| 项目 | 关键词 | 说明 |
|---|---|---|
| CHAT GPT | title="open webui" | 查询标题为"open webui"的内容 |
| CLAUDE | fid="FQ3dHXifjTDhHvWGmdsenw==" OR "sk-ant-sid01" | 通过FOFA聚合的站点指纹进行查询 |
| 学术GPT | "GPT 学术优化" | 查询含有"GPT 学术优化"的内容 |
| "GPT 学术优化" && "gpt-4o" | 同时查询含有"GPT 学术优化"和"gpt-4o"的内容 | |
| API | "Simple and powerful ChatGPT app" | 查询duck2api"api-key"内容 |
| ... | ... | ... |
[Utilizing the Fofa sweep, what exactly is its primary underlying logic? I believe that some people have this kind of doubt, the logic is actually very simple, familiar with the various derivative projects on Github, find the corresponding details of the point, use its characteristics to start sweeping. There is nothing else with gold content, and the hard part is in the accumulation.]
In fact things like the above are still just the tip of the iceberg, then again we can use these things to sweep subscriptions, taking clash as an example, common configuration information contains the following:
1proxies:2- name: cc-Hysteria23type: hysteria24server: xxx.xxx.xx.xxx5port: 300006password: fadsfaf7sni: www.bing.com8skip-cert-verify: true
Well, it works if you know how to capture characteristic points, like (Fofa):
xxxxxxxxxx11body='type: hysteria2'
in the 360 web mapping space:
xxxxxxxxxx11response:"'type': 'hysteria2'"
Remember when I posted a table of airports? ~ (I'd like to have a copy sent to me when it's complete, please ~)
| API类型 | Fofa搜索语句 |
|---|---|
| One-api | 默认原始key为sk-fastgpt |
| 代理池API | body="get all proxy from proxy pool" |
| Clash配置 | body="port: 7890" && body="socks-port: 7891" && body="allow-lan: true" |
| DeepLX | body='{"code":200,"message":"DeepL Free API, Developed by sjlleo and missuo. Go to /translate with POST. http://github.com/OwO-Network/DeepLX"}' |
| 扫无密码的GPT-Academic | icon_hash="1871189255" && body!="登录" |
| Clash + V2ray | body="port: 7890" && body="socks-port: 7891" && body="allow-lan: true" |
| Clash + V2ray | body='type: hysteria2' |
| Clash + V2ray | body="get all proxy from proxy pool" |
| Clash + V2ray | body="get all proxy from proxy pool" && country!="CN" |
| Clash + V2ray | protocol=="socks5" && "Version:5 Method:No Authentication(0x00)" && after="1900-01-01" && country="CN" |
| Clash + V2ray | "“89e3175.js”" |
The second explanation: proxy pool crawler project are used in the same open source project, and these open source projects have common features , as long as the search feature word can be retrieved . Such as this open source project:Zoupers/proxy-poolWithin the code is this API presentation page code:Api/ProxyApi.py Searching for body="get all proxies from proxy pool" identified API interface pages that contained this trope. Switching to body="get an usable proxy" also finds some servers that match this type of item~.
<OVER~>