本文目錄一覽:
關於python如何實現各進制轉換的總結大全
ctf經常遇到進制轉換的問題,就正好做一個進制轉換總結,分享出來供大家參考學習,下面來一起看看詳細的介紹:
字符串與十六進制轉換
例如百度ctf 12月的第二場第一個misc
?
1
666C61677B65633862326565302D336165392D346332312D613031322D3038616135666137626536377D
比較簡單的一種做法就是直接調用字符串的.decode(‘hex’)解密即可, 但如果不用這個函數你會怎麼解呢?
一種思路就是先2個分組,解出每組的ascii值,合併下字符串即可得到,具體代碼如下
?
1234567
import res=’666C61677B65633862326565302D336165392D346332312D613031322D3038616135666137626536377D’s = re.findall(r’.{2}’,s)s = map(lambda x:chr(int(x,16)),s)print ”.join(s)flag{ec8b2ee0-3ae9-4c21-a012-08aa5fa7be67}
前面說了字符串的decode(‘hex’)函數,另外還有兩個轉16進制的函數,這裡都總結一下
內置函數hex()
只能轉換10進制整數為十六進制,不能轉字符串
binascii庫的hexlify()和b2a_hex()
這兩個函數的功能是將字符串轉換成十六進制,對應的解密函數分別為 unhexlify()和a2b_hex()
進制互轉
二進制,八進制,十六進制轉10進制比較簡單,直接調用
int函數
?
1
int(str,base) //返回十進制整數,但注意此時第一個參數為字符串
對應的解密函數分別是
?
12345
bin() //10進制轉二進制 oct() //十進制轉八進制 hex() //十進制轉十六進制
但二進制直接轉16進制就需要多走一步了,先用int轉十進制,在用上面提到的hex()函數將十進制轉換成十六進制,比較精簡的寫法是
?
1
map(lambda x:hex(int(x,2)),[‘0011’]) //lambda表達式
或者是
?
1
[hex(int(x,2)) for x in [‘0011’]] //列表解析
對應的解密函數就是
?
1
map(lambda x:bin(int(x,16)),[‘ef’])
最後在附上自己用python寫的一個進制轉換小工具,主要功能是對一組二進制,或者ascii,或十六進制轉換成字符串,想必ctf上也經常會遇到這類題型吧
?
1234567891011121314151617181920212223242526272829303132333435363738394041424344
# make by 江sir#coding:utf-8import reimport argparse def bintostr(text): text = text.replace(‘ ‘,”) text = re.findall(r’.{8}’,text) s = map(lambda x:chr(int(x,2)),text) #批量二進制轉十進制 flag = ”.join(s) return flag def asciitostr(text): if ‘ ‘ in text: text = text.split(‘ ‘) elif ‘,’ in text: text = text.split(‘,’) s = map(lambda x:chr(int(x)),text) flag = ”.join(s) return flag def hextostr(text): text = re.findall(r’.{2}’,text) #print text s = map(lambda x:chr(int(x,16)),text) #print s flag = ”.join(s) return flag if __name__ == ‘__main__’: parser = argparse.ArgumentParser() parser.add_argument(“-b”) parser.add_argument(“-a”) parser.add_argument(“-x”) argv = parser.parse_args() #print argv if argv.b: res = bintostr(argv.b) elif argv.a: res = asciitostr(argv.a) elif argv.x: res = hextostr(argv.x) print res
用法:
十六進制轉字符串:
666C61677B65633862326565302D336165392D346332312D613031322D3038616135666137626536377D
?
12
bintostr.py -x “666C61677B65633862326565302D336165392D346332312D613031322D3038616135666137626536377D”flag{ec8b2ee0-3ae9-4c21-a012-08aa5fa7be67}
二進制轉字符串:
可以有空格,也可以無空格
00101111 01100110 00110110 00110111 00110011 00110010 00110100 00110001 00110000 01100001 01100001 01100100 01100011 00110000 00110011 00110111 01100110 01100010 00110000 01100011 01100010 01100001 01100001 00110000 00110000 01100011 00110111 00110101 00110011 00110001 00110011 00110111 00110011 00101110 01110100 01111000 01110100
?
