This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Overview

IP-ARP-Vendor_lookup

This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Why?

  • Answers the question what are the different vendors seen in a Cisco #sh ip arp
  • Helps to understand what is in a network

Requirements:

  • This uses a restful API to search for the vendors, so it needs an internet connection
  • This needs the output of a "#sh ip arp", as it is using this to do the lookup

Output:

  • Program Output: image
  • Vendor_list.txt Output: image
You might also like...
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses

Cisco-MAC-to-PC-MAC Converts a file with a list of Cisco formatted MAC Addresses to PC formatted MAC Addresses... Ex: abcd.efgh.ijkl to AB:CD:EF:GH:I

This is simple script that changes the config register of a cisco router over serial so that you can reset the password

Cisco-router-config-bypass-tool- This is simple script that changes the config register of a cisco router over serial so that you can bypass the confi

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

Take a list of domains and probe for working HTTP and HTTPS servers

httprobe Take a list of domains and probe for working http and https servers. Install ▶ go get -u github.com/tomnomnom/httprobe Basic Usage httprobe

 Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name
Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name

Fmog: Fortinet Mass Object Generator This script will take a list of IP addresses and create address objects with the same name. It will also add them

A website to list Shadowsocks proxies and check them periodically

Shadowmere An automatically tested list of Shadowsocks proxies. Motivation Collecting proxies around the internet is fun, but what if they stop workin

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.
Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file. Installation $ git clone https://github.com/whoamisec75/i

This is an open project to maintain a list of domain names that serve YouTube ads

The YouTube ads blocklist project This is an open project to maintain a list of domain names that serve YouTube ads. The original project only produce

This is a simple python code to get the list of banned IP addresses from Fail2ban

Fail2ban Scripts Usage banned_list.py This script tries to get the banned list of IP addresses by Fail2ban for the service freeswitch. You can modify

Releases(v11.0)
  • v11.0(May 19, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Automatically attempts to upgrade required libraries (05/22/2022)
    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(35.25 KB)
  • v10.0(Apr 21, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(34.57 KB)
  • v9.5(Apr 7, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗

    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(33.16 KB)
  • v9.0(Apr 6, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.77 KB)
  • v8.5(Mar 29, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    As of 03/29:

    Features:

    • Produces output on the vendors (companies) seen within the network, such as their hardware address, IP address, VLAN etc
    • Produces an interactive web-based pie chart if you have Firefox or Chrome available on a Windows Apple, or Linux system
    • Rich color formatting for the screen for easy viewing
    • Organizes files into two folders csv_files and text_files for easy review

    Fixes:

    • Now requests for the application to be restarted if needed libraries are installed
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.62 KB)
  • v8.0(Mar 23, 2022)

    03/23/2022

    • Fixed CSV bug, now csv files contain the correct info
    • *.csv device files are now in the csv_files folder
    • *.txt files are now moved to the folder text_files for cleaner organization

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(31.83 KB)
  • 7.5(Mar 19, 2022)

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(30.28 KB)
  • 7.1(Mar 7, 2022)

    03/16/2022

    • Added current directory path instead of saying "current directory"

    As of 03/0/7/2022

    • CLI / Terminal output is now colored
    • Output is organized

    Previous updates:

    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(28.22 KB)
  • 6.5(Dec 3, 2021)

    This program reads a text file containing the output of a MAC address table or an ARP table like a Cisco sh ip arp it then data mines that file, getting the company and OUI information, it then searches the text file using the specific OUIs for Apple, Cisco, Dell, Mitel and HP devices to get how many of each of these devices are in the ARP / MAC address table.

    It produces text files containing:

    • The alphabetized list of unique vendors (as in companies) shown in the file (via a restful API lookup)
    • A list of all the unique OUIs (hardware types) seen in the ARP / MAC Address table (removes duplicate entries)
    • A total list of Apple systems seen in the ARP /MAC address table
    • A total list of the Cisco devices seen in the ARP / MAC address table
    • A total list of the Dell devices see in the ARP / MAC address table
    • A total list of all the HP devices in the ARP / MAC address table
    • A total list of all the Mitel Inc phones in the ARP / MAC address table
    • A total list of all the unique VLANs in the ARP / MAC address table

    The files above contain relevant information such as (if an ARP table was digested) the IP address, time the system in question saw the device, the MAC address of the specific device, and the VLAN it is in.

    ... And now shows progress bars and produces an interactive Pie Chart if you have Firefox or Chrome available on a Linux, Windows or Mac computer

    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(27.95 KB)
Owner
Stew Alexander
Systems Engineer - On the hunt for simplicity and efficiency.
Stew Alexander
Client library for relay - a service for relaying server side messages to the client side browsers via websockets.

