Skip to content

Instantly share code, notes, and snippets.

View adulau's full-sized avatar
Doing stuff

Alexandre Dulaunoy adulau

Doing stuff
View GitHub Profile
adulau /
Last active July 23, 2024 22:28
HTTP/2 Rapid Reset DDoS Attack


This Gist aims to centralise the most relevant public sources of information related to the HTTP/2 Rapid Reset vulnerability. This vulnerability has been disclosed jointly by Google, Amazon AWS, and Cloudflare on 10 October 2023 at 12:00 UTC.

Please help us make this page as comprehensive as possible by contributing relevant references, vendor advisories and statements, mitigations, etc.


adulau / typosquatting.json
Created July 11, 2023 07:43
"addDynamicDns": [
"": {
"A": [
"MX": [
adulau /
Last active April 20, 2023 15:05 — forked from botlabsDev/
Microsoft threat actory taxonomy to misp format converter
import uuid
from pprint import pprint
import json
import requests
adulau /
Last active January 27, 2023 08:37

BTS - MISP and Threat Intelligence Introduction

From 9:30 to 12:00 CET (a small break is foreseen)

Short url:


  • MISP Introduction and history
  • MISP data model
adulau /
Created January 1, 2023 10:34
Time to query the API v2.0 of NVD NIST

Getting CPEs

adulau@maurer:~$ curl -w "@curl-format.txt" -o /dev/null -s ""
     time_namelookup:  0,120529s
        time_connect:  0,225630s
     time_appconnect:  0,386989s
    time_pretransfer:  0,387033s
       time_redirect:  0,000000s
 time_starttransfer: 5,810461s

Keybase proof

I hereby claim:

  • I am adulau on github.
  • I am adulau ( on keybase.
  • I have a public key whose fingerprint is 6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5

To claim this, I am signing this object:

"identity": "recursive-5003",
"qname": "",
"rrtype": "A",
"query-ip": "",
"query-port": 34882,
"response-ip": "",
"response-port": 5003,
"latency": 0.027,
"message": "CLIENT_RESPONSE",
adulau /
Created June 25, 2022 13:33
Notes for commoncrawl
adulau /
Created May 27, 2022 07:59
How to remove keys from Hockeypuck OpenPGP key server

How to remove keys from Hockeypuck OpenPGP key server

  • First find the Hockeypuck hash of the key(s) to be removed via the web search of your key server instance;
  • On the index, copy the hash value (Hash=HASHVALUE) (it's the hex representation of MD5);
  • Connect to the PostgreSQL interface of your Hockeypuck server;
    • psql hkp
    • Find the corresponding keys from their hash value;
    • select rfingerprint from keys where md5 in ('HASHVALUE');
    • This will return the corresponding fingerprints;
  • Then delete the associated sub-keys;