您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
13/12/2022, 4:02:01 pm
Instructions:
1. Make sure you have the https://www.downthemall.org/ extension installed
2. Go to the creators page
3. Click on the photos tab
4. Scroll to the end of the page to load all the images
5. Click on the Greasemonkey extension icon and select "Get Links"
6. Wait for the scrape to complete
7. When completed, click on the Downthemall Extension icon and select the first menu item "Downthemall!"
9. In the filter, write "gm-links", then click the Download button
Notes:
This is the devtools detection script the site uses: https://hotleak.vip/asset/js/detect2.dev.js. Blocking it with an ad blocker doesnt seem to work. I presume there is some other js code that redirects if the script fails to load.
I think the devtools detection script might be this library: https://github.com/AEPKILL/devtools-detector
It should theoretically be possible to alter the https://hotleak.vip/asset/js/detect2.dev.js file and have the page load it using the chrome devtools "local overrides" feature: https://developer.chrome.com/blog/new-in-devtools-65/#overrides
Edit: looks like this userscript disables the devtools detection: https://greasyfork.org/en/scripts/440060-anti-anti-debugger