Compare commits

...

2 Commits

Author SHA1 Message Date
2509165036
374b06bb6e 完成作业X 2026-03-24 10:55:03 +08:00
2509165036
5ed4959e22 完成作业X 2026-03-24 10:46:04 +08:00
3 changed files with 43 additions and 0 deletions

37
sh.exe.stackdump Normal file
View File

@@ -0,0 +1,37 @@
Stack trace:
Frame Function Args
0007FFFFCD30 00021006116E (000210281C30, 000210272B51, 0007FFFFCD30, 0007FFFFBA30) msys-2.0.dll+0x2116E
0007FFFFCD30 0002100469BA (000100002000, 000001F70A70, 000001F70A70, 000000000002) msys-2.0.dll+0x69BA
0007FFFFCD30 0002100469F2 (000000000002, 000800007F88, 0007FFFFCD30, 000700000008) msys-2.0.dll+0x69F2
0007FFFFCD30 00021005A029 (0007FFFFCC44, 0007FFFFCD30, 0007FFFFCC8F, 0007FFFFCC73) msys-2.0.dll+0x1A029
0007FFFFCD30 00021005A0DF (645C655C725C635C, 695C745C6E5C655C, 735C2D5C6C5C615C, 655C725C6F5C745C) msys-2.0.dll+0x1A0DF
0007FFFFCD30 000210047151 (000000000000, 000000000000, 000000000000, 000000000000) msys-2.0.dll+0x7151
0007FFFFFFF0 000210045C86 (000000000000, 000000000000, 000000000000, 000000000000) msys-2.0.dll+0x5C86
0007FFFFFFF0 000210045D34 (000000000000, 000000000000, 000000000000, 000000000000) msys-2.0.dll+0x5D34
End of stack trace
Loaded modules:
000100400000 sh.exe
000077A20000 ntdll.dll
000077800000 kernel32.dll
07FEFD8C0000 KERNELBASE.dll
000210040000 msys-2.0.dll
000077920000 USER32.dll
07FEFF9C0000 GDI32.dll
07FEFD930000 LPK.dll
07FEFF720000 USP10.dll
07FEFD940000 msvcrt.dll
07FEFF7F0000 advapi32.dll
07FEFF8D0000 sechost.dll
07FEFEEC0000 RPCRT4.dll
07FEFD410000 cryptbase.dll
07FEFF990000 IMM32.DLL
07FEFF5A0000 MSCTF.dll
07FEFB440000 netapi32.dll
07FEFB430000 netutils.dll
07FEFCF80000 srvcli.dll
07FEFB410000 wkscli.dll
07FEFB3F0000 SAMCLI.DLL
07FEFBBC0000 SAMLIB.dll
07FEFF6B0000 ws2_32.dll
07FEFFD00000 NSI.dll
07FEFCCC0000 mswsock.dll

Submodule task-2-1-data-collection added at 545a1e905e

5
text.py Normal file
View File

@@ -0,0 +1,5 @@
import requests
url = "https://m.douban.com/subject_collection/ECGRADN5Q"
response = requests.get(url,headers=header,params={'key':'value'})
print(response.status_code)
//*[@id="content"]/h1/span[1]