ds_store_exp
ds_store_exp copied to clipboard
A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.
版本:Python 3.12.0 描述:下载.DS_Store到本地之后打开为编码 使用sublime text打开后还是加密内容,无法查看

这个报错有办法解决嘛
compatible with python 3
原脚本使用情况:  添加修复代码: ``` python import urllib3 ... ... try: urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) response = requests.get(url, verify=False, allow_redirects=False) except Exception as e: ... ```
I couldn't download the requirements.txt

check this out: https://github.com/qiuluo-oss/ds_store_exp_py3
谢谢。
Some small changes to bring this code up to 2020 :)