def runup(self): b = Browser() for i in xrange(100): print i b.get('http://wmtake.ru/m.base/bonus.php') captcha = b.js('$("#scode-pic img")[0].src') b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) t = Transformer() t.load('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 150, CV_THRESH_BINARY_INV) ''' radius = 3 kernel = cvCreateStructuringElementEx(radius * 2 + 1, radius * 2 + 1, radius, radius, CV_SHAPE_ELLIPSE) t.morphology('morphology', t['binarize'], 1, 1, kernel) ''' t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symbolqty: continue t.normolize('origsplit', 'breaksplit', 20, 30) t.savesymbols('origsplit', '/home/polzuka/inspirado/symbols/wmtake', '%02d' % i) del t
def preparing(b, t, a, l, d): b.show() for i in xrange(30): b.get('http://wmstream.ru/') captcha = b.js('$("#wmbonus_form_captcha img")[0].src') b.save(captcha, '/home/polzuka/inspirado/captcha/picture%02d' % i) t = Transformer() t.load('orig', b.image(captcha)) #t.save(t['orig'], '/home/polzuka/inspirado/captcha/picture%02d' % i) t.resizeby('resize', t['orig'], 4, 4) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 200, CV_THRESH_BINARY) radius = 3 kernel = cvCreateStructuringElementEx(radius * 2 + 1, radius * 2 + 1, radius, radius, CV_SHAPE_ELLIPSE) t.morphology('morphology', t['binarize'], 1, 1, kernel) try: t.breakSplit('breaksplit', t['morphology'], 0.2) except TransformError: print 'ololo' continue t.normolize('origsplit', 'breaksplit', 20, 30) #t.show() t.saveSymbols('origsplit', '/home/polzuka/inspirado/symbols', '%02d' % i) del t
def collect(self): b = Browser() for i in xrange(200): log.info('LOAD PAGE WITH CAPTCHA') b.get('http://sms-webmoney.ru/') captcha = 'http://sms-webmoney.ru/img.php' b.save(captcha, CAPTCHA_PATH + self.site + '/%02d.png' % i) t = Transformer() t.load('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 3, 3) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 200, CV_THRESH_BINARY_INV) radius = 2 kernel = cvCreateStructuringElementEx(radius * 2 + 1, radius * 2 + 1, radius, radius, CV_SHAPE_ELLIPSE) t.morphology('morphology', t['binarize'], 0, 1, kernel) t.contourSplit('breaksplit', t['morphology'], 0.01) if len(t.symbols) != self.symqty: log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) continue t.normolize('origsplit', 'breaksplit', self.symsize) t.savesymbols('origsplit', SYMBOLS_PATH + self.site, '%02d' % i) del t
def runup(self): b = Browser() symbolqty = 5 for i in xrange(100): print i b.get('http://wmtake.ru/m.base/bonus.php') captcha = b.js('$("#scode-pic img")[0].src') b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) t = Transformer() t.load('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 150, CV_THRESH_BINARY_INV) ''' radius = 3 kernel = cvCreateStructuringElementEx(radius * 2 + 1, radius * 2 + 1, radius, radius, CV_SHAPE_ELLIPSE) t.morphology('morphology', t['binarize'], 1, 1, kernel) ''' t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != symbolqty: continue t.normolize('origsplit', 'breaksplit', 20, 30) t.savesymbols('origsplit', '/home/polzuka/inspirado/symbols/wmtake', '%02d' % i) del t
def collect(self): b = Browser() for i in xrange(100): log.info('LOAD PAGE WITH CAPTCHA') b.get('http://exchangecity.ru/?cmd=bonus') captcha = 'http://exchangecity.ru/include/anti_robot.php' b.save(captcha, CAPTCHA_PATH + Implem.name + '/%02d.png' % i) t = Transformer() t.load('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 200, CV_THRESH_BINARY_INV) ''' radius = 3 kernel = cvCreateStructuringElementEx(radius * 2 + 1, radius * 2 + 1, radius, radius, CV_SHAPE_ELLIPSE) t.morphology('morphology', t['binarize'], 1, 1, kernel) ''' t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symqty: log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) continue t.normolize('origsplit', 'breaksplit', Implem.size) t.savesymbols('origsplit', SYMBOLS_PATH + Implem.name, '%02d' % i) del t
def pickup(self): # создаем браузер, которым будем ходить по wmtake.ru b = Browser() # сщздаем анализатор, которым будем распознавать капчу a = Analyzer('wmtake', self.symsize, self.charset) a.load() b.show() log.debug('LOADING PAGE WITH WM BONUS') b.get('http://fotocity.info/m.base/bonus.php') while (True): log.debug('SAVING CAPTCHA') captcha = b.js('$("#scode-pic img")[0].src') #b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) log.debug('CAPTCHA TRANSFORMING') try: t = Transformer('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 150, CV_THRESH_BINARY_INV) t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symqty: raise Exception except Exception, e: log.debug(e) log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) log.debug('LOADING PAGE WITH WM BONUS') b.get('http://wmtake.ru/m.base/bonus.php') continue t.normolize('origsplit', 'breaksplit', self.symsize) symbols = t.slice('origsplit') log.debug('RECOGNITION CAPTCHA') code = a.captcha(symbols) log.debug('ANALYZE RESULT: %s' % colorize(code)) del t print code log.debug('FILLING FIELDS') b.js("$('#scode').val('%s')" % code) b.js("$('#purse').val('R%s')" % self.purse) b.js("$('div.news_box div.bn p').click()") b.sleep(10) if not b.js("$('#mess-exec:visible').length"): log.debug('FINISH') break log.debug('INCORRECT CAPCTHA RECOGNITION') log.debug('LOADING PAGE WITH WM BONUS') b.js("$('#mess-exec p').click()")
