Pioneer Pirates _ Thieves/Collection

Source: Internet
Author: User
Tags first string

<%
' Please keep this declaration information when forwarding, this statement does not affect your speed!
' ************************** ' Pioneer Pirates ' Ver2005 final edition ********************************
' Author: Sun Liyu, Apollosun, Ezhonghua
' Improved by: arllic
"Eliminate all bugs, remove some easy to use, misleading features, optimize the execution efficiency, this is the final version of"
' Official website: http://www.lkstar.com Technical Support Forum: http://bbs.lkstar.com
' E-mail: kickball@netease.com online qq:94294089
' Copyright Disclaimer: Copyright No, piracy does not investigate, the source code open, all kinds of uses can be free to use, you are welcome to the Technical forum to seek support.
'-The principle of the thief program is to use XHTML and ASP technology combined, directed centralized acquisition of remote Web page content processing and then converted to local virtual Web pages.
'-This technology since its inception because of its information coverage, wide-sync update and maintenance-free features have been the attention of all programming enthusiasts and sought after.
'--the current domestic more popular real-time news, flash guest anime, popular songs, software downloads, weather forecasts, stock inquiries and other outstanding works.
'--however, because the process of making thieves is too complex and cumbersome, but also due to the remote Web page code changes and often ineffective, which makes the Thief Web page
' Maintenance becomes a nightmare! So far, there are few such masterpieces, and technology is concentrated in the hands of a small group of people.
'-The birth of the Pioneer pirates will make it easy to make and maintain the thief's program. Pioneer Pirates offer 12 kinds of methods that will enable you to collect
' The ability to edit content has become ever more powerful, and another intimate class-debugging Debug method allows you to observe the code you get at each step and
' Page display effect, thoroughly mastering these methods will make you do whatever you like to collect and edit a variety of remote pages, and maintenance is also quite convenient!
'-All in all, using a pioneer pirate will make your "thief" process A "pirate" program!
' Detailed use of instructions or examples please see the download attachment or to my official site download!
'-------------------------------------------------------------------------------------
Class Clsthief
'____________________
Private value_ ' stolen content
Private Src_ ' to steal the target URL address
Private isget_ ' Judge whether it has been stolen

Public properties let src (str) ' Assignment-destination URL address/attribute to be stolen
Src_=str
End Property

Public properties Get value ' return value--finally steals and applies the processed content/attribute of the class method
Value=value_
End Property

Public Property Get Version
Version= "Pioneer Pirate class Version 2005"
End Property

Private Sub Class_Initialize ()
Value_= ""
Src_= ""
isget_= false
End Sub

Private Sub Class_Terminate ()
End Sub

Private Function Bytestobstr (body,cset) ' Chinese processing
Dim objstream
Set objstream = Server.CreateObject ("ADODB.stream")
Objstream. Type = 1
Objstream. Mode =3
Objstream. Open
Objstream. Write body
Objstream. Position = 0
Objstream. Type = 2
Objstream. Charset = Cset
Bytestobstr = objstream. ReadText
Objstream. Close
Set objstream = Nothing
End Function

Public Sub Steal () ' The HTML code/method that steals the destination URL address
If src_<> "" Then
Dim Http
Set Http=server.createobject ("MSXML2. XMLHTTP ")
Http.open "Get", Src_, False
Http.send ()
If Http.readystate<>4 Then
Exit Sub
End If
Value_=bytestobstr (Http.responsebody, "GB2312")
isget_= True
Set http=nothing
If Err.number<>0 then err. Clear
Else
Response. Write ("<script>alert", set the SRC attribute first! "") </script>)
End If
End Sub

' Delete the inside of the stolen content of the line, carriage return in order to further processing/method
Public Sub Noreturn ()
If isget_= false Then call steal ()
Value_=replace (replace (Value_, vbcr, ""), vblf, "")
End Sub

' Replace/method with new values for individual strings in stolen content
Public Sub Change (OLDSTR,STR) ' arguments are old strings, new strings
If isget_= false Then call steal ()
Value_=replace (Value_, OLDSTR,STR)
End Sub

' Cut off the stolen content according to the specified end-end string (excluding the end-end string)/method
The Public sub-cut (head,bot) ' argument is the first string, the tail string
If isget_= false Then call steal ()
If InStr (Value_, head) >0 and InStr (Value_, bot) >0 then
Value_=mid (Value_, InStr (Value_, head) +len (head), InStr (Value_, Bot)-instr (head)
Else
value_= "<p align=" "Center" > function cut specifies that the trim does not exist, please redefine the
End If
End Sub

