Closed ghost closed 1 year ago
Hellooo
Apparently, they didn't changed anything on the obfuscation side, but they might have finally for some reason encoded their data according to the browser choices. I currently fixed that with https://github.com/Egsagon/neko-sama-api/commit/ad34184823072f98abbee1a90b111358a6b39cb2 by removing encoding for now. Anyway, it should work fine now, just update the package with pip:
pip install -U git+https://github.com/Egsagon/neko-sama-api.git
Thanks for reporting this, have a great day too!
I don't know much about scraping so I couldn't find how they obfuscated the .json
Their obfuscation is really simple. Given any anime, e.g.:
https://neko-sama.fr/anime/info/16800-tensei-shitara-slime-datta-ken-2nd-season-part-2_vostfr
You will have an associated direct URL to its player:
https://fusevideo.net/e/wgD0G79PpODMeoE
Then in that player, just search for the JS file.
It contains a b64 encoded json file, you just have to find it with regexes and decode it and then you got the M3U.
They recentlychanged how they store the obfuscated string, that what #2 was about. In that case we just change the regex.
It's now working just fine, thanks a lot for this really quick fix! And also thanks for the time you spent to explain me what was happening, was really interesting!
No problem :) Have a great day!
Hello! I'm facing a similar issue as this one : #2 Here is the output I get when I try to download any anime :
Would be awesome if this fixable, sorry I don't know much about scraping so I couldn't find how they obfuscated the .json Thanks for this great software, have a great day.