Explore my portfolio of projects that showcase my coding abilities, emphasizing my technical skills and problem-solving methodology.
This Python script provides a solution for erasing Cisco devices such as switches or routers. It automates the process of erasing the start-up configuration and reloading the device, effectively resetting it to factory defaults.
This Python script is designed to facilitate the copying of templates to Cisco routers or switches via console connection. It provides a simple interface for selecting the COM port, baud rate, and entering the password required for accessing privileged EXEC mode on the device. The script then copies the specified template file to the device and generates a log file to track the process.
This script provides a simple yet effective way to automatically back up the running configuration of Cisco devices. It establishes a serial connection with the device, enters privileged EXEC mode if required, retrieves the running configuration, and saves it to a specified file.
Cisco Switch Configurator allows users to interact with Cisco switches through a graphical interface, enabling the execution of commands and configuration tasks with ease.
This is a simple Ping verification script created in Python by Anthony Constant (AC). The purpose of this script is to automate the process of pinging a list of devices and return whether the network status is successful or unsuccessful.
This an advanced Ping verification script created in Python by Anthony Constant (AC). The purpose of this script is to automate the process of pinging a maximum number of devices inside a network and return whether the network status is successful or unsuccessful. The script uses the write method to create/open/write the status to a file called ping_logs.txt.
This is a simple keylogger script created in Python by Anthony Constant (AC). The script uses the pynput plugin to control and monitor devices, and it logs every key pressed by the user to a specified file.
This is an advanced keylogger script created in Python by Anthony Constant. The script allows the user to monitor keystrokes on a keyboard and capture screenshots of the computer monitor. The script is also able to encrypt the data it captures and send it to a specified email address.
The Port Scanner is a Python script that allows users to scan a target IP address and determine which ports are open. This script utilizes multi-threading to optimize the scanning process and automatically logs the open ports to a local file.
This is a simple implementation of the Caesar cipher encryption technique in Python. The Caesar cipher is one of the simplest and most widely known encryption techniques. It works by replacing each letter in the plaintext message by a letter a fixed number of positions down the alphabet. This fixed number is called the key. The method is named after Julius Caesar, who used it in his private correspondence.
This is a Tic Tac Toe game project created using the REPL.it platform within Python language. The board is set up as the empty string list then calls upon the respective functions (shown in the code) to start the game.
Cisco Device Eraser (pdf)
DownloadCisco Configuration Deployment (pdf)
DownloadCisco Configuration Backup (pdf)
DownloadCisco Switch Configurator (pdf)
DownloadSimple Keylogger (pdf)
DownloadAdvanced Ping Verification (pdf)
DownloadSimple Ping Verification (pdf)
DownloadAdvanced Keylogger (pdf)
DownloadPort Scanner (pdf)
DownloadCaesar Cipher Encryption (pdf)
DownloadTic Tac Toe Game (pdf)
DownloadThis is a basic PowerShell Input and Output program written by Anthony Constant.
This PowerShell script searches for folders and subfolders based on the user input. The script allows wildcard search and also searches hidden folders. The output is displayed in a grid view.
This script generates a random password based on the specified criteria.
Upper case letters (A-Z)
Lower case letters (a-z)
Numbers (0-9)
Special characters ( ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~ )
This Ansible playbook automates the task of updating package caches on multipleLinux machines within your environment. It ensures that the package cache is refreshed to the latest available versions, thereby aiding in system maintenance and security.
Update All Linux Machines (pdf)
DownloadThis configuration template provides a structured approach to configure a network device with necessary settings. It ensures proper functionality and security measures are in place.
This is a C++ String Manipulation program that encountered some challenges during development, specifically with the "ChangeToLowerCase" function. After running this function, the program would show the original string but did not provide the lowercase value next to it as it should behave.
This is a Conversion program created using the REPL.it platform within the C++ language. After running the code, a menu is presented to the user with various conversion options. The user is required to select an option from the menu to begin conversion.
This is a Banking application project created using the REPL.it platform within the C++ language. An initial account is created upon running the code. Then calls upon the respective functions, to begin manipulating the total amount provided to you.
The agents in this model are HUMANS and ZOMBIES however, humans turn into zombies if they encounter a zombie and get bitten. Zombies are reflex agents that always attack when confronted by a human. Humans are rational agents that make decisions based on their immediate environment and the actions they can take at that moment.
Sierpinski Triangle is a simulation that shows an initial green cell with a nucleus (a small white circle) that in the next generation produces two similar daughter cells, one at its left, the other at its right. The daughter cells repeat this for another 20 or so generations, leading in the end to the structure of a Sierpinski triangle.
This program models and analyzes the growth of a network based on the biological concept of cell growth and structure formation. In this model, a cell with a nucleus reproduces by splitting off daughter cells, which are formed at defined positions (lower left and lower right of the parent cell).
After this, the daughter cells repeat the cycle of separation and positioning. However, daughter cells that end up at the same location experience competition for space and resources and as a result become infertile. The outcome of the process is a tree-shaped "tissue" of green and red patches (respectively reproducing and non-reproducing cells).
Counters is a simple web page that demonstrates animated counters using JavaScript. It features three counters displaying feedback, sales, and followers, with the numbers incrementing smoothly to their respective target values.
This project is a customizable website template designed for creating landing pages to showcase products, services, or information. It features a modern design with various interactive elements to engage visitors.