Notes:
- Unfortunately the process is not as simple as I'd have expected it, that's why I wrote this little step-by-step instruction.
- My setup is/was:
- OSX 10.9.4
- VirtualBox 4.3.12
- VMware Fusion 6.0.4
- OS as VM to migrate: Ubuntu 10.04.4 LTS
#!/usr/bin/perl | |
use Net::SNMP; | |
# base_oid ist HOST-RESOURCES-MIB::hrProcessorLoad | |
my $base_oid = ".1.3.6.1.2.1.25.3.3.1.2"; | |
($session, $error) = Net::SNMP->session( | |
-hostname => "$ARGV[0]", | |
-version => "2", |
<cacti> | |
<hash_000021aeee4e0ca11a898bbc3d5d2b516e0ed6> | |
<name>BMI HS22 6-Core CPU GT</name> | |
<graph> | |
<t_title></t_title> | |
<title>|host_description| - CPU Load</title> | |
<t_image_format_id></t_image_format_id> | |
<image_format_id>1</image_format_id> | |
<t_height></t_height> | |
<height>120</height> |
<# | |
.SYNOPSIS | |
A full graceful telnet client using PowerShell and the .NET Framework. | |
.DESCRIPTION | |
This script was made with a view of using it to have full control over the text | |
stream for automating Cisco router and switch configurations. | |
.PARAMETER TelnetHost | |
The address of the server or router hosting the telnet service. |
[ | |
{ | |
"name":"ABAP", | |
"type":"programming", | |
"extensions":[ | |
".abap" | |
] | |
}, | |
{ | |
"name":"AGS Script", |
#!/usr/bin/env python | |
# | |
# Decrypt SSHv2 passwords stored in VanDyke SecureCRT session files | |
# Can be found on Windows in: | |
# %APPDATA%\VanDyke\Config\Sessions\sessionname.ini | |
# Tested with version 7.2.6 (build 606) for Windows | |
# Eloi Vanderbeken - Synacktiv | |
from Crypto.Cipher import Blowfish | |
import argparse |
Windows Service with Python 3.5 and pyinstaller
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
#!/usr/bin/python | |
from smb.SMBConnection import SMBConnection | |
import random, string | |
from smb import smb_structs | |
smb_structs.SUPPORT_SMB2 = False | |
import sys | |
# Just a python version of a very simple Samba exploit. |
import json,xmltodict | |
""" | |
Nmap XML Output to Json Output in Python | |
example : data = xml2json('nmap_output.xml') | |
""" | |
def xml2json(xml): | |
xmlfile = open(xml) | |
xml_content = xmlfile.read() | |
xmlfile.close() | |
xmljson = json.dumps(xmltodict.parse(xml_content), indent=4, sort_keys=True) |