Skip to content

Instantly share code, notes, and snippets.

View nabla-c0d3's full-sized avatar
🌴

Alban Diquet nabla-c0d3

🌴
View GitHub Profile
import time
from invoke import task, Context
CMD_COMPOSE = "docker-compose -f docker-compose.dev.yml"
CMD_RUN_APP = f"{CMD_COMPOSE} run --rm app"
@task
def build(ctx):
@nabla-c0d3
nabla-c0d3 / delete_old_tweets.py
Created January 19, 2019 23:42
Delete old tweets
import tweepy
from datetime import datetime, timedelta
consumer_key = ''
consumer_secret = ''
access_token = ''
access_secret = ''
auth = tweepy.OAuthHandler(consumer_key, consumer_secret)
auth.set_access_token(access_token, access_secret)
name download_total
AFNetworking 61983241
Fabric 50998892
Crashlytics 49667729
SDWebImage 45471101
Alamofire 42097177
CocoaLumberjack 36071914
Bolts 35294870
FirebaseInstanceID 30277793
FirebaseAnalytics 30254593
@nabla-c0d3
nabla-c0d3 / sslyze-api-1-4-0.py
Last active March 4, 2018 18:58
Migrating to SSLyze 1.4.0
# With SSLyze 1.4.0, the code that performs connectivity testing with a server needs to be slightly changed:
# SSLyze before 1.4.0
try:
server_info = ServerConnectivityInfo(
hostname='smtp.gmail.com',
port=587,
tls_wrapped_protocol=TlsWrappedProtocolEnum.STARTTLS_SMTP
)
server_info.test_connectivity_to_server()
@nabla-c0d3
nabla-c0d3 / client_auth.md
Created February 25, 2018 01:48 — forked from mtigas/gist:952344
Mini tutorial for configuring client-side SSL certificates.

Client-side SSL

For excessively paranoid client authentication.

Using self-signed certificate.

Create a Certificate Authority root (which represents this server)

Organization & Common Name: Some human identifier for this server CA.

openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
@nabla-c0d3
nabla-c0d3 / sslyze_api.py
Created December 18, 2017 04:13
Using SSLyze as a Python module
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import unicode_literals
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult
from sslyze.plugins.utils.certificate_utils import CertificateUtils
from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand
from sslyze.plugins.session_renegotiation_plugin import SessionRenegotiationScanCommand
@nabla-c0d3
nabla-c0d3 / sslyze_robot.py
Last active December 18, 2017 06:01
Scanning for the ROBOT Vulnerability at Scale
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult
from sslyze.plugins.robot_plugin import RobotScanCommand, RobotScanResultEnum
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
SERVERS_TO_SCAN = [
('www.google.com', 443, TlsWrappedProtocolEnum.HTTPS),
('smtp.gmail.com', 587, TlsWrappedProtocolEnum.STARTTLS_SMTP),
('imap.gmail.com', 993, TlsWrappedProtocolEnum.PLAIN_TLS),
set _NT_SYMBOL_PATH=D:\Python36;srv*c:\mycache*https://msdl.microsoft.com/download/symbols
set OANOCACHE=1
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -p:14724 -f:.\umdh1.txt
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -d .\umdh1.txt .\umdh2.txt > .\umd12.txt
from pympler import tracker
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
memory_tracker = tracker.SummaryTracker()
# Setup the server to scan and ensure it is online/reachable
hostname = 'smtp.gmail.com'
for i in range(20):
try:
from pympler import tracker
from nassl.ssl_client import OpenSslVersionEnum, OpenSslVerifyEnum
import socket
from nassl.legacy_ssl_client import LegacySslClient, SslClient
memory_tracker = tracker.SummaryTracker()
for i in range(20):
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)