Instantly share code, notes, and snippets.

#!/usr/bin/env python
from typing import Optional, Type
class Foo(object):
class Bar(Foo):

Here Be Web Proxies

  • X-FCCKV2 - Fortinet antivirus
  • Via - various (includ McAffee Web Gateway)
  • X-Bluecoat-Via
  • X-Cool-Jobs-Contact - meraki
  • X-OSSProxy - marketscore spyware
  • X-Forwarded-For

In response to the Call for Proposals to HTTP/2, PHK published a draft with a number of suggested requirements.

This is a summary of those requirements, indicating those that have been met.

  • 3.3 Avoid header field encodings/transformations in intermediaries
  • 3.3 and 9 Envelope / content header field distinction
  • 3.3 Add session as "flow-label"
  • 3.3 Use prefix coding for length
  • 3.3 Indicate presence of body clearly
  • 4 Support legitimate cryptography
from __future__ import division
from bitarray import bitarray
from hashlib import sha256
from math import log
import struct
def gcs_hash(w, (N,P)):
View gist:498099a46f0b71bcf9c1
Verifying that +mnot is my blockchain ID.
View csp violations
129 times:
96 times:
88 times:
34 times:
View cgmailstats.rb
require 'nokogumbo'
require 'date'
require 'json'
start = - 105
results = {}
index = ''
groups = Nokogiri::HTML5.get(index)
groups ='a.h3').map {|a| a['href'].sub(/^#/, '')}

Keybase proof

I hereby claim:

  • I am mnot on github.
  • I am mnot ( on keybase.
  • I have a public key whose fingerprint is 1F25 A21D 3C2A 7F22 4C25 389F 4A67 D3E9 3BDE FDDE

To claim this, I am signing this object:

#!/usr/bin/env python
from random import choice, sample, randrange
from string import lowercase
iterations = 10000
authorities = [