![]() ![]() AND they are using Cloudflare (great security) with specific referrers and cookies set that are then obfuscated again. If you format it you end up with īUT the "grabber" url doesn't work, and the "token" url doesn't work. I opened a random video and found that it calls which if you open is a JSON string. You can use the poster parameter to add your thumnails in to the playlist HTML. You'll want to look around line 243 for the bit that spits out the HTML of the playlist. From the source package get the uncompressed file. I cheated and used Fiddler to check out what was going on behind the scenes. First, go to the download page and get the source files for 2.1. This could take awhile but it's the answer. Which uses the "V" variable which up at the top is equal to "path". Then took that into one of my JetBrains apps and found this line:ĭocument = t + (fi + om + fi) + escape(i()) + o + (fi + Mu + fi + Vy + V + om + fi) + (e || fi + Ne + fi) I took it into and got this better looking script: They use some heavy Javascript obfuscation to try and mask the path.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |