Showing 4 open source projects for "show%20mouse"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 1
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Is tested with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Cisco config sanitizer tool

    Cisco config sanitizer tool

    Tool used to sanitize Cisco configuration files.

    ...It removes passwords, keys, certs and other sensitive data from text config files. Use this tool to sanitize extracted configurations files before you send them to audit (Ex: TAC) 'show tech-support' is good, but sometimes you need to remove more sensitive data from the configurations This tool will scan a folder with all its sub-folders and sanitize every file from that tree. But it will never modify the source files, instead it will create another folder with sanitized files. Info: The result will be another folder next to the source called "<configurations folder>_sanitized" To change the file search filter modify "SET FILTER=" in script file To add/modify/remove sanitizer syntax edit the awk file inside bin folder Usage: cisco-config-sanitizer.bat "<configurations folder>" If there are sensitive data still leaking after sanitizing, please let me know. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    exd

    exd

    A command line tool to manage bytes in hex dumps or packet captures

    Command-line tool to examine or edit bytes in hex, octal, binary, or in packet capture (pcap) dumps. Exd is intended to be used in conjunction with hex dump tools such as xxd, od, hexdump, or hd, and with packet capture dump tools such as tshark and text2pcap. --- metadata tags byte hex octal binary pcap packet packet dump hexdump
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    dep-trace

    gdeptrace dependancy solver correct for pkg or make deps

    gdeptrace sorts an input dependancy list or table and prints it, and can do other actions. It's default operation is to act like tsort (1) except that it sorts by pure pkg / make dependancy (tsort sorts by grapical topology: see notes about differences). EXAMPLE: $ echo -e "b e\ne\nc b" | sort -k1,1 | gdeptrace [opts] e b c (b depends on e, c depends on b, e has no depends) (also: e has more items depending on it and is below anything it depends on; in this case...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Previous
  • You're on page 1
  • Next