p0z / CUCM_Phonebook
CUCM corporation phonebook viewer | Cisco
☆9Updated 8 years ago
Alternatives and similar repositories for CUCM_Phonebook
Users that are interested in CUCM_Phonebook are comparing it to the libraries listed below
Sorting:
- This project provides tools to manage configurations for Cisco devices. Requires PHP5 and MySQL.☆17Updated 4 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Updated 6 years ago
- Учебные работы по дисциплинам "Сети и системы передачи данных", "Организация компьютерных сетей" и "Организация сетевой безопасности"☆14Updated 3 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- ISC Forge is an open source DHCP conformance validation framework, primarily used for testing ISC Kea.☆37Updated 3 weeks ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Measuring Internet AS dependency☆12Updated 3 years ago
- Dynamic DNS for RIPE Atlas☆11Updated 4 years ago
- Repository for penetration testing tools☆36Updated 5 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- ☆26Updated 7 years ago
- Traffic monitor for mikrotik in python☆22Updated 5 years ago
- ☆15Updated 8 years ago
- A scanner for SIP proxies vulnerable to Shellshock☆112Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- ☆16Updated 3 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- GNS3 code before v1.0☆15Updated 10 years ago
- BGP Hijack Detection☆111Updated 7 years ago
- Geolocating Internet infrastructure☆13Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆11Updated 4 years ago
- DNS passive monitoring tool☆16Updated 7 years ago
- The ExaBGP process plugin script to RTBH a local and the voipbl.org blacklist☆19Updated 3 years ago
- ☆13Updated 7 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago