2.75 score from hupso.pl for:
true-binary.com



HTML Content


Titletrue-binary.com

Length: 15, Words: 2
Description pusty

Length: 0, Words: 0
Keywords pusty
Robots
Charset UTF-8
Og Meta - Title pusty
Og Meta - Description pusty
Og Meta - Site name pusty
Tytuł powinien zawierać pomiędzy 10 a 70 znaków (ze spacjami), a mniej niż 12 słów w długości.
Meta opis powinien zawierać pomiędzy 50 a 160 znaków (łącznie ze spacjami), a mniej niż 24 słów w długości.
Kodowanie znaków powinny być określone , UTF-8 jest chyba najlepszy zestaw znaków, aby przejść z powodu UTF-8 jest bardziej międzynarodowy kodowaniem.
Otwarte obiekty wykresu powinny być obecne w stronie internetowej (więcej informacji na temat protokołu OpenGraph: http://ogp.me/)

SEO Content

Words/Characters 3852
Text/HTML 27.50 %
Headings H1 2
H2 9
H3 12
H4 1
H5 0
H6 0
H1
true-binary.com
pcryptsy is a gui for cryptsy.com with the ability to calculate and plot charts
tweet pcryptsy is a complete python application with pyqt4 frontend (qtcore, qtgui, qtwebkit). it’s using a modified version of pycryptsy module to connect to the official cryptsy.com web-api. you need to have python-matplotlib installed to plot graphics – pcryptsy is using parsed json data from website to get the coin values (files can get up to ~10mb) keep overview of your current balances: keep track of current altcoin values as well as sell/buy orders: create and delete buy/sell orders: view live-website inside: calculate and plot ema chart based on the last 22 days: debian requirements: python-qt4 python-matplotlib to install requirements: sudo apt-get update && sudo apt-get install python-qt4 python-matplotlib all you need is your cryptsy.com api public key and private key (cryptsy.com – settings) to run it, simply type: ./pcryptsy or python pcryptsy here is a beta version which was tested on a debian system (python3) as well as on a windows xp sp3 (python 2.7): [download id=”1″ display=”name”] md5: 08d20dca5f4e716bbd31c5eae297a062 [download id=”2″ display=”name”] md5: ed8b9f217e549aa125e98f2bad4a06ba try it and have fun! donate: btc 1rrxxfv8k9o469s5rri2udv6s37fpea55 ltc lheuwftiwbuahxhmx1h9aycrapy98jfvwn btw: i tryed to create, both, linux and windows executables – linux executables work with a size around 100mb which is too big in my opinion and windows? god damn, who needs it anyway…

1rrxxfv8k9o469s5rri2udv6s37fpea55 share your thoughts
H2
live tweets in command line using python — june 1, 2015
replacing bookmarks in a word document with python — may 4, 2015
pcryptsy – a graphical cryptsy.com – trading client — january 12, 2014
the n9 as an evil access point #mitm — february 1, 2013
1. tcpdump + tcpxtract:
2. ngrep
3. dsniff
4. sslstrip?
tor (the onion router) on meego harmattan — december 19, 2012
H3
how it looks?
how it works?
where’s the code?
how to run it?
here is a beta version which was tested on a debian system (python3)
as well as on a windows xp sp3 (python 2.7):
recent posts
categories
links
tags
archives
@timemenu
H4 who hasn’t always opened a linux terminal? well, for the ones who do, here’s a little python script which brings you live tweets directly to your bash, using your keywords
H5
H6
strong
pcryptsy is a gui for cryptsy.com with the ability to calculate and plot charts
[download id=”1″ display=”name”]

[download id=”2″ display=”name”]


1rrxxfv8k9o469s5rri2udv6s37fpea55
lheuwftiwbuahxhmx1h9aycrapy98jfvwn
open mode
1. tcpdump + tcpxtract 2. ngrep 3. dsniff [dsniff itself] 4. ssldump?

1. tcpdump + tcpxtract:
2. ngrep

ohyes
itworks
http%3a%2f%2fwww.true-binary.com%2fwp-admin%2f
3. dsniff
thisis
htaccessdump
thisis
ftpdump
4. sslstrip?
www.facebook.com
thisis%40just.an
example
here’s a quick and dirty howto run the tor-service on your meego/harmattan device for anonymous internet traffic:
… tor should be staring up as a daemon now!
tor for all traffic
tor in background
stop tor
unset system-wide proxy
b
i
em pcryptsy is a gui for cryptsy.com with the ability to calculate and plot charts
[download id=”1″ display=”name”]

[download id=”2″ display=”name”]


1rrxxfv8k9o469s5rri2udv6s37fpea55
lheuwftiwbuahxhmx1h9aycrapy98jfvwn
open mode
1. tcpdump + tcpxtract 2. ngrep 3. dsniff [dsniff itself] 4. ssldump?

1. tcpdump + tcpxtract:
2. ngrep

ohyes
itworks
http%3a%2f%2fwww.true-binary.com%2fwp-admin%2f
3. dsniff
thisis
htaccessdump
thisis
ftpdump
4. sslstrip?
www.facebook.com
thisis%40just.an
example
here’s a quick and dirty howto run the tor-service on your meego/harmattan device for anonymous internet traffic:
… tor should be staring up as a daemon now!
tor for all traffic
tor in background
stop tor
unset system-wide proxy
Bolds strong 32
b 0
i 0
em 32
Zawartość strony internetowej powinno zawierać więcej niż 250 słów, z stopa tekst / kod jest wyższy niż 20%.
Pozycji używać znaczników (h1, h2, h3, ...), aby określić temat sekcji lub ustępów na stronie, ale zwykle, użyj mniej niż 6 dla każdego tagu pozycje zachować swoją stronę zwięzły.
Styl używać silnych i kursywy znaczniki podkreślić swoje słowa kluczowe swojej stronie, ale nie nadużywać (mniej niż 16 silnych tagi i 16 znaczników kursywy)

Statystyki strony

twitter:title pusty
twitter:description pusty
google+ itemprop=name pusty
Pliki zewnętrzne 10
Pliki CSS 5
Pliki javascript 5
Plik należy zmniejszyć całkowite odwołanie plików (CSS + JavaScript) do 7-8 maksymalnie.

Linki wewnętrzne i zewnętrzne

Linki 119
Linki wewnętrzne 0
Linki zewnętrzne 119
Linki bez atrybutu Title 59
Linki z atrybutem NOFOLLOW 0
Linki - Użyj atrybutu tytuł dla każdego łącza. Nofollow link jest link, który nie pozwala wyszukiwarkom boty zrealizują są odnośniki no follow. Należy zwracać uwagę na ich użytkowania

Linki wewnętrzne

pusty

Linki zewnętrzne

true-binary.com http://www.true-binary.com/
live tweets in command line using python — http://www.true-binary.com/?p=468
tweet https://twitter.com/share
- http://www.true-binary.com/wp-content/uploads/2015/06/unbenannt.png
https://dev.twitter.com/apps/new https://dev.twitter.com/apps/new
[download] http://www.true-binary.com/wp-content/uploads/2015/06/livetweet.tar.gz
share your thoughts http://www.true-binary.com/?p=468#respond
replacing bookmarks in a word document with python — http://www.true-binary.com/?p=456
tweet https://twitter.com/share
[download] http://www.true-binary.com/wp-content/uploads/2015/05/bookmarkfiller.tar
share your thoughts http://www.true-binary.com/?p=456#respond
pcryptsy – a graphical cryptsy.com – trading client — http://www.true-binary.com/?p=383
tweet https://twitter.com/share
pycryptsy https://github.com/salfter/pycryptsy
- http://www.true-binary.com/wp-content/uploads/2014/01/mybalances_fin1.png
- http://www.true-binary.com/wp-content/uploads/2014/01/sellbuyorders_fin.png
- http://www.true-binary.com/wp-content/uploads/2014/01/order_fin.png
- http://www.true-binary.com/wp-content/uploads/2014/01/webkit_fin.png
- http://www.true-binary.com/wp-content/uploads/2014/01/ema_fin_big.png
share your thoughts http://www.true-binary.com/?p=383#respond
the n9 as an evil access point #mitm — http://www.true-binary.com/?p=358
- http://www.true-binary.com/wp-content/uploads/2013/02/mitm.jpg
opensh_1.00_armel http://www.true-binary.com/wp-content/uploads/2012/12/opensh_1.00_armel.deb
setup repository http://www.who.is.free.fr/wiki/doku.php?id=harmattan#setup_repo_on_device
tcpxtract_1.0.1-5_armel http://www.true-binary.com/wp-content/uploads/2013/01/tcpxtract_1.0.1-5_armel.deb
this http://www.true-binary.com/tcpxtract_out/
ngrep_1.45.ds2-9_armel http://www.true-binary.com/wp-content/uploads/2013/01/ngrep_1.45.ds2-9_armel.deb
libdb4.6_4.6.21-16_armel http://www.true-binary.com/wp-content/uploads/2013/01/libdb4.6_4.6.21-16_armel.deb
libnids1.21_1.23-2_armel http://www.true-binary.com/wp-content/uploads/2013/01/libnids1.21_1.23-2_armel.deb
dsniff_2.4b1+debian-18_armel http://www.true-binary.com/wp-content/uploads/2013/01/dsniff_2.4b1+debian-18_armel.deb
sslstrip-0.9 http://www.true-binary.com/wp-content/uploads/2013/02/sslstrip-0.9.tar.gz
1 comment http://www.true-binary.com/?p=358#comments
tor (the onion router) on meego harmattan — http://www.true-binary.com/?p=316
- http://www.true-binary.com/wp-content/uploads/2012/12/tor-170x170.png
opensh_1.00_armel http://www.true-binary.com/wp-content/uploads/2012/12/opensh_1.00_armel.deb
setup repository http://www.who.is.free.fr/wiki/doku.php?id=harmattan#setup_repo_on_device
- http://www.true-binary.com/wp-content/uploads/2012/12/2012-12-19_20-28-47.png
torswitch0.1 http://www.true-binary.com/wp-content/uploads/2012/12/torswitch0.1.deb
46 comments http://www.true-binary.com/?p=316#comments
< older entries http://www.true-binary.com/?paged=2
live tweets in command line using python http://www.true-binary.com/?p=468
replacing bookmarks in a word document with python http://www.true-binary.com/?p=456
pcryptsy – a graphical cryptsy.com – trading client http://www.true-binary.com/?p=383
android http://www.true-binary.com/?cat=35
bitcoin http://www.true-binary.com/?cat=97
codes http://www.true-binary.com/?cat=3
coding http://www.true-binary.com/?cat=98
computing http://www.true-binary.com/?cat=6
data-flows http://www.true-binary.com/?cat=36
debian http://www.true-binary.com/?cat=68
desktops http://www.true-binary.com/?cat=11
eeepc http://www.true-binary.com/?cat=12
eye-candy http://www.true-binary.com/?cat=21
g1 http://www.true-binary.com/?cat=64
htc-linux http://www.true-binary.com/?cat=20
linux http://www.true-binary.com/?cat=18
meego http://www.true-binary.com/?cat=69
openmoko http://www.true-binary.com/?cat=32
other http://www.true-binary.com/?cat=7
photography http://www.true-binary.com/?cat=63
python http://www.true-binary.com/?cat=96
scene news http://www.true-binary.com/?cat=30
services http://www.true-binary.com/?cat=57
site-news http://www.true-binary.com/?cat=26
software http://www.true-binary.com/?cat=66
ubuntu http://www.true-binary.com/?cat=15
uncategorized http://www.true-binary.com/?cat=1
wortspiele http://www.true-binary.com/?cat=9
@timemenu https://twitter.com/timemenu
ap0calypse http://ap0calypse.agitatio.org/
android for openmoko http://www.true-binary.com/?tag=android-for-openmoko
android from source http://www.true-binary.com/?tag=android-from-source
android image http://www.true-binary.com/?tag=android-image
android jffs2 http://www.true-binary.com/?tag=android-jffs2
android kernel http://www.true-binary.com/?tag=android-kernel
backup http://www.true-binary.com/?tag=backup
backup scirpt http://www.true-binary.com/?tag=backup-scirpt
bild flackert tv out http://www.true-binary.com/?tag=bild-flackert-tv-out
building android for freerunner from source http://www.true-binary.com/?tag=building-android-for-freerunner-from-source
caller lookup android http://www.true-binary.com/?tag=caller-lookup-android
call lookup http://www.true-binary.com/?tag=call-lookup
change keyboard layout g1 qwertz http://www.true-binary.com/?tag=change-keyboard-layout-g1-qwertz
copie fingerprints http://www.true-binary.com/?tag=copie-fingerprints
daily build android http://www.true-binary.com/?tag=daily-build-android
debian http://www.true-binary.com/?tag=debian
eeepc wlan ubuntu http://www.true-binary.com/?tag=eeepc-wlan-ubuntu
eepc ubuntu wlan problem http://www.true-binary.com/?tag=eepc-ubuntu-wlan-problem
fingerabrduck nehmen http://www.true-binary.com/?tag=fingerabrduck-nehmen
funny unix commands http://www.true-binary.com/?tag=funny-unix-commands
git clone http://www.true-binary.com/?tag=git-clone
hacked hostinfo to openmoko http://www.true-binary.com/?tag=hacked-hostinfo-to-openmoko
incoming call lookup austria http://www.true-binary.com/?tag=incoming-call-lookup-austria
incoming call lookup ã¶sterreich http://www.true-binary.com/?tag=incoming-call-lookup-osterreich
kaffeine-sc-plugin ubuntu http://www.true-binary.com/?tag=kaffeine-sc-plugin-ubuntu
kevin mitnick http://www.true-binary.com/?tag=kevin-mitnick
linux tv out http://www.true-binary.com/?tag=linux-tv-out
lookup incoming call austria http://www.true-binary.com/?tag=lookup-incoming-call-austria
new android image http://www.true-binary.com/?tag=new-android-image
nvidia tv out linux http://www.true-binary.com/?tag=nvidia-tv-out-linux
nvidia tv out xorg http://www.true-binary.com/?tag=nvidia-tv-out-xorg
nvidia tv out xorg.conf http://www.true-binary.com/?tag=nvidia-tv-out-xorgconf
om2008.9 http://www.true-binary.com/?tag=om20089
openmoko http://www.true-binary.com/?tag=openmoko
pyhton backup script http://www.true-binary.com/?tag=pyhton-backup-script
qi http://www.true-binary.com/?tag=qi
take fingerprints http://www.true-binary.com/?tag=take-fingerprints
true-binary http://www.true-binary.com/?tag=true-binary
true-binary.com http://www.true-binary.com/?tag=true-binarycom
tv out debian http://www.true-binary.com/?tag=tv-out-debian
tv out ubuntu http://www.true-binary.com/?tag=tv-out-ubuntu
tv out xorg http://www.true-binary.com/?tag=tv-out-xorg
ubuntu http://www.true-binary.com/?tag=ubuntu
www.true-binary.com http://www.true-binary.com/?tag=wwwtrue-binarycom
xbox live meego http://www.true-binary.com/?tag=xbox-live-meego
xbox meego http://www.true-binary.com/?tag=xbox-meego
tweets von @timemenu https://twitter.com/timemenu
wordpress http://wordpress.org/
entries (rss) http://www.true-binary.com/?feed=rss2
comments (rss) http://www.true-binary.com/?feed=comments-rss2

