 3 lines |
12 | 12 | | site.headers['x-guest-token'] = guest_token |
13 | 13 | | |
14 | 14 | | @staticmethod |
15 | | - | def vimeo(site, logger): |
| 15 | + | def vimeo(site, logger, cookies={}): |
16 | 16 | | headers = dict(site.headers) |
17 | 17 | | if 'Authorization' in headers: |
18 | 18 | | del headers['Authorization'] |
| skipped 1 lines |
20 | 20 | | jwt_token = r.json()['jwt'] |
21 | 21 | | site.headers['Authorization'] = 'jwt ' + jwt_token |
22 | 22 | | |
| 23 | + | @staticmethod |
| 24 | + | def xssis(site, logger, cookies={}): |
| 25 | + | if not cookies: |
| 26 | + | logger.debug('You must have cookies to activate xss.is parsing!') |
| 27 | + | return |
| 28 | + | |
| 29 | + | headers = dict(site.headers) |
| 30 | + | post_data = { |
| 31 | + | '_xfResponseType': 'json', |
| 32 | + | '_xfToken': '1611177919,a2710362e45dad9aa1da381e21941a38' |
| 33 | + | } |
| 34 | + | headers['content-type'] = 'application/x-www-form-urlencoded; charset=UTF-8' |
| 35 | + | r = requests.post(site.activation['url'], headers=headers, cookies=cookies, data=post_data) |
| 36 | + | csrf = r.json()['csrf'] |
| 37 | + | site.get_params['_xfToken'] = csrf |
| 38 | + | |