view paste/paste.27669 @ 3904:49ab5b2e2ebf

<boily> echo -e "#!/usr/bin/env python\\n# -*- encoding: utf-8 -*-\\nimport sys\\nimport unicodedata\\ntry:\\n print u\'\'.join(map(unicodedata.lookup, sys.argv[1:])).encode(\'utf-8\')\\nexcept KeyError:\\n print u\'Unknown character.\'" >bin/unicode
author HackBot
date Fri, 11 Oct 2013 15:25:39 +0000
parents a06749cc8c7c
children
line wrap: on
line source

2010-08-15.txt:03:00:50: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2010-08-15.txt:03:00:58: <ais523> where ratry_login contains "hello username password"
2010-08-15.txt:03:12:51: <alise> script -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack
2010-08-15.txt:03:14:42: <alise> ipt -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack'
2010-08-15.txt:03:17:15: <alise> ipt -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack && ex
2010-08-29.txt:22:22:02: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2010-08-29.txt:22:22:11: <ais523> and ./ratry_login is hello username password
2012-04-21.txt:20:32:26: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2012-04-21.txt:20:32:41: <elliott> what format is ratry_login again?
2012-04-21.txt:20:34:57: <elliott> [elliott@dinky tmp]$ script -f >( cat ./ratry_login - | nc noway.ratry.ru 31337 > /dev/null ) adom