Zdjęcia

Zdjęcia 14
Zdjęcia bez atrybutu ALT 0
Zdjęcia bez atrybutu TITLE 5
Korzystanie Obraz ALT i TITLE atrybutu dla każdego obrazu.

Zdjęcia bez atrybutu TITLE

http://www.true-binary.com/wp-content/uploads/2015/06/unbenannt-1024x138.png
http://www.true-binary.com/wp-includes/images/smilies/icon_razz.gif
http://www.true-binary.com/wp-includes/images/smilies/icon_smile.gif
http://www.true-binary.com/wp-includes/images/smilies/icon_smile.gif
http://www.true-binary.com/wp-includes/images/smilies/icon_smile.gif

Zdjęcia bez atrybutu ALT

empty

Ranking:


Alexa Traffic
Daily Global Rank Trend
Daily Reach (Percent)









Majestic SEO











Text on page:

true-binary.com code is poetry… live tweets in command line using python — june 1, 2015 tweet who hasn’t always opened a linux terminal? well, for the ones who do, here’s a little python script which brings you live tweets directly to your bash, using your keywords how it looks? how it works? create your twitter application here: https://dev.twitter.com/apps/new fill the following four strings in the python script with your keys/tokens in the #auth section: consumer_key consumer_secret access_token access_token_secret where’s the code? here you go: livetweet.py python #!/bin/python # -*- coding: iso-8859-15 -*- import tweepy import json #auth: consumer_key = '' consumer_secret = '' access_token = '' access_token_secret = '' #auth:end keyword = raw_input("keyword: ") class bcolors: header = '\033[95m' okblue = '\033[94m' okgreen = '\033[92m' warning = '\033[93m' fail = '\033[91m' endc = '\033[0m' bold = '\033[1m' underline = '\033[4m' class stdoutlistener(tweepy.streamlistener): def on_data(self, data): decoded = json.loads(data) str_tweet = bcolors.header + '@%s' % (decoded['user']['screen_name']) str_tweet1 = str_tweet + bcolors.endc str_tweet2 = ': %s' % (decoded['text'].encode('ascii', 'ignore')) str_tweet3 = str_tweet1 + str_tweet2 if keyword.lower() in str_tweet3.lower(): newstring = str_tweet3.lower().replace(keyword.lower(), bcolors.okgreen + keyword.upper() + bcolors.endc) print newstring else: print str_tweet3 print '' return true def on_error(self, status): print status if __name__ == '__main__': l = stdoutlistener() auth = tweepy.oauthhandler(consumer_key, consumer_secret) auth.set_access_token(access_token, access_token_secret) stream = tweepy.stream(auth, l) stream.filter(track=[keyword]) 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849 #!/bin/python# -*- coding: iso-8859-15 -*-import tweepyimport json #auth:consumer_key = ''consumer_secret = ''access_token = ''access_token_secret = ''#auth:end keyword = raw_input("keyword: ") class bcolors: header = '\033[95m' okblue = '\033[94m' okgreen = '\033[92m' warning = '\033[93m' fail = '\033[91m' endc = '\033[0m' bold = '\033[1m' underline = '\033[4m' class stdoutlistener(tweepy.streamlistener): def on_data(self, data): decoded = json.loads(data) str_tweet = bcolors.header + '@%s' % (decoded['user']['screen_name']) str_tweet1 = str_tweet + bcolors.endc str_tweet2 = ': %s' % (decoded['text'].encode('ascii', 'ignore')) str_tweet3 = str_tweet1 + str_tweet2 if keyword.lower() in str_tweet3.lower(): newstring = str_tweet3.lower().replace(keyword.lower(), bcolors.okgreen + keyword.upper() + bcolors.endc) print newstring else: print str_tweet3 print '' return true def on_error(self, status): print status if __name__ == '__main__': l = stdoutlistener() auth = tweepy.oauthhandler(consumer_key, consumer_secret) auth.set_access_token(access_token, access_token_secret) stream = tweepy.stream(auth, l) stream.filter(track=[keyword]) [download] how to run it? as it’s using the tweepy module, you need to install it: sudo pip install tweepy and finally execute it: python livetweet.py have fun! share your thoughts replacing bookmarks in a word document with python — may 4, 2015 tweet the last days i was fighting around with how to replace a bookmark in a word (docx) document. after years of python programming i thought that this would be a simple task, helped by a python module. weeell emmm, i was wrong! what i learned was that a word document is a simple zip-file, with a folder structure and a few xml-documents. here is a code which uncompresses the file, changes the defined bookmarks and recompresses it (in a new file) as a word document: python #!/bin/python # -*- coding: iso-8859-15 -*- import os, sys import zipfile program_name = sys.argv[0] arguments = sys.argv[1:] count = len(arguments) bookmarks = {} srcfile = "" dstfile = "" if len(sys.argv) < 2: print """usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination file]\n\t b=[bookmarkname]=[bookmark value]\n\t\n\tfunction b= can be used multiple times.""" sys.exit() for x in arguments: a = x.split(" ") for args in a: if a[0].startswith("b"): bookmarkitem = a[0].split("=") bookmarks[bookmarkitem[1]] = bookmarkitem[2] elif a[0].startswith("src"): srcfile = (a[0].split("="))[1] elif a[0].startswith("dst"): dstfile = (a[0].split("="))[1] elif a[0] == " " or "-h" or "--help" or " " or not sys.argv[1]: print """usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination file]\n\t b=[bookmarkname]=[bookmark value]\n\t\n\tfunction b= can be used multiple times.""" sys.exit() else: pass def opendocx(): with zipfile.zipfile(srcfile, "r") as z: z.extractall("tmp/") docfileh = "tmp/word/document.xml" docfile = open(docfileh,"r") docfilecontent = docfile.readlines() docfilecontentnew = "" for line in docfilecontent: for x in bookmarks.keys(): print "searching for ", x if x in line: print "replaced ", x insertstring = u"%s" % bookmarks[x] whereami = line.find(x) needtogo = whereami + len(x) + 3 needtogoend = needtogo + len(insertstring) line = line[:needtogo] + insertstring + line[needtogo:] docfilecontentnew = line else: docfilecontentnew = line print "bookmark not found" pass docfilecontentnew = docfilecontent[0] + docfilecontentnew docfile.close() docfile = open(docfileh,"w") docfile.write(docfilecontentnew) docfile.close() zip = zipfile.zipfile(dstfile, 'w', zipfile.zip_deflated) source = "tmp" rootlen = len(source) + 1 for base, dirs, files in os.walk(source): for file in files: fn = os.path.join(base, file) zip.write(fn, fn[rootlen:]) os.system("rm -rf tmp") a = opendocx() 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475 #!/bin/python# -*- coding: iso-8859-15 -*- import os, sysimport zipfile program_name = sys.argv[0]arguments = sys.argv[1:]count = len(arguments) bookmarks = {}srcfile = ""dstfile = "" if len(sys.argv) < 2: print """usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination file]\n\t b=[bookmarkname]=[bookmark value]\n\t\n\tfunction b= can be used multiple times.""" sys.exit() for x in arguments: a = x.split(" ") for args in a: if a[0].startswith("b"): bookmarkitem = a[0].split("=") bookmarks[bookmarkitem[1]] = bookmarkitem[2] elif a[0].startswith("src"): srcfile = (a[0].split("="))[1] elif a[0].startswith("dst"): dstfile = (a[0].split("="))[1] elif a[0] == " " or "-h" or "--help" or " " or not sys.argv[1]: print """usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination file]\n\t b=[bookmarkname]=[bookmark value]\n\t\n\tfunction b= can be used multiple times.""" sys.exit() else: pass def opendocx(): with zipfile.zipfile(srcfile, "r") as z: z.extractall("tmp/") docfileh = "tmp/word/document.xml" docfile = open(docfileh,"r") docfilecontent = docfile.readlines() docfilecontentnew = "" for line in docfilecontent: for x in bookmarks.keys(): print "searching for ", x if x in line: print "replaced ", x insertstring = u"%s" % bookmarks[x] whereami = line.find(x) needtogo = whereami + len(x) + 3 needtogoend = needtogo + len(insertstring) line = line[:needtogo] + insertstring + line[needtogo:] docfilecontentnew = line else: docfilecontentnew = line print "bookmark not found" pass docfilecontentnew = docfilecontent[0] + docfilecontentnew docfile.close() docfile = open(docfileh,"w") docfile.write(docfilecontentnew) docfile.close() zip = zipfile.zipfile(dstfile, 'w', zipfile.zip_deflated) source = "tmp" rootlen = len(source) + 1 for base, dirs, files in os.walk(source): for file in files: fn = os.path.join(base, file) zip.write(fn, fn[rootlen:]) os.system("rm -rf tmp") a = opendocx() [download] it’s all pretty basic, but it should help understanding the stupidness of microsoft!!! cheers share your thoughts pcryptsy – a graphical cryptsy.com – trading client — january 12, 2014 pcryptsy is a gui for cryptsy.com with the ability to calculate and plot charts tweet pcryptsy is a complete python application with pyqt4 frontend (qtcore, qtgui, qtwebkit). it’s using a modified version of pycryptsy module to connect to the official cryptsy.com web-api. you need to have python-matplotlib installed to plot graphics – pcryptsy is using parsed json data from website to get the coin values (files can get up to ~10mb) keep overview of your current balances: keep track of current altcoin values as well as sell/buy orders: create and delete buy/sell orders: view live-website inside: calculate and plot ema chart based on the last 22 days: debian requirements: python-qt4 python-matplotlib to install requirements: sudo apt-get update && sudo apt-get install python-qt4 python-matplotlib all you need is your cryptsy.com api public key and private key (cryptsy.com – settings) to run it, simply type: ./pcryptsy or python pcryptsy here is a beta version which was tested on a debian system (python3) as well as on a windows xp sp3 (python 2.7): [download id=”1″ display=”name”] md5: 08d20dca5f4e716bbd31c5eae297a062 [download id=”2″ display=”name”] md5: ed8b9f217e549aa125e98f2bad4a06ba try it and have fun! donate: btc 1rrxxfv8k9o469s5rri2udv6s37fpea55 ltc lheuwftiwbuahxhmx1h9aycrapy98jfvwn btw: i tryed to create, both, linux and windows executables – linux executables work with a size around 100mb which is too big in my opinion and windows? god damn, who needs it anyway… 1rrxxfv8k9o469s5rri2udv6s37fpea55 share your thoughts the n9 as an evil access point #mitm — february 1, 2013 prelude: i used it in all these tools for development and privat use, e.g. you shouldn’t use it in a coffee-shop, call your hotspot “free-wifi” and turn the encryption off the last month i looked for a way to use my n9 as package sniffer and i figured out some usefull stuff … … my train of thought was – how can i sniff whatever it’s transmitted through my stock wifi-hotspot (joikuspot) … … so here’s a guideline of what i got working and how it works: my device: nokia n9, linux rm 696 2.6.32.54-dfl-161-20121301 open mode, meego harmattan pr1.3 pre-dependencies: opensh_1.00_armel enable rzr’s repository (setup repository) i am working in open mode, so i dont know if it works with the stock kernel!!! 1. tcpdump + tcpxtract 2. ngrep 3. dsniff [dsniff itself] 4. ssldump? 1. tcpdump + tcpxtract: tcpdump is a very powerful package analyzer – you can dump nearly all traffic with this tool … tcpxtract is a tool to rebuild data from tcpdump-pcap files… let’s install the packages [and dependencies]: apt-get install tcpdump libpcap0.8 i took the tcpxtract_1.0.1-5_armel package out of the debian repository. dpkg -i tcpxtract_1.0.1-5_armel.deb now fire up the wifi hotspot, connect with a client and let the magic begin: mkdir tcpxtract_out/ tcpdump -i wlan0 -n -s 1500 -w tcpdump_http.pcap port 80 # we are starting tcpdump on interface [-i] wlan0, set the snaplen to 1500 [-s], don’t convert addresses to names [-n] and listen only on port 80 [port 80] open a website on the client … tcpdump will capture it. when you think you are finished, kill tcpdump [crtl+c] now we will convert the captured traffic: /home/user/dev/tcpplay # tcpxtract -f tcpdump_http.pcap -o tcpxtract_out/ found file of type “html” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000000.html found file of type “png” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000001.png found file of type “png” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000002.png found file of type “png” in session [192.168.20.20:26079 -> 82.150.199.80:20480], exporting to tcpxtract_out/00000003.png … … found file of type “png” in session [92.122.212.57:20480 -> 192.168.20.20:30431], exporting to tcpxtract_out/00000021.png it looks like this. i like! 2. ngrep ngrep is a very powerful tool as well – you can analyze traffic live… i’m going to show you how to filter the traffic by some regular expressions to look for logins: first install the necessary dependencies and ngrep itself: apt-get install lipcap0.8 here’s ngrep_1.45.ds2-9_armel [from debian repository] dpkg -i ngrep ngrep_1.45.ds2-9_armel.deb now fire up the wifi hotspot, connect with a client and let the magic begin [again ;)]: /home/user/dev/sniffer # ngrep ‘[&\s?](?:login|user(?:name|)|p(ass(?:word|wd|)|w|wd))[\s:=]\s?