def pickup(self): # создаем браузер, которым будем ходить по wmtake.ru b = Browser() # сщздаем анализатор, которым будем распознавать капчу a = Analyzer(self.site, self.symsize, self.charset) a.load() b.show() log.debug('LOADING PAGE WITH WM BONUS') b.get('http://wmtake.ru/m.base/bonus.php') while(True): log.debug('SAVING CAPTCHA') captcha = b.js('$("#scode-pic img")[0].src') #b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) log.debug('CAPTCHA TRANSFORMING') try: t = Transformer('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 150, CV_THRESH_BINARY_INV) t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symqty: raise Exception except Exception, e: log.debug(e) log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) log.debug('LOADING PAGE WITH WM BONUS') b.get('http://wmtake.ru/m.base/bonus.php') continue t.normolize('origsplit', 'breaksplit', self.symsize) symbols = t.slice('origsplit') log.debug('RECOGNITION CAPTCHA') code = a.captcha(symbols) log.debug('ANALYZE RESULT: %s' % colorize(code)) del t print code log.debug('FILLING FIELDS') b.js("$('#scode').val('%s')" % code) b.js("$('#purse').val('R%s')" % self.purse) b.js("$('div.news_box div.bn p').click()") b.sleep(10) if not b.js("$('#mess-exec:visible').length"): log.debug('FINISH') break log.debug('INCORRECT CAPCTHA RECOGNITION') log.debug('LOADING PAGE WITH WM BONUS') b.js("$('#mess-exec p').click()")
def pickup(self): # создаем браузер, которым будем ходить по wmtake.ru b = Browser() # создаем анализатор, которым будем распознавать капчу a = Analyzer(self.site, self.symsize, self.charset) a.load() b.show() while (True): log.debug('LOADING PAGE WITH WM BONUS') b.get('http://exchangecity.ru/?cmd=bonus') log.debug('SAVING CAPTCHA') captcha = 'http://exchangecity.ru/include/anti_robot.php' #b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) log.debug('CAPTCHA TRANSFORMING') t = Transformer('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 200, CV_THRESH_BINARY_INV) t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symqty: log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) continue t.normolize('origsplit', 'breaksplit', self.symsize) symbols = t.slice('origsplit') log.debug('RECOGNITION CAPTCHA') code = a.captcha(symbols) log.debug('ANALYZE RESULT: %s' % colorize(code)) del t print code log.debug('FILLING FIELDS') b.js("$('input[name = img]').val('%s')" % code) b.js("$('input[name = WALLET_BONUS]').val('R%s')" % self.purse) b.js("$('input[name = get_bonus]').click()") b.sleep(1) if not b.js( "$('font.textbl:contains(Вы получили бонус в размере)').length" ): log.debug('FINISH') break log.debug('INCORRECT CAPCTHA RECOGNITION') self.quit()
def pickup(self): # создаем браузер, которым будем ходить по wmtake.ru b = Browser() # создаем анализатор, которым будем распознавать капчу a = Analyzer(self.site, self.symsize, self.charset) a.load() b.show() while(True): log.debug('LOADING PAGE WITH WM BONUS') b.get('http://exchangecity.ru/?cmd=bonus') log.debug('SAVING CAPTCHA') captcha = 'http://exchangecity.ru/include/anti_robot.php' #b.save(captcha, '/home/polzuka/inspirado/captcha/wmtake/%02d.gif' % i) log.debug('CAPTCHA TRANSFORMING') t = Transformer('orig', b.image(captcha)) t.resizeby('resize', t['orig'], 2, 2) t.grayscale('grayscale', t['resize'], 2) t.binarize('binarize', t['grayscale'], 200, CV_THRESH_BINARY_INV) t.contourSplit('breaksplit', t['binarize'], 0.001) if len(t.symbols) != self.symqty: log.debug(colorize('INCORRECT SYMBOL NUMBER', RED)) continue t.normolize('origsplit', 'breaksplit', self.symsize) symbols = t.slice('origsplit') log.debug('RECOGNITION CAPTCHA') code = a.captcha(symbols) log.debug('ANALYZE RESULT: %s' % colorize(code)) del t print code log.debug('FILLING FIELDS') b.js("$('input[name = img]').val('%s')" % code) b.js("$('input[name = WALLET_BONUS]').val('R%s')" % self.purse) b.js("$('input[name = get_bonus]').click()") b.sleep(1) if not b.js("$('font.textbl:contains(Вы получили бонус в размере)').length"): log.debug('FINISH') break log.debug('INCORRECT CAPCTHA RECOGNITION') self.quit()