I hereby claim:
- I am cmlh on github.
- I am cmlh (https://keybase.io/cmlh) on keybase.
- I have a public key ASD3-AnjLVyot_YkKOeGyGo5a-0RK25nSX6NWfm-8hsIEwo
To claim this, I am signing this object:
https://endoflife.date/python |
https://cbea.ms/git-commit/ | |
https://github.com/spring-projects/spring-framework/blob/30bce7/CONTRIBUTING.md#format-commit-messages | |
https://github.com/erlang/otp/wiki/writing-good-commit-messages | |
https://who-t.blogspot.com/2009/12/on-commit-messages.html | |
https://github.com/torvalds/subsurface-for-dirk/blob/master/README.md#contributing | |
https://git-scm.com/book/en/v2/Distributed-Git-Contributing-to-a-Project#_commit_guidelines | |
https://www.conventionalcommits.org/ | |
https://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html |
I hereby claim:
To claim this, I am signing this object:
https://edoverflow.com/2022/swiss-security-txt/ |
#!/usr/bin/python3 | |
""" | |
Usage: ip2cidr.py input_file | |
""" | |
import sys, re, netaddr | |
def sanitize (ip): | |
seg = ip.split('.') |
Qualification | CISM | CISSP | GSLC |
---|---|---|---|
IRAP (Category A) | X | X | X |
PCI QSA (List A) | X | X | X |
Qualification | CISA | GSNA | ISO Lead 27001 Auditor |
---|---|---|---|
IRAP (Category B) | X | X | X |
PCI QSA (List B) | X | X | X |
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H https://nvd.nist.gov/vuln/detail/CVE-2018-0296 | |
AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd | |
Diff is Scope CVSSv3 Base Vector | |
CVSSv3 Base Score calculated higher by vendor (Cisco) at 8.6 than independent authority (NIST) at 7.5 | |
Both CVSSv3 Base Scores are within the HIGH range (7.0-8.9) |
Penetration Tester Name/Organization | |
Report Question|Yes/No|Page | |
------------------|--------|---- | |
Contact information|Y|1 | |
Credentials/qualifications of analysts|N|1 | |
Is there sufficient evidence that the individuals are organizationally independent from the management of the environment being tested?|Y|1 | |
Dates the engagement was performed|N|1 | |
Date the report was issued|Y|1 |
#!/usr/env/python | |
# -*- coding: utf-8 -*- | |
# Hack to allow us to load icon images in Maltego by following | |
# the redirect and serving up the actual image. | |
from flask import Flask, send_file | |
import requests | |
app = Flask(__name__) | |
@app.route('/fb/pic/<id>') |
These https://httpie.org/ commands are applicable to both [Public and Private] API of VirusTotal. However, only the &allinfo=1 parameter is applicable to the VirusTotal Private API v2. | |
File Report | |
http "https://www.virustotal.com/vtapi/v2/file/report?apikey=-YOUR API KEY HERE-&resource=7657fcb7d772448a6d8504e4b20168b8" | |
URL Report | |
http POST "https://www.virustotal.com/vtapi/v2/url/report?apikey=-YOUR API KEY HERE-&resource=http://www.virustotal.com?scan=1&allinfo=1" | |
IP Address Report | |
http "https://www.virustotal.com/vtapi/v2/ip-address/report?apikey=-YOUR API KEY HERE-&ip=90.156.201.27" |