12
bintostr.py -b “00101111 01100110 00110110 00110111 00110011 00110010 00110100 00110001 00110000 01100001 01100001 01100100 01100011 00110000 00110011 00110111 01100110 01100010 00110000 01100011 01100010 01100001 01100001 00110000 00110000 01100011 00110111 00110101 00110011 00110001 00110011 00110111 00110011 00101110 01110100 01111000 01110100″/f6732410aadc037fb0cbaa00c7531373.txt
ascii轉字符串
可以是空格分隔,也可以是,分隔
s=’45 46 45 46 32 45 32 46 46 45 46 32 46 45 46 46 32 46 46 46 32 45 46 46 46 32 46 46 45 45 46 45 32 45 46 46 46 32 46 46 46 32 46 45 46 46 32′
?
12
bintostr.py -a “45 46 45 46 32 45 32 46 46 45 46 32 46 45 46 46 32 46 46 46 32 45 46 46 46 32 46 46 45 45 46 45 32 45 46 46 46 32 46 46 46 32 46 45 46 46 32”-.-. – ..-. .-.. … -… ..–.- -… … .-..
以上實例均來自某些ctf賽題
總結
python如何生成1位圖片bin
第一步,定義一個變量n1並賦值為987,調用bin函數將n1轉換成二進制,
第二步,再次定義一個變量n2並賦值一個長整型,使用bin函數轉換,第三步,如果傳入的參數是一個邏輯值或是一個字符串,使用bin函數返回什麼結果,第四步,定義一個列表變量n4,並進行賦值;然後調用bin函數,結果發現出現了報錯,第五步,如果傳入的參數是一個負數,使用bin函數轉換之後,對應的結果也為負數,第六步,定義變量n6,並進行賦值為0,結果發現返回的值也是0,並且是二進制數,注意事項
注意python語言中的bin函數的用法
注意bin函數的傳入參數和返回值
python 運維常用腳本
Python 批量遍歷目錄文件,並修改訪問時間
import os
path = “D:/UASM64/include/”
dirs = os.listdir(path)
temp=[];
for file in dirs:
temp.append(os.path.join(path, file))
for x in temp:
os.utime(x, (1577808000, 1577808000))
Python 實現的自動化服務器管理
import sys
import os
import paramiko
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
def ssh_cmd(user,passwd,port,userfile,cmd):
def ssh_put(user,passwd,source,target):
while True:
try:
shell=str(input(“[Shell] # “))
if (shell == “”):
continue
elif (shell == “exit”):
exit()
elif (shell == “put”):
ssh_put(“root”,”123123″,”./a.py”,”/root/a.py”)
elif (shell ==”cron”):
temp=input(“輸入一個計劃任務: “)
temp1=”(crontab -l; echo “+ temp + “) |crontab”
ssh_cmd(“root”,”123123″,”22″,”./user_ip.conf”,temp1)
elif (shell == “uncron”):
temp=input(“輸入要刪除的計劃任務: “)
temp1=”crontab -l | grep -v ” “+ temp + “|crontab”
ssh_cmd(“root”,”123123″,”22″,”./user_ip.conf”,temp1)
else:
ssh_cmd(“lyshark”,”123123″,”22″,”./user_ip.conf”,shell)
遍歷目錄和文件
import os
def list_all_files(rootdir):
import os
_files = []
list = os.listdir(rootdir) #列出文件夾下所有的目錄與文件
for i in range(0,len(list)):
path = os.path.join(rootdir,list[i])
if os.path.isdir(path):
_files.extend(list_all_files(path))
if os.path.isfile(path):
_files.append(path)
return _files
a=list_all_files(“C:/Users/LyShark/Desktop/a”)
print(a)
python檢測指定端口狀態
import socket
sk = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
sk.settimeout(1)
for ip in range(0,254):
try:
sk.connect((“192.168.1.”+str(ip),443))
print(“192.168.1.%d server open \n”%ip)
except Exception:
print(“192.168.1.%d server not open”%ip)
sk.close()
python實現批量執行CMD命令
import sys
import os
import paramiko
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
print(“——————————\n”)
print(“使用說明,在當前目錄創建ip.txt寫入ip地址”)
print(“——————————\n”)
user=input(“輸入用戶名:”)
passwd=input(“輸入密碼:”)
port=input(“輸入端口:”)
cmd=input(“輸入執行的命令:”)
file = open(“./ip.txt”, “r”)
line = file.readlines()
for i in range(len(line)):
print(“對IP: %s 執行”%line[i].strip(‘\n’))
python3-實現釘釘報警
import requests
import sys
import json
dingding_url = ‘ ‘
data = {“msgtype”: “markdown”,”markdown”: {“title”: “監控”,”text”: “apche異常”}}
