Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

analyser模块使用油猴脚本注入方式有封号风险 #4

Open
nexteve opened this issue Sep 26, 2023 · 1 comment
Open

analyser模块使用油猴脚本注入方式有封号风险 #4

nexteve opened this issue Sep 26, 2023 · 1 comment

Comments

@nexteve
Copy link

nexteve commented Sep 26, 2023

是否考虑使用mitmproxy抓包的方式获取对局数据

@HomeArchbishop
Copy link
Owner

抱歉,你的表述可能不太清楚,因为analyser模块并没有使用脚本注入。
我推测你想表达的是,「前端脚本拦截消息的方式可能会被检测到」。
目前的脚本仅仅改写了原生的WebSocket对象,加了一层拦截,不太可能检测得到。

当然用mitmproxy也是一个可行的方案,这样就不需要用户多一步注入脚本,而是直接启动程序就行。

有空我会考虑跟进,也特别欢迎各位贡献代码。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants