Skip to content

Instantly share code, notes, and snippets.

View bandrel's full-sized avatar

Justin Bollinger bandrel

View GitHub Profile

Keybase proof

I hereby claim:

  • I am bandrel on github.
  • I am bandrel (https://keybase.io/bandrel) on keybase.
  • I have a public key whose fingerprint is F5CD 374B 6632 61A4 BAA5 A07E A7D4 3760 5956 EAC0

To claim this, I am signing this object:

def query(self, hostname, query_type = 'ANY', name_server = False, use_tcp = True):
ret = []
response = None
if name_server == False:
name_server = self.get_ns()
else:
self.wildcards = {}
self.failed_code = None
self.last_resolver = name_server
query = dnslib.DNSRecord.question(hostname, query_type.upper().strip())
@bandrel
bandrel / gist:b9dcc64628fc9dff8fd1c9d476bf0506
Created January 27, 2017 20:50
eem script for updating port description using CDP
event manager applet update-port-description
event neighbor-discovery interface regexp GigabitEthernet0/.* cdp add
action 1.0 cli command "enable"
action 2.0 cli command "config t"
action 3.0 cli command "interface $_nd_local_intf_name"
action 4.0 cli command "description $_nd_cdp_entry_name:$_nd_port_id"
#!/usr/bin/env python3
import ipaddress
import sys
subnets = str(sys.argv[1]).split(',')
for network in subnets:
for host in ipaddress.IPv4Network(network).hosts():
print(host)
#!/usr/bin/env python
import requests
import sys
import re
domain = sys.argv[1]
r = requests.get('https://crt.sh/?q=%.'+domain)
hostnames = re.findall(r'<TD>(\S+\.'+domain+r')',r.text)
#!/usr/bin/env python3
from __future__ import print_function
import socket
import argparse
import requests
import re
parser = argparse.ArgumentParser(description='Enumerate subdomains via certificate transparency logs')
parser.add_argument('domain', type=str, help='Target domain name')
#!/usr/bin/env python3
from __future__ import print_function
import socket
import argparse
import requests
import re
parser = argparse.ArgumentParser(description='Enumerate subdomains via certificate transparency logs')
parser.add_argument('domain', type=str, help='Target domain name')
@bandrel
bandrel / check_hashes.py
Last active February 2, 2023 15:55
To check for and reveal AD user accounts that share passwords using a hashdump from a Domain Controller
#!/usr/bin/env python3
#Purpose: To check for and reveal AD user accounts that share passwords using a hashdump from a Domain Controller
#Script requires a command line argument of a file containing usernames/hashes in the format of user:sid:LMHASH:NTLMHASH:::
# ./check_hashes.py <hash_dump>
import argparse
import re
parser = argparse.ArgumentParser(description="Check user hashes against each other to find users that share passwords")
#!/usr/bin/env python3
'''
Script to expand CIDR notation to a list of IP addresses.
'''
import ipaddress
import sys
hosts = set()
subnets = str(sys.argv[1]).split(',')
#!/usr/bin/env python3
import argparse
import binascii
parser = argparse.ArgumentParser(description='Encoding and Decoding F5 URL Rewrites')
parser.add_argument('mode', type=str, help='text to encode or decode')
parser.add_argument('input_text', type=str, help='text to encode or decode')
parser.add_argument('--host', type=str, help='original F5 baseurl')