headers = {‘Content-Type’:’application/json;charset=UTF-8′}
send_data = json.dumps(data).encode(‘utf-8’)
requests.post(url=dingding_url,data=send_data,headers=headers)
import psutil
import requests
import time
import os
import json
monitor_name = set([‘httpd’,’cobblerd’]) # 用戶指定監控的服務進程名稱
proc_dict = {}
proc_name = set() # 系統檢測的進程名稱
monitor_map = {
‘httpd’: ‘systemctl restart httpd’,
‘cobblerd’: ‘systemctl restart cobblerd’ # 系統在進程down掉後,自動重啟
}
dingding_url = ‘ ‘
while True:
for proc in psutil.process_iter(attrs=[‘pid’,’name’]):
proc_dict[proc.info[‘pid’]] = proc.info[‘name’]
proc_name.add(proc.info[‘name’])
判斷指定端口是否開放
import socket
port_number = [135,443,80]
for index in port_number:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
result = sock.connect_ex((‘127.0.0.1’, index))
if result == 0:
print(“Port %d is open” % index)
else:
print(“Port %d is not open” % index)
sock.close()
判斷指定端口並且實現釘釘輪詢報警
import requests
import sys
import json
import socket
import time
def dingding(title,text):
dingding_url = ‘ ‘
data = {“msgtype”: “markdown”,”markdown”: {“title”: title,”text”: text}}
headers = {‘Content-Type’:’application/json;charset=UTF-8′}
send_data = json.dumps(data).encode(‘utf-8’)
requests.post(url=dingding_url,data=send_data,headers=headers)
def net_scan():
port_number = [80,135,443]
for index in port_number:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
result = sock.connect_ex((‘127.0.0.1’, index))
if result == 0:
print(“Port %d is open” % index)
else:
return index
sock.close()
while True:
dingding(“Warning”,net_scan())
time.sleep(60)
python-實現SSH批量CMD執行命令
import sys
import os
import paramiko
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
def ssh_cmd(user,passwd,port,userfile,cmd):
file = open(userfile, “r”)
line = file.readlines()
for i in range(len(line)):
print(“對IP: %s 執行”%line[i].strip(‘\n’))
ssh.connect(hostname=line[i].strip(‘\n’),port=port,username=user,password=passwd)
cmd=cmd
stdin, stdout, stderr = ssh.exec_command(cmd)
result = stdout.read()
ssh_cmd(“lyshark”,”123″,”22″,”./ip.txt”,”free -h |grep ‘Mem:’ |awk ‘{print $3}'”)
用python寫一個列舉當前目錄以及所有子目錄下的文件,並打印出絕對路徑
import sys
import os
for root,dirs,files in os.walk(“C://”):
for name in files:
print(os.path.join(root,name))
os.walk()
按照這樣的日期格式(xxxx-xx-xx)每日生成一個文件,例如今天生成的文件為2013-09-23.log, 並且把磁盤的使用情況寫到到這個文件中。
import os
import sys
import time
new_time = time.strftime(“%Y-%m-%d”)
disk_status = os.popen(“df -h”).readlines()
str1 = ”.join(disk_status)
f = open(new_time+’.log’,’w’)
f.write(“%s”%str1)
f.flush()
f.close()
統計出每個IP的訪問量有多少?(從日誌文件中查找)
import sys
list = []
f = open(“/var/log/httpd/access_log”,”r”)
str1 = f.readlines()
f.close()
for i in str1:
ip=i.split()[0]
list.append(ip)
list_num=set(list)
for j in list_num:
num=list.count(j)
print(“%s —– %s” %(num,j))
寫個程序,接受用戶輸入數字,並進行校驗,非數字給出錯誤提示,然後重新等待用戶輸入。
import tab
import sys
while True:
try:
num=int(input(“輸入數字:”).strip())
for x in range(2,num+1):
for y in range(2,x):
if x % y == 0:
break
else:
print(x)
except ValueError:
print(“您輸入的不是數字”)
except KeyboardInterrupt:
sys.exit(“\n”)
ps 可以查看進程的內存佔用大小,寫一個腳本計算一下所有進程所佔用內存大小的和。
import sys
import os
list=[]
sum=0
