pexpect在windows上各种问题啊。
child = pexpect.popen_spawn.PopenSpawn("c:/windows/system32/cmd")
import subprocess
path = r'd:\info2.txt'
output = subprocess.check_output(['type', path], shell=True)
print output
python pyinstxtractor.py xx.exe
uncompyle6 -o . *.pyc
居然破解了
message 通过get_hdd_serials产生
from cryptography.fernet import Fernet
key = 'Iae0hfmZ6rv4uG7wwcSF6-Mf_30M1R-qrmc6xEwMtdg='
def get_hdd_serials():
c = wmi.WMI()
HDDs = [[x.SerialNumber] for x in c.Win32_PhysicalMedia()]
return HDDs
message = " 15160F49F48B".encode()
f = Fernet(key)
encrypted = f.encrypt(message)
decrypted = f.decrypt(encrypted)
print(encrypted)
json格式如下
{
"Activation Keys": [
"xxxx"
],
"License Key": ""
}
网友评论