' Cut the stolen content (including the end string)/method at the specified end and end string
The Public Sub Cutx (Head,bot) ' argument is the first string, the tail string
If isget_= false Then call steal ()
If InStr (Value_,head) >0 and InStr (Value_,bot) >0
Value_=mid (Value_, InStr (Value_, Head), InStr (Value_, Bot)-instr (Value_, head) +len (BOT))
Else
value_= "<p align=" "Center" "> function Cutx specified cut content does not exist"
End If
End Sub

Public Sub Cutby (head,headcusor,bot,botcusor)
' with the specified end-and-end string position offset pointer The parameters are the first string, the first offset value, the tail string, the trailing offset, the left offset with a negative value, the offset pointer unit as the number of characters
if isget_= false Then call steal ()
  if InStr (Value_,head ) >0 and InStr (Value_,bot) >0 then
   value_=mid (Value_, InStr (Value_, head) +len (head) + Headcusor,instr (Value_, Bot) -1+botcusor-instr (Value_, head)-len (head)-headcusor)
  else
    value_= "<p align=" "Center" > function cutby specifies that the cut content does not exist "
  end if
End Sub

Public Sub Filt (head,bot,str) ' argument is a first string, a trailing string, a new value, The new value bit null is filtered
if isget_= false Then call steal ()
  if InStr (Value_,head) >0 and InStr (Value_,bot) >0 Then
   value_=replace (Value_,mid (Value_, InStr (Value_, head) +len (head), InStr (Value_, Bot)- InStr (Value_, head)-len (head), str)
  else
   value_= "<p align=" "Center" > function filt Specifies that the substituted content does not exist "
  end if
End Sub

"

Public Sub Filtx (HEAD,BOT,STR) ' parameter is the first string, the tail string, the new value, The new value is null to filter
if isget_= false Then call steal ()
  if InStr (Value_,head) >0 and InStr (Value_,bot) >0 Then
        value_=replace (Value_,mid (Value_, InStr (Value_, Head), InStr ( Value_, Bot)-instr (Value_, head) +len (BOT)), str)
  else
   value_= "<p align=" " Center "" > function filtx specifies that the substituted content does not exist "
  end if
End Sub

' Replaces/methods The new value of the stolen content by the specified end-end string position offset pointer
Public Sub Filtby (HEAD,HEADCUSOR,BOT,BOTCUSOR,STR)
' parameter is the first string, the first offset value, the tail string, the trailing offset value, the new value, the left offset with a negative value, the offset pointer unit as the number of characters, and the new value is null to filter
If isget_= false Then call steal ()
If InStr (Value_,head) >0 and InStr (Value_,bot) >0
Value_=replace (Value_, Mid (Value_, InStr (Value_, head) +len (head) +headcusor,instr (Value_, bot) -1+botcusor-instr ( Value_, head)-len (head)-headcusor), str)
Else
value_= "<p align=" "Center" > function filtby the specified replacement does not exist.
End If
End Sub

' Collect and combine the contents of the eligible content, and the final content is a large text/method with <!--lkstar--> partition
' You can use split (value, "<!--lkstar-->") to get the array you need after you get this content through property value
The Public Sub Rebuild (str) parameter is a recurring feature character on your target page
If isget_= false Then call steal ()
value_= Replace (value_,str,vbcrlf& "<!--lkstar-->" &vbcrlf)
End Sub

' Class-mismatch mode--apply this method before the class is released to see what you intercepted. HTML code and page display effects/methods
Public Sub Debug ()
Dim tempstr
Tempstr= "<script>function RunEx () {var winEx2 = window.open (" "" "," "winEx2", "" Width=500,height=300,status=yes , Menubar=no,scrollbars=yes,resizable=yes ""); WinEx2.document.open ("text/html" "," "replace"); WinEx2.document.write (unescape (Event.srcelement.parentelement.children[0].value)); WinEx2.document.close (); }function SaveFile () {var win=window.open (', ', ' top=10000,left=10000 '); Win.document.write ( Document.all.asdf.innerText); Win.document.execCommand (' SaveAs ', ', ', ' javascript.htm '); Win.close (); </script><center><textarea id=asdf Name=textfield rows=32  wrap=VIRTUAL cols= "", ">" & value_& "</textarea><br><br><input Name=button Onclick=runex () Type=button value=" "View Effects" >  <input Name=button onclick=asdf.select () Type=button value= "Select All" ">  <input name= Button onclick= "" Asdf.value= "" "" Type=button value= "" Empty "" >  <input onclick=savefile (); Type=button value= "Save Code" "></center>"
Response. Write (TEMPSTR)
End Sub
End Class
%>

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.