I hereby claim:
- I am bandrel on github.
- I am bandrel (https://keybase.io/bandrel) on keybase.
- I have a public key whose fingerprint is F5CD 374B 6632 61A4 BAA5 A07E A7D4 3760 5956 EAC0
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
def query(self, hostname, query_type = 'ANY', name_server = False, use_tcp = True): | |
ret = [] | |
response = None | |
if name_server == False: | |
name_server = self.get_ns() | |
else: | |
self.wildcards = {} | |
self.failed_code = None | |
self.last_resolver = name_server | |
query = dnslib.DNSRecord.question(hostname, query_type.upper().strip()) |
event manager applet update-port-description | |
event neighbor-discovery interface regexp GigabitEthernet0/.* cdp add | |
action 1.0 cli command "enable" | |
action 2.0 cli command "config t" | |
action 3.0 cli command "interface $_nd_local_intf_name" | |
action 4.0 cli command "description $_nd_cdp_entry_name:$_nd_port_id" |
#!/usr/bin/env python3 | |
import ipaddress | |
import sys | |
subnets = str(sys.argv[1]).split(',') | |
for network in subnets: | |
for host in ipaddress.IPv4Network(network).hosts(): | |
print(host) |
#!/usr/bin/env python | |
import requests | |
import sys | |
import re | |
domain = sys.argv[1] | |
r = requests.get('https://crt.sh/?q=%.'+domain) | |
hostnames = re.findall(r'<TD>(\S+\.'+domain+r')',r.text) |
#!/usr/bin/env python3 | |
from __future__ import print_function | |
import socket | |
import argparse | |
import requests | |
import re | |
parser = argparse.ArgumentParser(description='Enumerate subdomains via certificate transparency logs') | |
parser.add_argument('domain', type=str, help='Target domain name') |
#!/usr/bin/env python3 | |
from __future__ import print_function | |
import socket | |
import argparse | |
import requests | |
import re | |
parser = argparse.ArgumentParser(description='Enumerate subdomains via certificate transparency logs') | |
parser.add_argument('domain', type=str, help='Target domain name') |
#!/usr/bin/env python3 | |
#Purpose: To check for and reveal AD user accounts that share passwords using a hashdump from a Domain Controller | |
#Script requires a command line argument of a file containing usernames/hashes in the format of user:sid:LMHASH:NTLMHASH::: | |
# ./check_hashes.py <hash_dump> | |
import argparse | |
import re | |
parser = argparse.ArgumentParser(description="Check user hashes against each other to find users that share passwords") |
#!/usr/bin/env python3 | |
''' | |
Script to expand CIDR notation to a list of IP addresses. | |
''' | |
import ipaddress | |
import sys | |
hosts = set() | |
subnets = str(sys.argv[1]).split(',') |
#!/usr/bin/env python3 | |
import argparse | |
import binascii | |
parser = argparse.ArgumentParser(description='Encoding and Decoding F5 URL Rewrites') | |
parser.add_argument('mode', type=str, help='text to encode or decode') | |
parser.add_argument('input_text', type=str, help='text to encode or decode') | |
parser.add_argument('--host', type=str, help='original F5 baseurl') | |