([^&\s]*)’ -q -i -d gprs0 port 80 or port 25 or port 110 -l interface: gprs0 (123.123.123.123/255.255.255.255) filter: (ip or ip6) and ( port 80 or port 25 or port 110 ) match: [&\s?](?:login|user(?:name|)|p(ass(?:word|wd|)|w|wd))[\s:=]\s?([^&\s]*) t 123.123.123.123:61342 -> 82.150.199.80:80 [ap] log=ohyes&pwd=itworks&wp-submit=log+in&redirect_to=http%3a%2f%2fwww.true-binary.com%2fwp-admin%2f&testcookie=1 # we are starting ngrep with a regular expression filter, tell it to be quiet [-q], to ignore case [-i], to use interface gprs0 [-d] (i had segment faults when i started it on wlan0 … from time to time), -l to make the stdout line buffered [-l] (usefull when capturing to a file {2>&1 >ngrep.log}) and filter the traffic by ports [port 80 or port 25 or port 110] … what it doesn’t do is capturing htaccess logins, i use dsniff for it. 3. dsniff dsniff? – omg, it’s awesome! it includes: arpspoof  – send out unrequested (and possibly forged) arp replies. dnsspoof  – forge replies to arbitrary dns address / pointer queries on the local area network. dsniff    – password sniffer for several protocols. filesnarf – saves selected files sniffed from nfs traffic. macof     – flood the local network with random mac addresses. mailsnarf – sniffs mail on the lan and stores it in mbox format. msgsnarf  – record selected messages from different instant messengers. sshmitm   – ssh monkey-in-the-middle. proxies and sniffs ssh traffic. sshow     – ssh traffic analyser. tcpkill   – kills specified in-progress tcp connections. tcpnice   – slow down specified tcp connections via “active” traffic shaping. urlsnarf  – output selected urls sniffed from http traffic in clf. webmitm   – http / https monkey-in-the-middle. transparently proxies. webspy    – sends urls sniffed from a client to your local browser (requires libx11-6 installed). dsniff does have some more dependencies than the other tools i described: i took the libdb4.6_4.6.21-16_armel and libnids1.21_1.23-2_armel from the debian repository. here’s dsniff_2.4b1+debian-18_armel apt-get install libnet1 libpcap0.8 libssl0.9.8 openssl dpkg -i libdb4.6_4.6.21-16_armel.deb dpkg -i libnids1.21_1.23-2_armel.deb dpkg -i dsniff_2.4b1+debian-18_armel.deb whooop! – should be working now dsniff itself is very simple to use – it has a build-in filter. i used it to sniff the authentication for htaccess logins as well as ftp logins: /home/user/dev/sniffer # dsniff -m -s 1500 -i gprs0 dsniff: listening on gprs0 —————– 01/31/13 10:45:02 tcp 123.123.123.123.61056 -> p111.111.111.111.some.isp.com.80 (http) get / http/1.0 host: server.idonttellyou.com authorization: basic dghpc2lzomh0ywnjzxnzzhvtca== [thisis:htaccessdump] —————– 01/31/13 10:47:22 tcp 123.123.123.123.57838 -> 82.150.199.80.21 (ftp) user thisis pass ftpdump # we are starting dsniff with automatic protocol detection [-m], set the snaplen to 1500 [-s] and listen on interface gprs0 [-i] … again i got segment faults when listening on wlan0. 4. sslstrip? sslstrip strips down your https connections to http … … i found a way to pipe your local connection through sslstrip, but not with the hotspot connected client. all i did was to modify my apn connection – i activated the http_proxy on 127.0.0.1 and port 10000, and changed a gconf setting (gconftool-2 -t string -s /system/proxy/mode “manual”) – deactivate and activate the connection again and fire up sslstrip. an alternative for testing is to set the http proxy in firefox. what i figured out was: the joikuspot doesn’t use the apn entry from the phone settings, because i tried to add a second apn with some changed settings and it won’t show up in the properties of joikuspot. – maybe that’s why it doesn’t take the proxy settings from the apn … anyway, i’m still working on a workaround! here’s sslstrip-0.9 (taken from http://www.thoughtcrime.org/) /home/user/dev/sniffer/# apt-get install python-twisted-web /home/user/dev/sniffer # tar xzf sslstrip-0.9.tar.gz && cd sslstrip-0.9 /home/user/dev/sniffer/sslstrip-0.9 # python setup.py build running build running build_py running build_scripts copying and adjusting sslstrip/sslstrip -> build/scripts-2.6 cleaning up… /home/user/dev/sniffer/sslstrip-0.9 # python setup.py install running install running build running build_py running build_scripts copying and adjusting sslstrip/sslstrip -> build/scripts-2.6 running install_lib running install_scripts copying build/scripts-2.6/sslstrip -> /usr/local/bin changing mode of /usr/local/bin/sslstrip to 755 running install_data running install_egg_info removing /usr/local/lib/python2.6/dist-packages/sslstrip-0.9.egg-info writing /usr/local/lib/python2.6/dist-packages/sslstrip-0.9.egg-info cleaning up… /home/user/dev/sniffer/sslstrip-0.9 # ln -s /usr/local/bin/sslstrip /usr/bin/ /home/user/dev/sniffer/sslstrip-0.9 # gconftool-2 -t string -s /system/proxy/mode “manual” /home/user/dev/sniffer/sslstrip-0.9 # sslstrip -l 10000 -w ../sslstrip.log & /home/user/dev/sniffer/sslstrip-0.9 # tail -f ../sslstrip.log 2013-01-31 23:57:56,683 secure post data (www.facebook.com): lsd=avpjtuug&email=thisis%40just.an&pass=example&default_persistent=0&charset_test=%e2%82%ac%2c%c2%b4%2c%e2%82%ac%2c … i also got the webmitm/mitmproxy running (fakes ssl-certifications, but as it’s not a very efficient and elegant way to work, so i won’t explain it) cheers! 1 comment tor (the onion router) on meego harmattan — december 19, 2012 here’s a quick and dirty howto run the tor-service on your meego/harmattan device for anonymous internet traffic: pre-dependencies: inception opensh_1.00_armel (incept the package … you need it to gain more rights) after the inception of opensh, you can try to check if it worked: ~ $ id uid=29999(user) gid=29999(users) groups=0(root),20(dialout),44(video),670(pulse-access),29999(users),30011(metadata-users),30016(gallerycoredata-users),30019(calendar),9990210,9990276,9990277,9990279,9990281, 9990282,9990284,9990285,9990286,9990287,9990288,9990289,9990609 ~ $ opensh /home/user # id uid=0(root) gid=0(root) groups=0(root),1(daemon),2(bin),3(sys),4(adm),5(tty),6(disk),7(lp),8(mail), 9(news),10(uucp),12(man),13(proxy),15(kmem),20(dialout),21(fax),22(voice), 24(cdrom),25(floppy),26(tape),27(sudo),29(audio),30(dip),33(www-data),34(backup),37(operator),38(list),39(irc),40(src),41(gnats),42(shadow), 43(utmp),44(video),45(sasl),46(plugdev),50(staff),60(games),100(libuuid), 101(debian-tor),669(pulse),670(pulseaccess),671(pulsert),29996(cal), 29999(users),30002(input),30003(i2c),30004(adc),30005(upstart),30010(crypto), 30011(metadatausers),30012(phonet),30013(signon),30014(csd), 30015(messagebus),30016(gallerycoredatausers),30017(acm), 30018(osa),30019(calendar),30020(libaccountsnoa),30021(lpm), 30022(visualreminder),30023(nfc),30024(location),30025(slpgwd), 30026(haldaemon),30027(powerdev),30028(developer),30029(ssh),65100(spool), 65534(nogroup),9990001,9990004,9990245,9990256,9990257,9990258,9990259, 9990260,9990261,9990262,9990263,9990264,9990265,9990266,9990270,9990276, 9990277,9990279,9990281,9990282,9990284,9990285, 9990286,9990287,9990288,9990289,9990294,9990297,9990298,9990300, 9990301,9990302,9990306,9990307,9990308,9990309,9990313,9990314, 9990315,9990316,9990317,9990320,9990326,9990327, 9990330,9990331,9990332,9990334,9990337,9990346,9990352,9990353, 9990355,9990356,9990361,9990367,9990368,9990374,9990376,9990377, 9990381,9990382,9990384,9990385,9990387,9990388, 9990390,9990391,9990393,9990394,9990396,9990397,9990401,9990402, 9990403,9990404,9990405,9990406,9990407,9990408,9990409,9990410, 9990413,9990414,9990415,9990416,9990417,9990418, 9990419,9990420,9990421,9990422,9990423,9990424,9990427,9990430, 9990433,9990438,9990439,9990440,9990442,9990448,9990453,9990454, 9990466,9990478,9990482,9990483,9990491,9990492, 9990493,9990494,9990497,9990500,9990501,9990508,9990511,9990512, 9990521,9990526,9990534,9990536,9990547,9990574,9990575,9990577, 9990578,9990588,9990590,9990594,9990649 whooop … looks good! now we come to some tricky stuff: enable rzr’s repository (setup repository) install tor through command line: apt-get install tor … apt will now go crazy with alot of permission errors: chown: /var/lib/tor: operation not permitted to fix this – change the ownership for all the errors manually (through opensh): chown debian-tor:debian-tor /var/lib/tor chown debian-tor:debian-tor /var/run/tor … … now we have to check if we use our phone as dns-server … the file “/etc/resolv.conf” should contain the following string: nameserver 127.0.0.1 … the next step is to configure the torrc file “/etc/tor/torrc” mine looks like this: socksport 9050 # what port to open for local application connections sockslistenaddress 127.0.0.1 # accept connections only from localhost virtualaddrnetwork 10.192.0.0/10 automaphostsonresolve 1 transport 9040 dnsport 53 runasdaemon 1 … tor should be staring up as a daemon now! to make things easier, i packed some scripts together to handle tor through 3 desktop icons: to start tor for all traffic to start tor in background (for example: in fennec/firefox set socks proxy to localhost:9050) to stop tor and unset system-wide proxy settings here you can download torswitch0.1 cheers! 46 comments < older entries search for: recent posts live tweets in command line using python replacing bookmarks in a word document with python pcryptsy – a graphical cryptsy.com – trading client categories android bitcoin codes coding computing data-flows debian desktops eeepc eye-candy g1 htc-linux linux meego openmoko other photography python scene news services site-news software ubuntu uncategorized wortspiele links @timemenu ap0calypse tagsandroid for openmoko android from source android image android jffs2 android kernel backup backup scirpt bild flackert tv out building android for freerunner from source caller lookup android call lookup change keyboard layout g1 qwertz copie fingerprints daily build android debian eeepc wlan ubuntu eepc ubuntu wlan problem fingerabrduck nehmen funny unix commands git clone hacked hostinfo to openmoko incoming call lookup austria incoming call lookup ã¶sterreich kaffeine-sc-plugin ubuntu kevin mitnick linux tv out lookup incoming call austria new android image nvidia tv out linux nvidia tv out xorg nvidia tv out xorg.conf om2008.9 openmoko pyhton backup script qi take fingerprints true-binary true-binary.com tv out debian tv out ubuntu tv out xorg ubuntu www.true-binary.com xbox live meego xbox meego archives select month june 2015 (1) may 2015 (1) january 2014 (1) february 2013 (1) december 2012 (3) january 2010 (2) july 2009 (2) june 2009 (1) april 2009 (2) march 2009 (3) january 2009 (2) december 2008 (1) november 2008 (6) october 2008 (3) september 2008 (2) august 2008 (1) july 2008 (4) june 2008 (2) may 2008 (8) @timemenu tweets von @timemenu © 2016 true-binary.com | powered by wordpress entries (rss) and comments (rss).


