PSARipper
PSARipper copied to clipboard
Shortner Bypass for PSARips (psa.re) and associated mirrors
https://prnt.sc/4cLNa5ZVakK1 https://prnt.sc/5ySIYSXEnLTB
The links in the output.log for The Flash (https://psa.wf/movie/the-flash-2023/): ============================================================= Unknown The.Flash.2023.1080p.10bit.WEBRip.6CH.x265.HEVC-PSA - https://enit.in/go/dvAkU The.Flash.2023.1080p.10bit.WEBRip.6CH.x265.HEVC-PSA - https://enit.in/go/KPeXZ The.Flash.2023.1080p.10bit.WEBRip.6CH.x265.HEVC-PSA - https://enit.in/go/7j5K Torrents The.Flash.2023.1080p.10bit.WEBRip.6CH.x265.HEVC-PSA - https://enit.in/go/5HOV ============================================================== when clicked (torrent): Not Found...
Terminal shows this when trying to run PSA.py: ImportError: cannot import name 'DEFAULT_CIPHERS' from 'urllib3.util.ssl_' Not sure if I have set up wrong, or the script has been patched again.
``` Traceback (most recent call last): File "D:\SCRIPT\PHYTON\PSARipper\psaripper\PSAEntry.py", line 22, in get_ddl_urls ddlurl = decrypt_url(ddl[1], self.scraper) File "D:\SCRIPT\PHYTON\PSARipper\psaripper\util.py", line 44, in decrypt_url furl = bypass_ouo(ouo_url) File "D:\SCRIPT\PHYTON\PSARipper\psaripper\util.py", line 90, in...
Just wondering, since the project hasn't been updated for 18 months, have you just stopped working on it? Or have they managed to patch out all vulnerabilities?