str1=os.popen(“ps aux”,”r”).readlines()
for i in str1:
str2=i.split()
new_rss=str2[5]
list.append(new_rss)
for i in list[1:-1]:
num=int(i)
sum=sum+num
print(“%s — %s”%(list[0],sum))
關於Python 命令行參數argv
import sys
if len(sys.argv) 2:
print (“沒有輸入任何參數”)
sys.exit()
if sys.argv[1].startswith(“-“):
option = sys.argv[1][1:]
利用random生成6位數字加字母隨機驗證碼
import sys
import random
rand=[]
for x in range(6):
y=random.randrange(0,5)
if y == 2 or y == 4:
num=random.randrange(0,9)
rand.append(str(num))
else:
temp=random.randrange(65,91)
c=chr(temp)
rand.append(c)
result=””.join(rand)
print(result)
自動化-使用pexpect非交互登陸系統
import pexpect
import sys
ssh = pexpect.spawn(‘ssh lyshark@59.110.167.239’)
fout = file(‘sshlog.txt’, ‘w’)
ssh.logfile = fout
ssh.expect(“lyshark@59.110.167.239’s password:”)
ssh.sendline(“密碼”)
ssh.expect(‘#’)
ssh.sendline(‘ls /home’)
ssh.expect(‘#’)
Python-取系統時間
import sys
import time
time_str = time.strftime(“日期:%Y-%m-%d”,time.localtime())
print(time_str)
time_str= time.strftime(“時間:%H:%M”,time.localtime())
print(time_str)
psutil-獲取內存使用情況
import sys
import os
import psutil
memory_convent = 1024 * 1024
mem =psutil.virtual_memory()
print(“內存容量為:”+str(mem.total/(memory_convent))+”MB\n”)
print(“已使用內存:”+str(mem.used/(memory_convent))+”MB\n”)
print(“可用內存:”+str(mem.total/(memory_convent)-mem.used/(1024*1024))+”MB\n”)
print(“buffer容量:”+str(mem.buffers/( memory_convent ))+”MB\n”)
print(“cache容量:”+str(mem.cached/(memory_convent))+”MB\n”)
Python-通過SNMP協議監控CPU
注意:被監控的機器上需要支持snmp協議 yum install -y net-snmp*
import os
def getAllitems(host, oid):
sn1 = os.popen(‘snmpwalk -v 2c -c public ‘ + host + ‘ ‘ + oid + ‘|grep Raw|grep Cpu|grep -v Kernel’).read().split(‘\n’)[:-1]
return sn1
def getDate(host):
items = getAllitems(host, ‘.1.3.6.1.4.1.2021.11’)
if name == ‘ main ‘:
Python-通過SNMP協議監控系統負載
注意:被監控的機器上需要支持snmp協議 yum install -y net-snmp*
import os
import sys
def getAllitems(host, oid):
sn1 = os.popen(‘snmpwalk -v 2c -c public ‘ + host + ‘ ‘ + oid).read().split(‘\n’)
return sn1
def getload(host,loid):
load_oids = ‘1.3.6.1.4.1.2021.10.1.3.’ + str(loid)
return getAllitems(host,load_oids)[0].split(‘:’)[3]
if name == ‘ main ‘:
Python-通過SNMP協議監控內存
注意:被監控的機器上需要支持snmp協議 yum install -y net-snmp*
import os
def getAllitems(host, oid):
def getSwapTotal(host):
def getSwapUsed(host):
def getMemTotal(host):
def getMemUsed(host):
if name == ‘ main ‘:
Python-通過SNMP協議監控磁盤
注意:被監控的機器上需要支持snmp協議 yum install -y net-snmp*
import re
import os
def getAllitems(host,oid):
def getDate(source,newitem):
def getRealDate(item1,item2,listname):
def caculateDiskUsedRate(host):
if name == ‘ main ‘:
Python-通過SNMP協議監控網卡流量
注意:被監控的機器上需要支持snmp協議 yum install -y net-snmp*
import re
import os
def getAllitems(host,oid):
sn1 = os.popen(‘snmpwalk -v 2c -c public ‘ + host + ‘ ‘ + oid).read().split(‘\n’)[:-1]
return sn1
def getDevices(host):
device_mib = getAllitems(host,’RFC1213-MIB::ifDescr’)
device_list = []
def getDate(host,oid):
date_mib = getAllitems(host,oid)[1:]
date = []
if name == ‘ main ‘:
Python-實現多級菜單
import os
import sys
ps=”[None]-“
ip=[“192.168.1.1″,”192.168.1.2″,”192.168.1.3”]
flage=1
while True:
ps=”[None]-“
temp=input(ps)
if (temp==”test”):
print(“test page !!!!”)
