Script to test if sites are visible to users on the open internet.
If they are, the don't need to be "webified" to be sent through FirePass device.
The script depends on the requests
library to perform HTTP tests.
#!/usr/bin/env python | |
import csv | |
import re | |
import sys | |
import requests | |
API = 'http://api.geoiplookup.net/?query=%s' |
#!/usr/bin/env python | |
import httplib | |
import sys | |
headers = { | |
'Cookie': 'iPlanetDirectoryPro=%s' % sys.argv[1], | |
} | |
try: |
#!/bin/bash | |
# Based on recipe obtained from | |
# http://www.shellhacks.com/en/HowTo-Check-SSL-Certificate-Expiration-Date-from-the-Linux-Shell | |
# Usage: sslinfo <host> [<port:443>] | |
echo | \ | |
openssl s_client -connect ${1}:${2:-443} 2>/dev/null | \ |
I hereby claim:
To claim this, I am signing this object:
import string | |
import sys | |
import re | |
tr = string.maketrans("()", "[]") | |
L, D, N = map(int, re.findall('\d+', sys.stdin.readline())) | |
words = map(sys.stdin.readline, D * [L + 1]) | |
tests = sys.stdin.readlines() |
#!/usr/bin/env python | |
""" | |
Script to generate a bunch of bogus user creations using the | |
MEVI creation interface. | |
See documentation for fake-factory, which is doing the bulk | |
of the work. | |
https://pypi.python.org/pypi/fake-factory/0.2 | |
""" |
import re | |
dn_re = re.compile(r'(?:/)(.+?)(?:=)([^/]+)') | |
DN = "/C=AU/ST=NSW/L=Avoca Beach/O=Touch Technology Pty Ltd/CN=touchtechnology.com.au/emailAddress=support@touchtechnology.com.au" | |
def parse_dn(dn): | |
return dict(dn_re.findall(dn)) | |
print parse_dn(DN) |
import csv | |
import ldif | |
import sys | |
def flatten(d, bar='|'): | |
""" | |
Take a regular dictionary, and flatten the value if it's a list. | |
""" | |
diff = {} |