Skip to content

Instantly share code, notes, and snippets.

David Cook divergentdave

  • Minneapolis, MN
Block or report user

Report or block divergentdave

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@divergentdave
divergentdave / chain.pem
Last active Oct 2, 2015
SBA TLS cert chain issues
View chain.pem
# s:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
# i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5
-----BEGIN CERTIFICATE-----
MIIFODCCBCCgAwIBAgIQUT+5dDhwtzRAQY0wkwaZ/zANBgkqhkiG9w0BAQsFADCB
yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL
ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJp
U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxW
ZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0
aG9yaXR5IC0gRzUwHhcNMTMxMDMxMDAwMDAwWhcNMjMxMDMwMjM1OTU5WjB+MQsw
CQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNV
@divergentdave
divergentdave / test_harness.js
Last active Nov 12, 2015
eCFR test harness for citation
View test_harness.js
#!/usr/bin/env node
var Citation = require('../citation');
var fs = require('fs');
var sax = require('sax');
var unzip = require('unzip2');
function parserFactory() {
var stream = sax.createStream(true, {trim: true});
var in_contents = 0;
@divergentdave
divergentdave / keybase.md
Created Nov 18, 2015
Keybase identity proof
View keybase.md

Keybase proof

I hereby claim:

  • I am divergentdave on github.
  • I am divergentdave (https://keybase.io/divergentdave) on keybase.
  • I have a public key whose fingerprint is 21A6 9BBD 910B 21BA 6FCF AE60 116D 73A7 81CA 2E51

To claim this, I am signing this object:

@divergentdave
divergentdave / .gitignore
Last active Apr 24, 2016
Export from Free File Fillable Forms to 1040.js
View .gitignore
# It would be a bad idea to share HAR or JSON files containing your documents
*.har
*.json
@divergentdave
divergentdave / .gitignore
Last active Jun 14, 2016
GitHub Pages List
View .gitignore
/node_modules
/token.txt
@divergentdave
divergentdave / arctest.py
Last active Sep 9, 2016
ARC TLS cipher suite list test
View arctest.py
#!/usr/bin/env python3
import socket
import ssl
original = 'ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-RSA-AES-256-CBC-SHA:SRP-AES-256-CBC-SHA:DH-DSS-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DH-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA256:DH-RSA-AES256-SHA256:DH-DSS-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DH-RSA-AES256-SHA:DH-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:DH-RSA-CAMELLIA256-SHA:DH-DSS-CAMELLIA256-SHA:ECDH-RSA-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-RSA-AES256-SHA384:ECDH-ECDSA-AES256-SHA384:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:SRP-DSS-AE
View ig_charsets.sh
#!/bin/sh
set -e
jq -r '.[] | .homepage_url | select(. != null)' ~/oversight.garden/config/inspectors.json | while IFS= read -r line
do
echo $line
curl -ikL $line | (grep -i charset= || true)
echo
done
@divergentdave
divergentdave / verify_self_signed_key.py
Created Mar 19, 2018
Verify a self signed certificate's signature
View verify_self_signed_key.py
#!/usr/bin/env python3
"""
This script verifies whether a given X.509 certificate is self-signed, while
ignorng the subject and issuer distinguished names. Python 3 is required,
along with recent versions of pyasn1 and pyasn1-modules. To check a
certificate, run this script with the file name of that certificate as a
command line argument. Certificates can be in PEM or DER format. Only RSA
signatures are supported.
To verify whether a certificate is self-signed, this script parses the
@divergentdave
divergentdave / poker.py
Last active Jun 23, 2018
Solving logic puzzles with Z3
View poker.py
#!/usr/bin/env python3
from z3 import (
Solver,
Function,
EnumSort,
IntSort,
Const,
Distinct,
And,
Or,
View Deduplicated Cisco Umbrella 1 Million.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
You can’t perform that action at this time.