Client library for relay - a service for relaying server side messages to the client side browsers via websockets.

getme 1 Nov 10, 2021
Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks

🪴 Tsunami-Fi 🪴 Русская версия README 🌿 Description 🌿 Tsunami-Fi is simple multi-tool bash application for Wi-Fi WPS PixieDust and NullPIN attack,

【Kiko】 35 Dec 09, 2022
Module for convenient work with TCP sockets.

m_socket-py Module for convenient work with TCP sockets. Contributing Pool Request is supported! Ask questions in the Issues section. License Copyrigh

Egor Arskiy 5 Mar 09, 2022
This tools just for education only - Layer-7 or HTTP FLOODER

Layer-7-Flooder This tools just for education only - Layer-7 or HTTP FLOODER Require Col1 Before You Run this tools How To Use Download This Source Ex

NumeX 7 Oct 30, 2022
Simple local RPG turn-based to play while learn something using the anki system

Simple local RPG turn-based to play while learn something using the anki system

Raphael Kieling 5 Aug 02, 2022
This will generate a very basic DHCP config with use of PHPIPAM systems.

phpipam-dhcp-config-generator This will generate a very basic DHCP config with use of PHPIPAM systems. Requirements PHPIPAM Custom Fields domain_name

1 Oct 24, 2021
🥑 A Python ARP and DNS Spoofer CLI and INTERFACE 🥓

NEXTGEN SPOOFER 🥑 A Python ARP and DNS Spoofer CLI and INTERFACE 🥓 CLI - advanced pentesters INTERFACE - beginners SetUp Make sure you installed P

9 Dec 25, 2022
D-dos attack GUI tool written in python using tkinter module

ddos D-dos attack GUI tool written in python using tkinter module #to use this tool on android, do the following on termux. *. apt update *. apt upgra

6 Feb 05, 2022
A Simple but Powerful cross-platform port scanning & and network automation tool.

DEDMAP is a Simple but Powerful, Clever and Flexible Cross-Platform Port Scanning tool made with ease to use and convenience in mind. Both TCP

Anurag Mondal 30 Dec 16, 2022
Tool that creates a complete copy of your server

Discord-Server-Cloner Tool that creates a complete copy of your server Setup: Open run.bat If the file closes, open cmd And write: pip install -r requ

DEEM 3 Dec 13, 2021
Nexum is an open-source, remote administration tool written in Python 3

A full-featured remote administration tool written in Python 3. The goal of this project is to make the use of a remote administration tool as simple

z3phyrus 2 Nov 26, 2021
Search ports in multiples hosts

Search Port ✨ Multiples Searchs ✨ Create list hosts Create list targets Start Require Python 3.10.0+. python main.py Struture Function Directory load_

Tux#3634 7 Apr 29, 2022
A benchmark for stateful fuzzing of network protocols

A benchmark for stateful fuzzing of network protocols

3 Apr 25, 2022
Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.

Passive TCP/IP Fingerprinting This is a passive TCP/IP fingerprinting tool. Run this on your server and find out what operating systems your clients a

Nikolai Tschacher 158 Dec 20, 2022
A socket script to obtain chinese phones-sequence for any english word

Foreign Pronunciation Generator (English-Chinese) We provide a simple socket script for acquiring Chinese pronunciation of English words (phones in ai

Ephemeroptera 5 Jul 25, 2022
Azure-function-proxy - Basic proxy as an azure function serverless app

azure function proxy (for phishing) here are config files for using *[.]azureweb

17 Nov 09, 2022
Repo used to maintain all notes and scripts developed during my DevNet Expert studies

DevNet Expert Studies Exam Date: TBD (Waiting for registration to open) This repository will be used to track my progress and maintain all notes/scrip

Dan 32 Dec 11, 2022
A web-based app that allows easy, simple - and if desired high-throughput - analysis of qPCR data

qpcr-Analyser A web-based GUI for the qpcr package that allows easy, simple and high-throughput analysis of qPCR data. As is described in more detail

1 Sep 13, 2022
Slowloris is basically an HTTP Denial of Service attack that affects threaded servers.

slowrise-ddos-tool What is Slowloris? Slowloris is basically an HTTP Denial of S

DEMON cat 4 Jun 19, 2022
Arp Spoofer using Python 3.

ARP Spoofer / Wifi Killer By Auax Run: Run the application with the following command: python3 spoof.py -t target_ip_address -lh host_ip_address I

Auax 6 Sep 15, 2022