This Python script uses the openpyxl module to read an Excel sheet and extract a specific column containing text. The script then writes the text values to a text file.
This script requires the openpyxl module to be installed. You can install it via pip: pip install openpyxl
To use this script, follow these steps:
- Place the example.xlsx file in the same directory as the excel2text.py script.
- Run the
excel2text.pyscript. - Check the same directory for the output.txt file containing the extracted text.
This Python 3 script, nsccookieparsertxt.py, is designed to parse a text file and extract NetScaler cookies. The extracted cookies are stored in a list and can be written to a file.
To use this script, save the file as nsccookieparsertxt.py and place it in the same directory as the text file that you want to parse. Then, in a terminal or command prompt, navigate to the directory and run the following command: python nsccookieparsertxt.py
The script will prompt you to enter the name of the text file that you want to parse. Enter the name of the file (including the file extension) and press Enter. The script will then search the file for NetScaler cookies and extract them into a list. The list is then written to a file named input.txt in the same directory.
This script requires Python 3 to run. No additional libraries or packages are required.
This Python script allows you to bulk decrypt Citrix NetScaler cookies, extracting the service name, server IP, and server port for each cookie.
This script requires the following dependencies:
- Python 3
- Create a file named
input.txtin the same directory as the script. - Add one or more Citrix NetScaler cookies per line to the
input.txtfile. - Run the script using the following command:
python nsccookiedercyptBulk.py - The decrypted output will be written to a file named
output.txtin the same directory as the script.
The output for each input cookie will be written to output.txt in the following format:
- NSC: [input cookie]
- vServer Name=[decrypted service name]
- vServer IP=[decrypted server IP]
- vServer Port=[decrypted server port]
The script works by first parsing each input cookie to extract the service name, server IP, and server port. Next, it decrypts the service name using a Caesar substitution cipher encryption. Then, it decrypts the server IP and server port using XOR encryption. Finally, it outputs the decrypted service name, server IP, and server port for each input cookie to a file.
This project is licensed under the MIT License.