This document provides guidelines for maintaining high-quality Python code. These rules MUST be followed by all AI coding agents and contributors.
All code you write MUST be fully optimized.
"Fully optimized" includes:
| using namespace System.Net.Sockets | |
| using namespace System.Net.Security | |
| using namespace System.Security.Cryptography.X509Certificates | |
| function ConvertFrom-X509Certificate { | |
| param( | |
| [Parameter(ValueFromPipeline)] | |
| [X509Certificate2]$Certificate | |
| ) |
| Function Get-WinEventTail | |
| { | |
| <# | |
| .SYNOPSIS | |
| A tail cmdlet for Eventlogs | |
| .DESCRIPTION | |
| This function will allow you to tail Windows Event Logs. You specify | |
| a Logname for either the original logs, Application, System and Security or | |
| the new format for the newer logs Microsoft-Windows-PowerShell/Operational | |
| .PARAMETER LogName |
| function New-DomainSignedCertificate { | |
| [CmdletBinding()] | |
| param( | |
| [parameter(Mandatory=$true)] | |
| [string] | |
| $Hostname, | |
| [parameter(Mandatory=$true)] | |
| [string] | |
| $Organization, |
| <# | |
| .Synopsis | |
| Scans a host or network for the MS17-010 vulnerability | |
| .DESCRIPTION | |
| This script will use a custom NMap NSE script to scan a destination host on | |
| port 445 for the MS17-010 vulnerability. If the host is not online or is blocking | |
| SMB, this script will report no vulnerabilities. | |