Here you find all texts from your page as Google (googlebot) and others search engines seen it.

Words density analysis:

Numbers of all words: 2874

One word

Two words phrases

Three words phrases

file - 3.17% (91)
the - 2.37% (68)
and - 1.98% (57)
use - 1.46% (42)
all - 1.36% (39)
docfile - 1.25% (36)
for - 1.18% (34)
– - 1.15% (33)
sniff - 1.11% (32)
bookmark - 1.11% (32)
port - 1.08% (31)
tcp - 1.08% (31)
you - 1.04% (30)
tor - 1.04% (30)
python - 1.04% (30)
tweet - 1.01% (29)
… - 1.01% (29)
out - 1.01% (29)
our - 0.97% (28)
with - 0.9% (26)
key - 0.9% (26)
sslstrip - 0.87% (25)
line - 0.87% (25)
user - 0.87% (25)
word - 0.84% (24)
open - 0.8% (23)
set - 0.77% (22)
new - 0.77% (22)
sys - 0.73% (21)
print - 0.7% (20)
install - 0.7% (20)
str_tweet - 0.7% (20)
zip - 0.66% (19)
access - 0.63% (18)
docfilecontent - 0.63% (18)
run - 0.63% (18)
data - 0.56% (16)
tar - 0.56% (16)
here - 0.56% (16)
from - 0.52% (15)
auth - 0.52% (15)
need - 0.52% (15)
debian - 0.52% (15)
dump - 0.52% (15)
— - 0.52% (15)
work - 0.52% (15)
http - 0.49% (14)
string - 0.49% (14)
how - 0.49% (14)
your - 0.49% (14)
build - 0.49% (14)
a[0] - 0.49% (14)
dsniff - 0.45% (13)
keyword - 0.45% (13)
start - 0.45% (13)
tcpxtract - 0.45% (13)
traffic - 0.42% (12)
running - 0.42% (12)
apt - 0.42% (12)
local - 0.42% (12)
docfilecontentnew - 0.42% (12)
source - 0.42% (12)
zipfile - 0.42% (12)
/home/user - 0.42% (12)
sniffer - 0.42% (12)
code - 0.42% (12)
connect - 0.42% (12)
access_token - 0.42% (12)
listen - 0.38% (11)
get - 0.38% (11)
sslstrip-0.9 - 0.38% (11)
can - 0.38% (11)
tcpdump - 0.38% (11)
look - 0.38% (11)
bookmarks - 0.38% (11)
9040 - 0.35% (10)
/home/user/dev/sniffer - 0.35% (10)
needtogo - 0.35% (10)
def - 0.35% (10)
script - 0.35% (10)
ngrep - 0.35% (10)
tweepy - 0.35% (10)
too - 0.35% (10)
android - 0.35% (10)
are - 0.35% (10)
proxy - 0.31% (9)
2008 - 0.31% (9)
time - 0.31% (9)
now - 0.31% (9)
str_tweet3 - 0.28% (8)
lan - 0.28% (8)
stream - 0.28% (8)
import - 0.28% (8)
file]\n\t - 0.28% (8)
connection - 0.28% (8)
document - 0.28% (8)
found - 0.28% (8)
some - 0.28% (8)
files - 0.28% (8)
live - 0.28% (8)
this - 0.28% (8)
-*- - 0.28% (8)
true - 0.28% (8)
linux - 0.28% (8)
filter - 0.24% (7)
tool - 0.24% (7)
pcryptsy - 0.24% (7)
client - 0.24% (7)
scripts - 0.24% (7)
was - 0.24% (7)
package - 0.24% (7)
news - 0.24% (7)
tcpxtract_out/ - 0.24% (7)
(1) - 0.24% (7)
pass - 0.24% (7)
repository - 0.24% (7)
not - 0.24% (7)
down - 0.24% (7)
here’s - 0.24% (7)
apt-get - 0.24% (7)
ssh - 0.21% (6)
used - 0.21% (6)
file, - 0.21% (6)
bookmarkitem - 0.21% (6)
way - 0.21% (6)
a[0].split("=") - 0.21% (6)
arguments - 0.21% (6)
what - 0.21% (6)
(2) - 0.21% (6)
srcfile - 0.21% (6)
elif - 0.21% (6)
dstfile - 0.21% (6)
call - 0.21% (6)
docfileh - 0.21% (6)
plot - 0.21% (6)
thought - 0.21% (6)
add - 0.21% (6)
else: - 0.21% (6)
wlan - 0.21% (6)
meego - 0.21% (6)
system - 0.21% (6)
true-binary - 0.21% (6)
/home/user/dev/sniffer/sslstrip-0.9 - 0.21% (6)
ubuntu - 0.21% (6)
type - 0.21% (6)
endc - 0.21% (6)
it’s - 0.21% (6)
cryptsy.com - 0.21% (6)
insertstring - 0.21% (6)
decoded - 0.21% (6)
setting - 0.21% (6)
gprs0 - 0.21% (6)
using - 0.21% (6)
dpkg - 0.17% (5)
should - 0.17% (5)
fire - 0.17% (5)
connections - 0.17% (5)
well - 0.17% (5)
hotspot - 0.17% (5)
let - 0.17% (5)
through - 0.17% (5)
try - 0.17% (5)
session - 0.17% (5)
stdout - 0.17% (5)
dependencies - 0.17% (5)
exporting - 0.17% (5)
true-binary.com - 0.17% (5)
download - 0.17% (5)
change - 0.17% (5)
coding - 0.17% (5)
json - 0.17% (5)
mode - 0.17% (5)
have - 0.17% (5)
access_token_secret - 0.17% (5)
consumer_secret - 0.17% (5)
consumer_key - 0.17% (5)
#auth - 0.17% (5)
replace - 0.17% (5)
(in - 0.17% (5)
settings - 0.17% (5)
opensh - 0.17% (5)
2009 - 0.17% (5)
lookup - 0.17% (5)
who - 0.17% (5)
9050 - 0.17% (5)
status - 0.14% (4)
very - 0.14% (4)
openmoko - 0.14% (4)
working - 0.14% (4)
when - 0.14% (4)
header - 0.14% (4)
daemon - 0.14% (4)
rootlen - 0.14% (4)
base, - 0.14% (4)
interface - 0.14% (4)
january - 0.14% (4)
works - 0.14% (4)
str_tweet1 - 0.14% (4)
backup - 0.14% (4)
keyword.lower() - 0.14% (4)
bcolors.endc - 0.14% (4)
sys.exit() - 0.14% (4)
str_tweet2 - 0.14% (4)
okgreen - 0.14% (4)
1500 - 0.14% (4)
%s' - 0.14% (4)
wlan0 - 0.14% (4)
gain - 0.14% (4)
help - 0.14% (4)
wifi - 0.14% (4)
opendocx() - 0.14% (4)
newstring - 0.14% (4)
class - 0.14% (4)
#auth: - 0.14% (4)
docfile.close() - 0.14% (4)
tweets - 0.14% (4)
address - 0.14% (4)
logins - 0.14% (4)
does - 0.14% (4)
2015 - 0.14% (4)
june - 0.14% (4)
command - 0.14% (4)
(a[0].split("="))[1] - 0.14% (4)
"r") - 0.14% (4)
mail - 0.14% (4)
"""usage:\tsetbookmark.py\n\tsrc=[source - 0.14% (4)
file]\n\tdst=[destination - 0.14% (4)
b=[bookmarkname]=[bookmark - 0.14% (4)
value]\n\t\n\tfunction - 0.14% (4)
multiple - 0.14% (4)
times.""" - 0.14% (4)
dns - 0.14% (4)
which - 0.14% (4)
looks - 0.14% (4)
[download - 0.14% (4)
apn - 0.14% (4)
sudo - 0.14% (4)
may - 0.14% (4)
select - 0.14% (4)
whereami - 0.14% (4)
#!/bin/python - 0.14% (4)
“png” - 0.14% (4)
coding: - 0.14% (4)
iso-8859-15 - 0.14% (4)
off - 0.1% (3)
xorg - 0.1% (3)
@timemenu - 0.1% (3)
nvidia - 0.1% (3)
incoming - 0.1% (3)
harmattan - 0.1% (3)
got - 0.1% (3)
eepc - 0.1% (3)
(3) - 0.1% (3)
turn - 0.1% (3)
urls - 0.1% (3)
december - 0.1% (3)
search - 0.1% (3)
thisis - 0.1% (3)
activate - 0.1% (3)
gconf - 0.1% (3)
127.0.0.1 - 0.1% (3)
110 - 0.1% (3)
ignore - 0.1% (3)
again - 0.1% (3)
doesn’t - 0.1% (3)
show - 0.1% (3)
2013 - 0.1% (3)
htaccess - 0.1% (3)
itself - 0.1% (3)
selected - 0.1% (3)
sniffed - 0.1% (3)
https - 0.1% (3)
network - 0.1% (3)
sslstrip. - 0.1% (3)
joikuspot - 0.1% (3)
socks - 0.1% (3)
/usr/local/bin - 0.1% (3)
handle - 0.1% (3)
packages - 0.1% (3)
chown - 0.1% (3)
2012 - 0.1% (3)
starting - 0.1% (3)
comment - 0.1% (3)
[-i] - 0.1% (3)
build/scripts-2.6 - 0.1% (3)
like - 0.1% (3)
will - 0.1% (3)
copying - 0.1% (3)
kill - 0.1% (3)
take - 0.1% (3)
phone - 0.1% (3)
[82.150.199.80:20480 - 0.1% (3)
192.168.20.20:25055], - 0.1% (3)
ftp - 0.1% (3)
windows - 0.1% (3)
python-matplotlib - 0.1% (3)
file) - 0.1% (3)
gui - 0.1% (3)
share - 0.1% (3)
thoughts - 0.1% (3)
module - 0.1% (3)
cheers - 0.1% (3)
but - 0.1% (3)
website - 0.1% (3)
last - 0.1% (3)
coin - 0.1% (3)
around - 0.1% (3)
document. - 0.1% (3)
that - 0.1% (3)
simple - 0.1% (3)
track - 0.1% (3)
line: - 0.1% (3)
go: - 0.1% (3)
create - 0.1% (3)
count - 0.1% (3)
application - 0.1% (3)
api - 0.1% (3)
''access_token - 0.07% (2)
/usr/local/bin/sslstrip - 0.07% (2)
won’t - 0.07% (2)
consumer_secret) - 0.07% (2)
build_scripts - 0.07% (2)
“manual” - 0.07% (2)
#!/bin/python# - 0.07% (2)
build_py - 0.07% (2)
gconftool-2 - 0.07% (2)
auth.set_access_token(access_token, - 0.07% (2)
