This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Overview

IP-ARP-Vendor_lookup

This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Why?

  • Answers the question what are the different vendors seen in a Cisco #sh ip arp
  • Helps to understand what is in a network

Requirements:

  • This uses a restful API to search for the vendors, so it needs an internet connection
  • This needs the output of a "#sh ip arp", as it is using this to do the lookup

Output:

  • Program Output: image
  • Vendor_list.txt Output: image
You might also like...
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses

Cisco-MAC-to-PC-MAC Converts a file with a list of Cisco formatted MAC Addresses to PC formatted MAC Addresses... Ex: abcd.efgh.ijkl to AB:CD:EF:GH:I

This is simple script that changes the config register of a cisco router over serial so that you can reset the password

Cisco-router-config-bypass-tool- This is simple script that changes the config register of a cisco router over serial so that you can bypass the confi

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

Take a list of domains and probe for working HTTP and HTTPS servers

httprobe Take a list of domains and probe for working http and https servers. Install ▶ go get -u github.com/tomnomnom/httprobe Basic Usage httprobe

 Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name
Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name

Fmog: Fortinet Mass Object Generator This script will take a list of IP addresses and create address objects with the same name. It will also add them

A website to list Shadowsocks proxies and check them periodically

Shadowmere An automatically tested list of Shadowsocks proxies. Motivation Collecting proxies around the internet is fun, but what if they stop workin

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.
Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file. Installation $ git clone https://github.com/whoamisec75/i

This is an open project to maintain a list of domain names that serve YouTube ads

The YouTube ads blocklist project This is an open project to maintain a list of domain names that serve YouTube ads. The original project only produce

This is a simple python code to get the list of banned IP addresses from Fail2ban

Fail2ban Scripts Usage banned_list.py This script tries to get the banned list of IP addresses by Fail2ban for the service freeswitch. You can modify

Releases(v11.0)
  • v11.0(May 19, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Automatically attempts to upgrade required libraries (05/22/2022)
    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(35.25 KB)
  • v10.0(Apr 21, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(34.57 KB)
  • v9.5(Apr 7, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗

    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(33.16 KB)
  • v9.0(Apr 6, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.77 KB)
  • v8.5(Mar 29, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    As of 03/29:

    Features:

    • Produces output on the vendors (companies) seen within the network, such as their hardware address, IP address, VLAN etc
    • Produces an interactive web-based pie chart if you have Firefox or Chrome available on a Windows Apple, or Linux system
    • Rich color formatting for the screen for easy viewing
    • Organizes files into two folders csv_files and text_files for easy review

    Fixes:

    • Now requests for the application to be restarted if needed libraries are installed
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.62 KB)
  • v8.0(Mar 23, 2022)

    03/23/2022

    • Fixed CSV bug, now csv files contain the correct info
    • *.csv device files are now in the csv_files folder
    • *.txt files are now moved to the folder text_files for cleaner organization

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(31.83 KB)
  • 7.5(Mar 19, 2022)

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(30.28 KB)
  • 7.1(Mar 7, 2022)

    03/16/2022

    • Added current directory path instead of saying "current directory"

    As of 03/0/7/2022

    • CLI / Terminal output is now colored
    • Output is organized

    Previous updates:

    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(28.22 KB)
  • 6.5(Dec 3, 2021)

    This program reads a text file containing the output of a MAC address table or an ARP table like a Cisco sh ip arp it then data mines that file, getting the company and OUI information, it then searches the text file using the specific OUIs for Apple, Cisco, Dell, Mitel and HP devices to get how many of each of these devices are in the ARP / MAC address table.

    It produces text files containing:

    • The alphabetized list of unique vendors (as in companies) shown in the file (via a restful API lookup)
    • A list of all the unique OUIs (hardware types) seen in the ARP / MAC Address table (removes duplicate entries)
    • A total list of Apple systems seen in the ARP /MAC address table
    • A total list of the Cisco devices seen in the ARP / MAC address table
    • A total list of the Dell devices see in the ARP / MAC address table
    • A total list of all the HP devices in the ARP / MAC address table
    • A total list of all the Mitel Inc phones in the ARP / MAC address table
    • A total list of all the unique VLANs in the ARP / MAC address table

    The files above contain relevant information such as (if an ARP table was digested) the IP address, time the system in question saw the device, the MAC address of the specific device, and the VLAN it is in.

