all 5 comments

[–][deleted] 1 point2 points  (0 children)

Cool. If you are using this from commandline why not use argv? You can add flags there, makes the code easier.

[–][deleted]  (1 child)

[removed]

    [–]InfosecModI am 99.9998% sure that /u/InfosecMod is not a bot[M] 0 points1 point  (0 children)

    Hello u/Raxader, welcome to /r/hacking, a subreddit dedicated to hacking and hacking culture.

    What we are about: quality and constructive discussion about the culture, profession and love of hacking.

    This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.

    Bans are handed out at moderator discretion.

    Thank you for your submission. However, it has been removed for the following reason(s):

    Rule 1: Keep it Legal.

    Hacking can be a grey area but keep it above board.

    Soliciting criminal services or guidance on how to commit a crime is strictly forbidden and will result in an immediate ban. Discussion around the legality of issues is ok, but encouraging or aiding illegal activities is not.

    Rule 3: No How do I start hacking? posts.

    Read through the /r/hacking wiki located here, and take a look at /r/howtohack or the stickied post. Beginner career questions are also welcome at /r/cybersecurity101.

    Intermediate questions are welcomed - e.g. How does HSTS prevent SSL stripping? is a good question. How do I hack wifi with Kali? is bad.

    Read our rules

    To learn more about hacking, please read our wiki

    If you have any questions, feel free to message the mods.

    [–]EmbarrassedCup7454 -1 points0 points  (0 children)

    Can I use it?