/usr/local/lib/python2.6/dist-packages/sslstrip-0.9.egg-info - 0.07% (2)
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849 - 0.07% (2)
tweepy.oauthhandler(consumer_key, - 0.07% (2)
stream.filter(track=[keyword]) - 0.07% (2)
'__main__': - 0.07% (2)
adjusting - 0.07% (2)
stdoutlistener() - 0.07% (2)
tweepy.stream(auth, - 0.07% (2)
up… - 0.07% (2)
cleaning - 0.07% (2)
setup.py - 0.07% (2)
access_token_secret) - 0.07% (2)
sslstrip/sslstrip - 0.07% (2)
february - 0.07% (2)
[download] - 0.07% (2)
01/31/13 - 0.07% (2)
more - 0.07% (2)
other - 0.07% (2)
libdb4.6_4.6.21-16_armel - 0.07% (2)
libnids1.21_1.23-2_armel - 0.07% (2)
dsniff_2.4b1+debian-18_armel - 0.07% (2)
sys.argv[1:] - 0.07% (2)
has - 0.07% (2)
sys.argv[0] - 0.07% (2)
program_name - 0.07% (2)
listening - 0.07% (2)
—————– - 0.07% (2)
host: - 0.07% (2)
it: - 0.07% (2)
basic - 0.07% (2)
os, - 0.07% (2)
protocol - 0.07% (2)
[-s] - 0.07% (2)
after - 0.07% (2)
changed - 0.07% (2)
days - 0.07% (2)
replacing - 0.07% (2)
../sslstrip.log - 0.07% (2)
/system/proxy/mode - 0.07% (2)
fun! - 0.07% (2)
pip - 0.07% (2)
10000 - 0.07% (2)
19, - 0.07% (2)
post - 0.07% (2)
'\033[92m' - 0.07% (2)
older - 0.07% (2)
entries - 0.07% (2)
underline - 0.07% (2)
'\033[1m' - 0.07% (2)
bold - 0.07% (2)
eeepc - 0.07% (2)
'\033[0m' - 0.07% (2)
'\033[91m' - 0.07% (2)
fail - 0.07% (2)
'\033[93m' - 0.07% (2)
image - 0.07% (2)
kernel - 0.07% (2)
warning - 0.07% (2)
fingerprints - 0.07% (2)
'\033[4m' - 0.07% (2)
'\033[94m' - 0.07% (2)
okblue - 0.07% (2)
'\033[95m' - 0.07% (2)
austria - 0.07% (2)
bcolors: - 0.07% (2)
raw_input("keyword: - 0.07% (2)
#auth:end - 0.07% (2)
www.true-binary.com - 0.07% (2)
xbox - 0.07% (2)
livetweet.py - 0.07% (2)
following - 0.07% (2)
july - 0.07% (2)
twitter - 0.07% (2)
comments - 0.07% (2)
stdoutlistener(tweepy.streamlistener): - 0.07% (2)
it) - 0.07% (2)
str_tweet3.lower().replace(keyword.lower(), - 0.07% (2)
cheers! - 0.07% (2)
__name__ - 0.07% (2)
status): - 0.07% (2)
on_error(self, - 0.07% (2)
len(sys.argv) - 0.07% (2)
return - 0.07% (2)
device - 0.07% (2)
inception - 0.07% (2)
bcolors.endc) - 0.07% (2)
check - 0.07% (2)
keyword.upper() - 0.07% (2)
bcolors.okgreen - 0.07% (2)
whooop - 0.07% (2)
str_tweet3.lower(): - 0.07% (2)
on_data(self, - 0.07% (2)
errors - 0.07% (2)
'ignore')) - 0.07% (2)
debian-tor:debian-tor - 0.07% (2)
/var/lib/tor - 0.07% (2)
(decoded['text'].encode('ascii', - 0.07% (2)
torrc - 0.07% (2)
(decoded['user']['screen_name']) - 0.07% (2)
localhost - 0.07% (2)
'@%s' - 0.07% (2)
bcolors.header - 0.07% (2)
json.loads(data) - 0.07% (2)
data): - 0.07% (2)
desktop - 0.07% (2)
len(arguments) - 0.07% (2)
proxies - 0.07% (2)
arguments: - 0.07% (2)
magic - 0.07% (2)
calculate - 0.07% (2)
powerful - 0.07% (2)
2014 - 0.07% (2)
12, - 0.07% (2)
trading - 0.07% (2)
libpcap0.8 - 0.07% (2)
took - 0.07% (2)
tcpxtract_1.0.1-5_armel - 0.07% (2)
repository. - 0.07% (2)
graphical - 0.07% (2)
tmp") - 0.07% (2)
hotspot, - 0.07% (2)
-rf - 0.07% (2)
os.system("rm - 0.07% (2)
installed - 0.07% (2)
fn[rootlen:]) - 0.07% (2)
zip.write(fn, - 0.07% (2)
tcpdump_http.pcap - 0.07% (2)
os.path.join(base, - 0.07% (2)
files: - 0.07% (2)
os.walk(source): - 0.07% (2)
dirs, - 0.07% (2)
len(source) - 0.07% (2)
"tmp" - 0.07% (2)
snaplen - 0.07% (2)
convert - 0.07% (2)
addresses - 0.07% (2)
names - 0.07% (2)
version - 0.07% (2)
dont - 0.07% (2)
only - 0.07% (2)
stuff - 0.07% (2)
privat - 0.07% (2)
point - 0.07% (2)
executables - 0.07% (2)
ltc - 0.07% (2)
1rrxxfv8k9o469s5rri2udv6s37fpea55 - 0.07% (2)
md5: - 0.07% (2)
month - 0.07% (2)
display=”name”] - 0.07% (2)
(python - 0.07% (2)
figured - 0.07% (2)
python-qt4 - 0.07% (2)
requirements: - 0.07% (2)
usefull - 0.07% (2)
chart - 0.07% (2)
repository) - 0.07% (2)
ema - 0.07% (2)
view - 0.07% (2)
stock - 0.07% (2)
orders: - 0.07% (2)
current - 0.07% (2)
mode, - 0.07% (2)
keep - 0.07% (2)
values - 0.07% (2)
pre-dependencies: - 0.07% (2)
opensh_1.00_armel - 0.07% (2)
enable - 0.07% (2)
rzr’s - 0.07% (2)
(setup - 0.07% (2)
zipfile.zip_deflated) - 0.07% (2)
[port - 0.07% (2)
x.split(" - 0.07% (2)
sys.argv[1]: - 0.07% (2)
faults - 0.07% (2)
docfile.readlines() - 0.07% (2)
make - 0.07% (2)
open(docfileh,"r") - 0.07% (2)
capturing - 0.07% (2)
"tmp/word/document.xml" - 0.07% (2)
z.extractall("tmp/") - 0.07% (2)
send - 0.07% (2)
arp - 0.07% (2)
forge - 0.07% (2)
replies - 0.07% (2)
zipfile.zipfile(srcfile, - 0.07% (2)
opendocx(): - 0.07% (2)
"--help" - 0.07% (2)
had - 0.07% (2)
"-h" - 0.07% (2)
traffic. - 0.07% (2)
a[0].startswith("dst"): - 0.07% (2)
mac - 0.07% (2)
sniffs - 0.07% (2)
a[0].startswith("src"): - 0.07% (2)
bookmarkitem[2] - 0.07% (2)
bookmarks[bookmarkitem[1]] - 0.07% (2)
monkey-in-the-middle. - 0.07% (2)
tools - 0.07% (2)
specified - 0.07% (2)
a[0].startswith("b"): - 0.07% (2)
args - 0.07% (2)
segment - 0.07% (2)
docfilecontent: - 0.07% (2)
80] - 0.07% (2)
needtogoend - 0.07% (2)
'w', - 0.07% (2)
capture - 0.07% (2)
it. - 0.07% (2)
zipfile.zipfile(dstfile, - 0.07% (2)
docfile.write(docfilecontentnew) - 0.07% (2)
traffic: - 0.07% (2)
open(docfileh,"w") - 0.07% (2)
docfilecontent[0] - 0.07% (2)
found" - 0.07% (2)
"bookmark - 0.07% (2)
line[needtogo:] - 0.07% (2)
line[:needtogo] - 0.07% (2)
len(insertstring) - 0.07% (2)
len(x) - 0.07% (2)
tell - 0.07% (2)
analyze - 0.07% (2)
i’m - 0.07% (2)
line.find(x) - 0.07% (2)
bookmarks[x] - 0.07% (2)
regular - 0.07% (2)
u"%s" - 0.07% (2)
logins: - 0.07% (2)
"replaced - 0.07% (2)
ngrep_1.45.ds2-9_armel - 0.07% (2)
begin - 0.07% (2)
"searching - 0.07% (2)
bookmarks.keys(): - 0.07% (2)
[&\s?](?:login|user(?:name|)|p(ass(?:word|wd|)|w|wd))[\s:=]\s?([^&\s]*) - 0.07% (2)
expression - 0.07% (2)
(rss) - 0.07% (2)
tv out - 0.28% (8)
= line - 0.28% (8)
docfilecontentnew = - 0.28% (8)
with a - 0.24% (7)
elif a[0] - 0.21% (6)
port 80 - 0.21% (6)
or port - 0.21% (6)
/home/user/dev/sniffer/sslstrip-0.9 # - 0.21% (6)
running build - 0.21% (6)
= str_tweet - 0.21% (6)
apt-get install - 0.21% (6)
running install - 0.17% (5)
in session - 0.17% (5)
… … - 0.17% (5)
a word - 0.17% (5)
dpkg -i - 0.17% (5)
file of - 0.17% (5)
found file - 0.17% (5)
of type - 0.17% (5)
exporting to - 0.17% (5)
file]\n\tdst=[destination file]\n\t - 0.14% (4)
“png” in - 0.14% (4)
you need - 0.14% (4)
word document - 0.14% (4)
coding: iso-8859-15 - 0.14% (4)
srcfile = - 0.14% (4)
type “png” - 0.14% (4)
print """usage:\tsetbookmark.py\n\tsrc=[source - 0.14% (4)
iso-8859-15 -*- - 0.14% (4)
what i - 0.14% (4)
line = - 0.14% (4)
times.""" sys.exit() - 0.14% (4)
used multiple - 0.14% (4)
can be - 0.14% (4)
value]\n\t\n\tfunction b= - 0.14% (4)
file]\n\t b=[bookmarkname]=[bookmark - 0.14% (4)
"""usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination - 0.14% (4)
docfile = - 0.14% (4)
b= can - 0.14% (4)
