- POLLDADDY HACK SCRIPT CODE HOW TO
- POLLDADDY HACK SCRIPT CODE TRIAL
- POLLDADDY HACK SCRIPT CODE LICENSE
TruthSeeker's comment should be sufficient to find it if my article was you need to add the requests module. You should be able to get the information from the site by just inspecting the HTML.
POLLDADDY HACK SCRIPT CODE HOW TO
I tried you're code but seems not working on mine, or I'm just really not familiar on how to use python. Is this working? Please someone answer me. How many votes did you put on number_of_votes variable? The poll_id is the number in the URL (in your case, 9146634), the answer_id can be found by inspecting element on the checkbox for the person you want to vote for, and looking at the value. In the vote.py script, set the poll_id, answer_id, and number_of_votes variables, and then run it. I'm confused as to what exactly I should be replacing in the script PollDaddy's a great solution for casual polls, but don't use it if you don't want scripts to vote easily and quickly. Over 4.5 hours, he rose 3000 votes, and went on to win. If you want to look at the script, or use it yourself, it is up here on my GitHub. That averages out to 1 vote every 5.4 seconds. I didn't want to harass their servers, and 60 seconds seemed like the time to allow it back in.
POLLDADDY HACK SCRIPT CODE TRIAL
After some trial and error, I found that making it sleep for 3 seconds after every request, and then sleeping for 60 seconds once it was blocked was a good point. After ~30 mins of no success, on a whim I tried running the script again, and it was working! So that meant that the server was just blocking for a while before allowing more votes. I figured that it was probably stopping my IP because of the speed of requests, and looked into getting Python's 'requests' module to fake its IP address. The 'revoted' message would show up, and no further votes would be made. Unfortunately, after ~20 requests, it would stop working again. Now it went through! I was getting somewhere. I extracted all of the headers from the valid request, and forced Python to use that header. With the script, however, it was redirecting to /poll/(poll #)/?view=results&msg=revoted&stokenFound.
When you submit the form normally, you're redirected to /poll/(poll #)/?view=results&msg=voted. I set up a Python script to use requests to request the original page, scrape the "data-vote" information into an array, scrape the "pz" value from the hidden input, and construct the URL. The next step was to start up a Python script to spam the hell out of it. The rest of the information I noticed was stored in the "Vote" button under the "data-vote" information.except for "pz", which was weirdly in a hidden input field. The "answer #" was easily extracted by looking at the value for that checkbox. I noticed that it was requesting a URL, of this form: /vote.php?va=30&pt=0&r=0&p=(poll #)&a=(answer #)%2C&o=&t=(random)&token=(random token)&pz=(random code) The next step was to submit the form, and look at the data in Fiddler (a great tool for viewing web interactions). I noted down the poll #, and went to that URL. Luckily, in the HTML right after the div containing the form was a element. That way it removes all of the other loading factors of the blog page. The first step was to find the URL that it was embedding from. I blurred out the data, but this is what the embedded poll form looks like: The poll in question was administered by PollDaddy. I thought I'd see if it was possible to boost his numbers a bit. He was doing okay, but he wasn't close to the lead. One of my best friends siblings was in a poll competition on a popular blog.
POLLDADDY HACK SCRIPT CODE LICENSE