    ... And now shows progress bars and produces an interactive Pie Chart if you have Firefox or Chrome available on a Linux, Windows or Mac computer

    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(27.95 KB)
Owner
Stew Alexander
Systems Engineer - On the hunt for simplicity and efficiency.
Stew Alexander
Top server mcpe Indonesia!

server_mcpe Top server mcpe Indonesia! install pkg install python pkg install git git clone https://github.com/Latip176/server_mcpe cd server_mcpe pip

Muhammad Latif Harkat 2 Jul 17, 2022
Wifijammer - Continuously jam all wifi clients/routers

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Al

Dan McInerney 3.5k Dec 31, 2022
Ov3 - Easy common OpenVPN3 operations

ov3 Easy common OpenVPN3 operations Install ov3 requires Python3 and OpenVPN3 to

Yunus Bora Erciyas 6 Apr 25, 2022
基于多线程快速端口扫描脚本,支持目标批量导入、结果导出。

JWS_portscan 基于多线程快速端口扫描脚本,支持目标批量导入、结果导出。如果扫描公网资产,为了提升扫描的精准性,建议放到服务器运行。 用法 依赖安装:pip3 install -r requriement.txt 支持参数:python3 JWS_portscan.py --help 脚本

jammny 5 Apr 12, 2022
telnet implementation over TCP socket with python

This a P2P implementation of telnet. This program transfers data on TCP sockets as plain text

10 May 19, 2022
Socket Based Backdoor and Listener

The Project is mainly based on Sockets , File Handling and subprocess library for Creating backdoors For Hacking into one's Computer (Any OS-Platform Service) and listening on your computer and waiti

Shivansh Mehta 3 May 31, 2021
VRF-StarkNet - Contracts for verifiable randomness on StarkNet

VRF-StarkNet Contracts for verifiable randomness on StarkNet Motivation Deployed

Non 32 Oct 30, 2022
ASC - Api Server Controller

ASC - Api Server Controller

Uriel Alves 1 Jan 03, 2022
Nexum is an open-source, remote administration tool written in Python 3

A full-featured remote administration tool written in Python 3. The goal of this project is to make the use of a remote administration tool as simple

z3phyrus 2 Nov 26, 2021
Wifi-Jamming is a simple, yet highly effective method of causing a DoS on a wireless implemented using python pyqt5.

pyqt5-linux-wifi-jamming-tool Linux-Wifi-Jamming is a simple GUI tool, yet highly effective method of causing a DoS on a wireless implemented using py

lafesa 8 Dec 05, 2022
RabbitMQ asynchronous connector library for Python with built in RPC support

About RabbitMQ connector library for Python that is fully integrated with the aio-pika framework. Introduction BunnyStorm is here to simplify working

22 Sep 11, 2022
Tool for pretty printing and optimizing Lightning Network channels.

Suez Tool for pretty printing and optimizing Lightning Network channels. Installation Install poetry poetry install poetry run ./suez Channel fee poli

Pavol Rusnak 69 Nov 03, 2022
A simple python application for generating a WiFi QR code for ease of connection

A simple python application for generating a WiFi QR code Initialize the class by providing QR code values WiFi_QR_Code(self, error_correction: int =

Ivan 2 Aug 01, 2022
Geowifi 📡 💘 🌎 Search WiFi geolocation data by BSSID and SSID on different public databases.

Geowifi 📡 💘 🌎 Search WiFi geolocation data by BSSID and SSID on different public databases.

GOΠZO 441 Dec 23, 2022
A server and client for passing data between computercraft computers/turtles across dimensions or even servers.

ccserver A server and client for passing data between computercraft computers/turtles across dimensions or even servers. pastebin get zUnE5N0v client

1 Jan 22, 2022
Aiotor - a pool of proxies, shifting on each request

Aiotor - a pool of proxies, shifting on each request

Leon 32 Dec 26, 2022
SonicWall SSL-VPN Exploit

VisualDoor SonicWall SSL-VPN Exploit, as used by Phineas Fisher to hack Cayman Trust Bank and Hacking Team.

169 Nov 15, 2022
netpy - more than implementation of netcat 🐍🔥

netpy - more than implementation of netcat 🐍🔥

Mahmoud S. ElGammal 1 Jan 26, 2022
Mass Reverse IP Dibuat Dengan Python 3 Dan Ada Fitur Filter.

Reverse IP Tools Description. Reverse IP is a method to map an IP address to a sub domain. This tool is made in the python 3 programming language. Fea

Wan Naz ID 6 Oct 24, 2022
A lightweight python script that can monitor the T-Mobile Home Internet Nokia 5G Gateway for band and connectivity and reboot as needed.

tmo-monitor A lightweight Python 3 script that can monitor the T-Mobile Home Internet Nokia 5G Gateway for band and connectivity and reboot as needed.

61 Dec 17, 2022