elif(temp==”user”):
while (flage == 1):
ps=”[User]-“
temp1=input(ps)
if(temp1 ==”exit”):
flage=0
break
elif(temp1==”show”):
for i in range(len(ip)):
print(i)
Python實現一個沒用的東西
import sys
ps=”[root@localhost]# “
ip=[“192.168.1.1″,”192.168.1.2″,”192.168.1.3”]
while True:
temp=input(ps)
temp1=temp.split()
檢查各個進程讀寫的磁盤IO
import sys
import os
import time
import signal
import re
class DiskIO:
def init (self, pname=None, pid=None, reads=0, writes=0):
self.pname = pname
self.pid = pid
self.reads = 0
self.writes = 0
def main():
argc = len(sys.argv)
if argc != 1:
print (“usage: please run this script like [./lyshark.py]”)
sys.exit(0)
if os.getuid() != 0:
print (“Error: This script must be run as root”)
sys.exit(0)
signal.signal(signal.SIGINT, signal_handler)
os.system(‘echo 1 /proc/sys/vm/block_dump’)
print (“TASK PID READ WRITE”)
while True:
os.system(‘dmesg -c /tmp/diskio.log’)
l = []
f = open(‘/tmp/diskio.log’, ‘r’)
line = f.readline()
while line:
m = re.match(
‘^(\S+)(\d+)(\d+): (READ|WRITE) block (\d+) on (\S+)’, line)
if m != None:
if not l:
l.append(DiskIO(m.group(1), m.group(2)))
line = f.readline()
continue
found = False
for item in l:
if item.pid == m.group(2):
found = True
if m.group(3) == “READ”:
item.reads = item.reads + 1
elif m.group(3) == “WRITE”:
item.writes = item.writes + 1
if not found:
l.append(DiskIO(m.group(1), m.group(2)))
line = f.readline()
time.sleep(1)
for item in l:
print (“%-10s %10s %10d %10d” %
(item.pname, item.pid, item.reads, item.writes))
def signal_handler(signal, frame):
os.system(‘echo 0 /proc/sys/vm/block_dump’)
sys.exit(0)
if name ==” main “:
main()
利用Pexpect實現自動非交互登陸linux
import pexpect
import sys
ssh = pexpect.spawn(‘ssh root@59.110.167.239’)
fout = file(‘sshlog.log’, ‘w’)
ssh.logfile = fout
ssh.expect(“root@59.110.167.239’s password:”)
ssh.sendline(“密碼”)
ssh.expect(‘#’)
ssh.sendline(‘ls /home’)
ssh.expect(‘#’)
利用psutil模塊獲取系統的各種統計信息
import sys
import psutil
import time
import os
time_str = time.strftime( “%Y-%m-%d”, time.localtime( ) )
file_name = “./” + time_str + “.log”
if os.path.exists ( file_name ) == False :
os.mknod( file_name )
handle = open ( file_name , “w” )
else :
handle = open ( file_name , “a” )
if len( sys.argv ) == 1 :
print_type = 1
else :
print_type = 2
def isset ( list_arr , name ) :
if name in list_arr :
return True
else :
return False
print_str = “”;
if ( print_type == 1 ) or isset( sys.argv,”mem” ) :
memory_convent = 1024 * 1024
mem = psutil.virtual_memory()
print_str += ” 內存狀態如下:\n”
print_str = print_str + ” 系統的內存容量為: “+str( mem.total/( memory_convent ) ) + ” MB\n”
print_str = print_str + ” 系統的內存以使用容量為: “+str( mem.used/( memory_convent ) ) + ” MB\n”
print_str = print_str + ” 系統可用的內存容量為: “+str( mem.total/( memory_convent ) – mem.used/( 1024*1024 )) + “MB\n”
print_str = print_str + ” 內存的buffer容量為: “+str( mem.buffers/( memory_convent ) ) + ” MB\n”
print_str = print_str + ” 內存的cache容量為:” +str( mem.cached/( memory_convent ) ) + ” MB\n”
if ( print_type == 1 ) or isset( sys.argv,”cpu” ) :
print_str += ” CPU狀態如下:\n”
cpu_status = psutil.cpu_times()
print_str = print_str + ” user = ” + str( cpu_status.user ) + “\n”
print_str = print_str + ” nice = ” + str( cpu_status.nice ) + “\n”
print_str = print_str + ” system = ” + str( cpu_status.system ) + “\n”
print_str = print_str + ” idle = ” + str ( cpu_status.idle ) + “\n”
print_str = print_str + ” iowait = ” + str ( cpu_status.iowait ) + “\n”
print_str = print_str + ” irq = ” + str( cpu_status.irq ) + “\n”
print_str = print_str + ” softirq = ” + str ( cpu_status.softirq ) + “\n”
print_str = print_str + ” steal = ” + str ( cpu_status.steal ) + “\n”
print_str = print_str + ” guest = ” + str ( cpu_status.guest ) + “\n”
if ( print_type == 1 ) or isset ( sys.argv,”disk” ) :
print_str += ” 硬盤信息如下:\n”
disk_status = psutil.disk_partitions()
for item in disk_status :
print_str = print_str + ” “+ str( item ) + “\n”
if ( print_type == 1 ) or isset ( sys.argv,”user” ) :
print_str += ” 登錄用戶信息如下:\n “
user_status = psutil.users()
for item in user_status :
print_str = print_str + ” “+ str( item ) + “\n”
print_str += “—————————————————————\n”
print ( print_str )
handle.write( print_str )
handle.close()
import psutil
mem = psutil.virtual_memory()
print mem.total,mem.used,mem
print psutil.swap_memory() # 輸出獲取SWAP分區信息
cpu = psutil.cpu_stats()
printcpu.interrupts,cpu.ctx_switches
psutil.cpu_times(percpu=True) # 輸出每個核心的詳細CPU信息
psutil.cpu_times().user # 獲取CPU的單項數據 [用戶態CPU的數據]
psutil.cpu_count() # 獲取CPU邏輯核心數,默認logical=True
psutil.cpu_count(logical=False) # 獲取CPU物理核心數
psutil.disk_partitions() # 列出全部的分區信息
psutil.disk_usage(‘/’) # 顯示出指定的掛載點情況【字節為單位】
psutil.disk_io_counters() # 磁盤總的IO個數
psutil.disk_io_counters(perdisk=True) # 獲取單個分區IO個數
psutil.net_io_counter() 獲取網絡總的IO,默認參數pernic=False
psutil.net_io_counter(pernic=Ture)獲取網絡各個網卡的IO
psutil.pids() # 列出所有進程的pid號
p = psutil.Process(2047)
p.name() 列出進程名稱
p.exe() 列出進程bin路徑
p.cwd() 列出進程工作目錄的絕對路徑
p.status()進程當前狀態[sleep等狀態]
p.create_time() 進程創建的時間 [時間戳格式]
p.uids()
p.gids()
p.cputimes() 【進程的CPU時間,包括用戶態、內核態】
p.cpu_affinity() # 顯示CPU親緣關係
p.memory_percent() 進程內存利用率
p.meminfo() 進程的RSS、VMS信息
p.io_counters() 進程IO信息,包括讀寫IO數及字節數
p.connections() 返回打開進程socket的namedutples列表
p.num_threads() 進程打開的線程數
import psutil
from subprocess import PIPE
p =psutil.Popen([“/usr/bin/python” ,”-c”,”print ‘helloworld'”],stdout=PIPE)
p.name()
p.username()
p.communicate()
p.cpu_times()
psutil.users() # 顯示當前登錄的用戶,和Linux的who命令差不多
psutil.boot_time() 結果是個UNIX時間戳,下面我們來轉換它為標準時間格式,如下:
datetime.datetime.fromtimestamp(psutil.boot_time()) # 得出的結果不是str格式,繼續進行轉換 datetime.datetime.fromtimestamp(psutil.boot_time()).strftime(‘%Y-%m-%d%H:%M:%S’)
Python生成一個隨機密碼
import random, string
def GenPassword(length):
if name == ‘ main ‘:
print (GenPassword(6))
原創文章,作者:AGFI,如若轉載,請註明出處:https://www.506064.com/zh-hant/n/144800.html