on the - 0.14% (4)
(a[0].split("="))[1] elif - 0.14% (4)
dstfile = - 0.14% (4)
= (a[0].split("="))[1] - 0.14% (4)
as well - 0.14% (4)
multiple times.""" - 0.14% (4)
be used - 0.14% (4)
b=[bookmarkname]=[bookmark value]\n\t\n\tfunction - 0.14% (4)
you can - 0.14% (4)
all the - 0.14% (4)
+ bcolors.endc - 0.14% (4)
in the - 0.14% (4)
-*- coding: - 0.14% (4)
session [82.150.199.80:20480 - 0.1% (3)
192.168.20.20:25055], exporting - 0.1% (3)
how to - 0.1% (3)
sniffed from - 0.1% (3)
now we - 0.1% (3)
here’s a - 0.1% (3)
2009 (2) - 0.1% (3)
[82.150.199.80:20480 -> - 0.1% (3)
fire up - 0.1% (3)
your thoughts - 0.1% (3)
it works - 0.1% (3)
incoming call - 0.1% (3)
nvidia tv - 0.1% (3)
port 25 - 0.1% (3)
-> 192.168.20.20:25055], - 0.1% (3)
a client - 0.1% (3)
-*- import - 0.1% (3)
live tweets - 0.1% (3)
a very - 0.1% (3)
/home/user/dev/sniffer # - 0.1% (3)
cryptsy.com – - 0.1% (3)
how it - 0.1% (3)
pcryptsy is - 0.1% (3)
from the - 0.1% (3)
to run - 0.1% (3)
set the - 0.1% (3)
out xorg - 0.1% (3)
build running - 0.1% (3)
way to - 0.1% (3)
the last - 0.1% (3)
to use - 0.1% (3)
well as - 0.1% (3)
we are - 0.1% (3)
are starting - 0.1% (3)
with the - 0.1% (3)
docfilecontent[0] + - 0.07% (2)
docfilecontentnew docfile.close() - 0.07% (2)
'w', zipfile.zip_deflated) - 0.07% (2)
docfile.close() zip - 0.07% (2)
= zipfile.zipfile(dstfile, - 0.07% (2)
open(docfileh,"w") docfile.write(docfilecontentnew) - 0.07% (2)
in files: - 0.07% (2)
source = - 0.07% (2)
tmp") a - 0.07% (2)
calculate and - 0.07% (2)
trading client - 0.07% (2)
a graphical - 0.07% (2)
pcryptsy – - 0.07% (2)
= opendocx() - 0.07% (2)
for all - 0.07% (2)
os.system("rm -rf - 0.07% (2)
"tmp" rootlen - 0.07% (2)
zip.write(fn, fn[rootlen:]) - 0.07% (2)
os.path.join(base, file) - 0.07% (2)
for file - 0.07% (2)
in os.walk(source): - 0.07% (2)
dirs, files - 0.07% (2)
for base, - 0.07% (2)
= len(source) - 0.07% (2)
found" pass - 0.07% (2)
len(insertstring) line - 0.07% (2)
bookmarks in - 0.07% (2)
def opendocx(): - 0.07% (2)
docfile.readlines() docfilecontentnew - 0.07% (2)
docfilecontent = - 0.07% (2)
= open(docfileh,"r") - 0.07% (2)
"tmp/word/document.xml" docfile - 0.07% (2)
docfileh = - 0.07% (2)
z: z.extractall("tmp/") - 0.07% (2)
"r") as - 0.07% (2)
with zipfile.zipfile(srcfile, - 0.07% (2)
document with - 0.07% (2)
in docfilecontent: - 0.07% (2)
python pcryptsy - 0.07% (2)
graphical cryptsy.com - 0.07% (2)
– trading - 0.07% (2)
from source - 0.07% (2)
else: pass - 0.07% (2)
sys.argv[1]: print - 0.07% (2)
or not - 0.07% (2)
"--help" or - 0.07% (2)
"-h" or - 0.07% (2)
for line - 0.07% (2)
in bookmarks.keys(): - 0.07% (2)
"bookmark not - 0.07% (2)
needtogoend = - 0.07% (2)
line print - 0.07% (2)
line else: - 0.07% (2)
(3) january - 0.07% (2)
+ line[needtogo:] - 0.07% (2)
+ insertstring - 0.07% (2)
= line[:needtogo] - 0.07% (2)
tor through - 0.07% (2)
needtogo + - 0.07% (2)
+ len(x) - 0.07% (2)
print "searching - 0.07% (2)
= whereami - 0.07% (2)
line.find(x) needtogo - 0.07% (2)
whereami = - 0.07% (2)
% bookmarks[x] - 0.07% (2)
= u"%s" - 0.07% (2)
x insertstring - 0.07% (2)
"replaced ", - 0.07% (2)
line: print - 0.07% (2)
for ", - 0.07% (2)
start tor - 0.07% (2)
up… /home/user/dev/sniffer/sslstrip-0.9 - 0.07% (2)
the following - 0.07% (2)
connect with - 0.07% (2)
it doesn’t - 0.07% (2)
[port 80 - 0.07% (2)
faults when - 0.07% (2)
interface gprs0 - 0.07% (2)
the magic - 0.07% (2)
and let - 0.07% (2)
wifi hotspot, - 0.07% (2)
the local - 0.07% (2)
up the - 0.07% (2)
now fire - 0.07% (2)
the traffic - 0.07% (2)
– you - 0.07% (2)
it looks - 0.07% (2)
running build_py - 0.07% (2)
running build_scripts - 0.07% (2)
– send - 0.07% (2)
– ssh - 0.07% (2)
android image - 0.07% (2)
-s /system/proxy/mode - 0.07% (2)
and adjusting - 0.07% (2)
build_scripts copying - 0.07% (2)
build_py running - 0.07% (2)
python setup.py - 0.07% (2)
proxy settings - 0.07% (2)
figured out - 0.07% (2)
# python - 0.07% (2)
-t string - 0.07% (2)
ssh traffic - 0.07% (2)
listening on - 0.07% (2)
listen on - 0.07% (2)
—————– 01/31/13 - 0.07% (2)
dsniff itself - 0.07% (2)
should be - 0.07% (2)
the debian - 0.07% (2)
took the - 0.07% (2)
copying and - 0.07% (2)
adjusting sslstrip/sslstrip - 0.07% (2)
sudo apt-get - 0.07% (2)
install tor - 0.07% (2)
repository) i - 0.07% (2)
repository (setup - 0.07% (2)
enable rzr’s - 0.07% (2)
meego harmattan - 0.07% (2)
check if - 0.07% (2)
sslstrip/sslstrip -> - 0.07% (2)
(setup repository) - 0.07% (2)
i figured - 0.07% (2)
+ tcpxtract - 0.07% (2)
and privat - 0.07% (2)
used it - 0.07% (2)
is too - 0.07% (2)
2015 (1) - 0.07% (2)
display=”name”] md5: - 0.07% (2)
chown debian-tor:debian-tor - 0.07% (2)
… the - 0.07% (2)
1. tcpdump - 0.07% (2)
/system/proxy/mode “manual” - 0.07% (2)
to 1500 - 0.07% (2)
debian repository. - 0.07% (2)
the snaplen - 0.07% (2)
-s 1500 - 0.07% (2)
let the - 0.07% (2)
client and - 0.07% (2)
hotspot, connect - 0.07% (2)
the wifi - 0.07% (2)
-> build/scripts-2.6 - 0.07% (2)
i took - 0.07% (2)
2. ngrep - 0.07% (2)
a[0].startswith("dst"): dstfile - 0.07% (2)
data from - 0.07% (2)
cleaning up… - 0.07% (2)
all traffic - 0.07% (2)
gconftool-2 -t - 0.07% (2)
3. dsniff - 0.07% (2)
string -s - 0.07% (2)
rzr’s repository - 0.07% (2)
= len(arguments) - 0.07% (2)
elif a[0].startswith("src"): - 0.07% (2)
bcolors: header - 0.07% (2)
'\033[0m' bold - 0.07% (2)
endc = - 0.07% (2)
= '\033[91m' - 0.07% (2)
'\033[93m' fail - 0.07% (2)
warning = - 0.07% (2)
= '\033[92m' - 0.07% (2)
'\033[94m' okgreen - 0.07% (2)
okblue = - 0.07% (2)
= '\033[95m' - 0.07% (2)
") class - 0.07% (2)
underline = - 0.07% (2)
= raw_input("keyword: - 0.07% (2)
l) stream.filter(track=[keyword]) - 0.07% (2)
= tweepy.stream(auth, - 0.07% (2)
access_token_secret) stream - 0.07% (2)
consumer_secret) auth.set_access_token(access_token, - 0.07% (2)
= tweepy.oauthhandler(consumer_key, - 0.07% (2)
stdoutlistener() auth - 0.07% (2)
== '__main__': - 0.07% (2)
if __name__ - 0.07% (2)
print status - 0.07% (2)
= '\033[1m' - 0.07% (2)
'\033[4m' class - 0.07% (2)
true def - 0.07% (2)
str_tweet1 + - 0.07% (2)
print '' - 0.07% (2)
print str_tweet3 - 0.07% (2)
newstring else: - 0.07% (2)
bcolors.endc) print - 0.07% (2)
keyword.upper() + - 0.07% (2)
bcolors.okgreen + - 0.07% (2)
= str_tweet3.lower().replace(keyword.lower(), - 0.07% (2)
str_tweet3.lower(): newstring - 0.07% (2)
keyword.lower() in - 0.07% (2)
str_tweet2 if - 0.07% (2)
str_tweet3 = - 0.07% (2)
stdoutlistener(tweepy.streamlistener): def - 0.07% (2)
(decoded['text'].encode('ascii', 'ignore')) - 0.07% (2)
bcolors.endc str_tweet2 - 0.07% (2)
str_tweet + - 0.07% (2)
str_tweet1 = - 0.07% (2)
% (decoded['user']['screen_name']) - 0.07% (2)
+ '@%s' - 0.07% (2)
= bcolors.header - 0.07% (2)
json.loads(data) str_tweet - 0.07% (2)
