forked from phanirithvij/twist.moe
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdecrypt.py
51 lines (41 loc) · 1.52 KB
/
decrypt.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# Code taken from
# https://github.com/vn-ki/anime-downloader
# All rights to Vishnunarayan K I
from Crypto import Random
from Crypto.Cipher import AES
import base64
from hashlib import md5
import sys
BLOCK_SIZE = 16
KEY = b"k8B$B@0L8D$tDYHGmRg98sQ7!%GOEGOX27T"
# From stackoverflow https://stackoverflow.com/questions/36762098/how-to-decrypt-password-from-javascript-cryptojs-aes-encryptpassword-passphras
def pad(data):
length = BLOCK_SIZE - (len(data) % BLOCK_SIZE)
return data + (chr(length)*length).encode()
def unpad(data):
return data[:-(data[-1] if type(data[-1]) == int else ord(data[-1]))]
def bytes_to_key(data, salt, output=48):
# extended from https://gist.github.com/gsakkis/4546068
assert len(salt) == 8, len(salt)
data += salt
key = md5(data).digest()
final_key = key
while len(final_key) < output:
key = md5(key + data).digest()
final_key += key
return final_key[:output]
def decrypt(encrypted, passphrase):
encrypted = base64.b64decode(encrypted)
assert encrypted[0:8] == b"Salted__"
salt = encrypted[8:16]
key_iv = bytes_to_key(passphrase, salt, 32+16)
key = key_iv[:32]
iv = key_iv[32:]
aes = AES.new(key, AES.MODE_CBC, iv)
return unpad(aes.decrypt(encrypted[16:]))
if sys.argv:
if len(sys.argv[1:]) > 1:
for l in sys.argv[1:]:
print(decrypt(l.encode('utf-8'), KEY).decode('utf-8').lstrip(' '))
elif len(sys.argv[1:]) == 1:
print(decrypt((sys.argv[1]).encode('utf-8'), KEY).decode('utf-8').lstrip(' '))