decoded = - 0.07% (2)
on_data(self, data): - 0.07% (2)
on_error(self, status): - 0.07% (2)
'' return - 0.07% (2)
def on_error(self, - 0.07% (2)
keyword = - 0.07% (2)
'\033[91m' endc - 0.07% (2)
fail = - 0.07% (2)
= '\033[93m' - 0.07% (2)
'\033[92m' warning - 0.07% (2)
okgreen = - 0.07% (2)
= '\033[94m' - 0.07% (2)
'\033[95m' okblue - 0.07% (2)
header = - 0.07% (2)
class bcolors: - 0.07% (2)
raw_input("keyword: ") - 0.07% (2)
access_token_secret = - 0.07% (2)
bold = - 0.07% (2)
'' access_token - 0.07% (2)
consumer_secret = - 0.07% (2)
import json - 0.07% (2)
import tweepy - 0.07% (2)
#!/bin/python # - 0.07% (2)
to your - 0.07% (2)
python script - 0.07% (2)
2015 tweet - 0.07% (2)
python — - 0.07% (2)
line using - 0.07% (2)
= '\033[0m' - 0.07% (2)
'\033[1m' underline - 0.07% (2)
str_tweet3 print - 0.07% (2)
'ignore')) str_tweet3 - 0.07% (2)
else: print - 0.07% (2)
print newstring - 0.07% (2)
+ bcolors.endc) - 0.07% (2)
+ keyword.upper() - 0.07% (2)
str_tweet3.lower().replace(keyword.lower(), bcolors.okgreen - 0.07% (2)
newstring = - 0.07% (2)
in str_tweet3.lower(): - 0.07% (2)
if keyword.lower() - 0.07% (2)
+ str_tweet2 - 0.07% (2)
= str_tweet1 - 0.07% (2)
% (decoded['text'].encode('ascii', - 0.07% (2)
= '\033[4m' - 0.07% (2)
': %s' - 0.07% (2)
str_tweet2 = - 0.07% (2)
(decoded['user']['screen_name']) str_tweet1 - 0.07% (2)
'@%s' % - 0.07% (2)
bcolors.header + - 0.07% (2)
str_tweet = - 0.07% (2)
= json.loads(data) - 0.07% (2)
data): decoded - 0.07% (2)
def on_data(self, - 0.07% (2)
class stdoutlistener(tweepy.streamlistener): - 0.07% (2)
return true - 0.07% (2)
status): print - 0.07% (2)
= bookmarkitem[2] - 0.07% (2)
line[needtogo:] docfilecontentnew - 0.07% (2)
docfile.write(docfilecontentnew) docfile.close() - 0.07% (2)
= open(docfileh,"w") - 0.07% (2)
docfile.close() docfile - 0.07% (2)
+ docfilecontentnew - 0.07% (2)
= docfilecontent[0] - 0.07% (2)
pass docfilecontentnew - 0.07% (2)
not found" - 0.07% (2)
print "bookmark - 0.07% (2)
else: docfilecontentnew - 0.07% (2)
insertstring + - 0.07% (2)
zipfile.zip_deflated) source - 0.07% (2)
line[:needtogo] + - 0.07% (2)
+ len(insertstring) - 0.07% (2)
= needtogo - 0.07% (2)
3 needtogoend - 0.07% (2)
len(x) + - 0.07% (2)
whereami + - 0.07% (2)
needtogo = - 0.07% (2)
= line.find(x) - 0.07% (2)
bookmarks[x] whereami - 0.07% (2)
u"%s" % - 0.07% (2)
zipfile.zipfile(dstfile, 'w', - 0.07% (2)
= "tmp" - 0.07% (2)
print "replaced - 0.07% (2)
zipfile program_name - 0.07% (2)
a[0].split("=") bookmarks[bookmarkitem[1]] - 0.07% (2)
bookmarkitem = - 0.07% (2)
if a[0].startswith("b"): - 0.07% (2)
for args - 0.07% (2)
x.split(" ") - 0.07% (2)
in arguments: - 0.07% (2)
2: print - 0.07% (2)
len(sys.argv) < - 0.07% (2)
bookmarks = - 0.07% (2)
in command - 0.07% (2)
#!/bin/python# -*- - 0.07% (2)
rootlen = - 0.07% (2)
-rf tmp") - 0.07% (2)
fn[rootlen:]) os.system("rm - 0.07% (2)
file) zip.write(fn, - 0.07% (2)
= os.path.join(base, - 0.07% (2)
files: fn - 0.07% (2)
file in - 0.07% (2)
os.walk(source): for - 0.07% (2)
files in - 0.07% (2)
base, dirs, - 0.07% (2)
len(source) + - 0.07% (2)
insertstring = - 0.07% (2)
in line: - 0.07% (2)
status if - 0.07% (2)
with python - 0.07% (2)
sys.exit() for - 0.07% (2)
if len(sys.argv) - 0.07% (2)
len(arguments) bookmarks - 0.07% (2)
count = - 0.07% (2)
= sys.argv[1:] - 0.07% (2)
program_name = - 0.07% (2)
import zipfile - 0.07% (2)
os, sys - 0.07% (2)
python #!/bin/python - 0.07% (2)
a simple - 0.07% (2)
replacing bookmarks - 0.07% (2)
= x.split(" - 0.07% (2)
to install - 0.07% (2)
as it’s - 0.07% (2)
tweepy.stream(auth, l) - 0.07% (2)
stream = - 0.07% (2)
auth.set_access_token(access_token, access_token_secret) - 0.07% (2)
tweepy.oauthhandler(consumer_key, consumer_secret) - 0.07% (2)
auth = - 0.07% (2)
= stdoutlistener() - 0.07% (2)
'__main__': l - 0.07% (2)
__name__ == - 0.07% (2)
arguments: a - 0.07% (2)
") for - 0.07% (2)
"searching for - 0.07% (2)
pass def - 0.07% (2)
bookmarks.keys(): print - 0.07% (2)
docfilecontent: for - 0.07% (2)
line in - 0.07% (2)
"" for - 0.07% (2)
= docfile.readlines() - 0.07% (2)
open(docfileh,"r") docfilecontent - 0.07% (2)
= "tmp/word/document.xml" - 0.07% (2)
z.extractall("tmp/") docfileh - 0.07% (2)
zipfile.zipfile(srcfile, "r") - 0.07% (2)
opendocx(): with - 0.07% (2)
sys.exit() else: - 0.07% (2)
args in - 0.07% (2)
not sys.argv[1]: - 0.07% (2)
or "--help" - 0.07% (2)
or "-h" - 0.07% (2)
a[0] == - 0.07% (2)
elif a[0].startswith("dst"): - 0.07% (2)
a[0].startswith("src"): srcfile - 0.07% (2)
bookmarkitem[2] elif - 0.07% (2)
bookmarks[bookmarkitem[1]] = - 0.07% (2)
= a[0].split("=") - 0.07% (2)
a[0].startswith("b"): bookmarkitem - 0.07% (2)
2008 (2) - 0.07% (2)
found file of - 0.17% (5)
file of type - 0.17% (5)
used multiple times.""" - 0.14% (4)
= (a[0].split("="))[1] elif - 0.14% (4)
“png” in session - 0.14% (4)
of type “png” - 0.14% (4)
-*- coding: iso-8859-15 - 0.14% (4)
file]\n\tdst=[destination file]\n\t b=[bookmarkname]=[bookmark - 0.14% (4)
value]\n\t\n\tfunction b= can - 0.14% (4)
type “png” in - 0.14% (4)
be used multiple - 0.14% (4)
"""usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination file]\n\t - 0.14% (4)
print """usage:\tsetbookmark.py\n\tsrc=[source file]\n\tdst=[destination - 0.14% (4)
b= can be - 0.14% (4)
can be used - 0.14% (4)
multiple times.""" sys.exit() - 0.14% (4)
docfilecontentnew = line - 0.14% (4)
(a[0].split("="))[1] elif a[0] - 0.14% (4)
# -*- coding: - 0.14% (4)
b=[bookmarkname]=[bookmark value]\n\t\n\tfunction b= - 0.14% (4)
file]\n\t b=[bookmarkname]=[bookmark value]\n\t\n\tfunction - 0.14% (4)
-> 192.168.20.20:25055], exporting - 0.1% (3)
session [82.150.199.80:20480 -> - 0.1% (3)
in session [82.150.199.80:20480 - 0.1% (3)
in a word - 0.1% (3)
192.168.20.20:25055], exporting to - 0.1% (3)
as well as - 0.1% (3)
[82.150.199.80:20480 -> 192.168.20.20:25055], - 0.1% (3)
nvidia tv out - 0.1% (3)
iso-8859-15 -*- import - 0.1% (3)
80 or port - 0.1% (3)
25 or port - 0.1% (3)
port 25 or - 0.1% (3)
filter the traffic - 0.07% (2)
% bookmarks[x] whereami - 0.07% (2)
for line in - 0.07% (2)
docfilecontent: for x - 0.07% (2)
in bookmarks.keys(): print - 0.07% (2)
"searching for ", - 0.07% (2)
in line: print - 0.07% (2)
"replaced ", x - 0.07% (2)
insertstring = u"%s" - 0.07% (2)
len(x) + 3 - 0.07% (2)
= line.find(x) needtogo - 0.07% (2)
= whereami + - 0.07% (2)
docfilecontent = docfile.readlines() - 0.07% (2)
needtogoend = needtogo - 0.07% (2)
+ len(insertstring) line - 0.07% (2)
= line[:needtogo] + - 0.07% (2)
insertstring + line[needtogo:] - 0.07% (2)
enable rzr’s repository - 0.07% (2)
else: docfilecontentnew = - 0.07% (2)
docfilecontentnew = "" - 0.07% (2)
as z: z.extractall("tmp/") - 0.07% (2)
docfile = open(docfileh,"r") - 0.07% (2)
elif a[0].startswith("src"): srcfile - 0.07% (2)
incoming call lookup - 0.07% (2)
word document with - 0.07% (2)
= x.split(" ") - 0.07% (2)
for args in - 0.07% (2)
a: if a[0].startswith("b"): - 0.07% (2)
bookmarks in a - 0.07% (2)
bookmarkitem = a[0].split("=") - 0.07% (2)
bookmarks[bookmarkitem[1]] = bookmarkitem[2] - 0.07% (2)
a[0].startswith("dst"): dstfile = - 0.07% (2)
docfileh = "tmp/word/document.xml" - 0.07% (2)
to start tor - 0.07% (2)
or "-h" or - 0.07% (2)
"--help" or " - 0.07% (2)
sys.argv[1]: print """usage:\tsetbookmark.py\n\tsrc=[source - 0.07% (2)
times.""" sys.exit() else: - 0.07% (2)
pass def opendocx(): - 0.07% (2)
with zipfile.zipfile(srcfile, "r") - 0.07% (2)
not found" pass - 0.07% (2)
line print "bookmark - 0.07% (2)
+ docfilecontentnew docfile.close() - 0.07% (2)
docfilecontentnew = docfilecontent[0] - 0.07% (2)
client and let - 0.07% (2)
running build_py running - 0.07% (2)
build running build - 0.07% (2)
repository (setup repository) - 0.07% (2)
tcpdump + tcpxtract - 0.07% (2)
the debian repository. - 0.07% (2)
now fire up - 0.07% (2)
the wifi hotspot, - 0.07% (2)
connect with a - 0.07% (2)
set the snaplen - 0.07% (2)
adjusting sslstrip/sslstrip -> - 0.07% (2)
# python setup.py - 0.07% (2)
-t string -s - 0.07% (2)
snaplen to 1500 - 0.07% (2)
i took the - 0.07% (2)
urls sniffed from - 0.07% (2)
let the magic - 0.07% (2)
a client and - 0.07% (2)
hotspot, connect with - 0.07% (2)
build_scripts copying and - 0.07% (2)
– trading client - 0.07% (2)
up the wifi - 0.07% (2)
"tmp" rootlen = - 0.07% (2)
docfile = open(docfileh,"w") - 0.07% (2)
docfile.write(docfilecontentnew) docfile.close() zip - 0.07% (2)
= zipfile.zipfile(dstfile, 'w', - 0.07% (2)
to check if - 0.07% (2)
-s /system/proxy/mode “manual” - 0.07% (2)
gconftool-2 -t string - 0.07% (2)
up… /home/user/dev/sniffer/sslstrip-0.9 # - 0.07% (2)
zipfile.zip_deflated) source = - 0.07% (2)
len(source) + 1 - 0.07% (2)
a graphical cryptsy.com - 0.07% (2)
for base, dirs, - 0.07% (2)
/home/user/dev/sniffer/sslstrip-0.9 # python - 0.07% (2)
files in os.walk(source): - 0.07% (2)
for file in - 0.07% (2)
in arguments: a - 0.07% (2)
os.path.join(base, file) zip.write(fn, - 0.07% (2)
fn[rootlen:]) os.system("rm -rf - 0.07% (2)
tmp") a = - 0.07% (2)
files: fn = - 0.07% (2)
in command line - 0.07% (2)
sys.exit() for x - 0.07% (2)
-*- import os, - 0.07% (2)
true def on_error(self, - 0.07% (2)
status): print status - 0.07% (2)
if __name__ == - 0.07% (2)
'__main__': l = - 0.07% (2)
stdoutlistener() auth = - 0.07% (2)
tweepy.oauthhandler(consumer_key, consumer_secret) auth.set_access_token(access_token, - 0.07% (2)
access_token_secret) stream = - 0.07% (2)
tweepy.stream(auth, l) stream.filter(track=[keyword]) - 0.07% (2)
document with python - 0.07% (2)
python #!/bin/python # - 0.07% (2)
program_name = sys.argv[0] - 0.07% (2)
else: print str_tweet3 - 0.07% (2)
arguments = sys.argv[1:] - 0.07% (2)
count = len(arguments) - 0.07% (2)
bookmarks = {} - 0.07% (2)
srcfile = "" - 0.07% (2)
dstfile = "" - 0.07% (2)
if len(sys.argv) < - 0.07% (2)
2: print """usage:\tsetbookmark.py\n\tsrc=[source - 0.07% (2)
times.""" sys.exit() for - 0.07% (2)
x in arguments: - 0.07% (2)
a = x.split(" - 0.07% (2)
print '' return - 0.07% (2)
bcolors.endc) print newstring - 0.07% (2)
a[0].startswith("b"): bookmarkitem = - 0.07% (2)
stdoutlistener(tweepy.streamlistener): def on_data(self, - 0.07% (2)
= raw_input("keyword: ") - 0.07% (2)
class bcolors: header - 0.07% (2)
= '\033[95m' okblue - 0.07% (2)
= '\033[94m' okgreen - 0.07% (2)
= '\033[92m' warning - 0.07% (2)
= '\033[93m' fail - 0.07% (2)
= '\033[91m' endc - 0.07% (2)
= '\033[0m' bold - 0.07% (2)
= '\033[1m' underline - 0.07% (2)
= '\033[4m' class - 0.07% (2)
data): decoded = - 0.07% (2)
+ keyword.upper() + - 0.07% (2)
json.loads(data) str_tweet = - 0.07% (2)
bcolors.header + '@%s' - 0.07% (2)
% (decoded['user']['screen_name']) str_tweet1 - 0.07% (2)
= str_tweet + - 0.07% (2)
bcolors.endc str_tweet2 = - 0.07% (2)
(decoded['text'].encode('ascii', 'ignore')) str_tweet3 - 0.07% (2)
= str_tweet1 + - 0.07% (2)
str_tweet2 if keyword.lower() - 0.07% (2)
in str_tweet3.lower(): newstring - 0.07% (2)
= str_tweet3.lower().replace(keyword.lower(), bcolors.okgreen - 0.07% (2)
") for args - 0.07% (2)
a[0].split("=") bookmarks[bookmarkitem[1]] = - 0.07% (2)
len(sys.argv) < 2: - 0.07% (2)
zip = zipfile.zipfile(dstfile, - 0.07% (2)
line = line[:needtogo] - 0.07% (2)
+ insertstring + - 0.07% (2)
line[needtogo:] docfilecontentnew = - 0.07% (2)
line else: docfilecontentnew - 0.07% (2)
= line print - 0.07% (2)
"bookmark not found" - 0.07% (2)
pass docfilecontentnew = - 0.07% (2)
docfilecontent[0] + docfilecontentnew - 0.07% (2)
docfile.close() docfile = - 0.07% (2)
open(docfileh,"w") docfile.write(docfilecontentnew) docfile.close() - 0.07% (2)
'w', zipfile.zip_deflated) source - 0.07% (2)
3 needtogoend = - 0.07% (2)
= "tmp" rootlen - 0.07% (2)
= len(source) + - 0.07% (2)
1 for base, - 0.07% (2)
dirs, files in - 0.07% (2)
os.walk(source): for file - 0.07% (2)
in files: fn - 0.07% (2)
= os.path.join(base, file) - 0.07% (2)
zip.write(fn, fn[rootlen:]) os.system("rm - 0.07% (2)
#!/bin/python# -*- coding: - 0.07% (2)
len(arguments) bookmarks = - 0.07% (2)
needtogo + len(insertstring) - 0.07% (2)
+ len(x) + - 0.07% (2)
bookmarkitem[2] elif a[0].startswith("src"): - 0.07% (2)
"tmp/word/document.xml" docfile = - 0.07% (2)
srcfile = (a[0].split("="))[1] - 0.07% (2)
elif a[0].startswith("dst"): dstfile - 0.07% (2)
a[0] == " - 0.07% (2)
" or "-h" - 0.07% (2)
or "--help" or - 0.07% (2)
not sys.argv[1]: print - 0.07% (2)
else: pass def - 0.07% (2)
opendocx(): with zipfile.zipfile(srcfile, - 0.07% (2)
"r") as z: - 0.07% (2)
z.extractall("tmp/") docfileh = - 0.07% (2)
open(docfileh,"r") docfilecontent = - 0.07% (2)
needtogo = whereami - 0.07% (2)
docfile.readlines() docfilecontentnew = - 0.07% (2)
"" for line - 0.07% (2)
in docfilecontent: for - 0.07% (2)
x in bookmarks.keys(): - 0.07% (2)
print "searching for - 0.07% (2)
x in line: - 0.07% (2)
print "replaced ", - 0.07% (2)
x insertstring = - 0.07% (2)
u"%s" % bookmarks[x] - 0.07% (2)
whereami = line.find(x) - 0.07% (2)
-rf tmp") a - 0.07% (2)

Here you can find chart of all your popular one, two and three word phrases. Google and others search engines means your page is about words you use frequently.

Copyright © 2015-2016 hupso.pl. All rights reserved. FB | +G | Twitter

Hupso.pl jest serwisem internetowym, w którym jednym kliknieciem możesz szybko i łatwo sprawdź stronę www pod kątem SEO. Oferujemy darmowe pozycjonowanie stron internetowych oraz wycena domen i stron internetowych. Prowadzimy ranking polskich stron internetowych oraz ranking stron alexa.