For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
import time | |
from invoke import task, Context | |
CMD_COMPOSE = "docker-compose -f docker-compose.dev.yml" | |
CMD_RUN_APP = f"{CMD_COMPOSE} run --rm app" | |
@task | |
def build(ctx): |
import tweepy | |
from datetime import datetime, timedelta | |
consumer_key = '' | |
consumer_secret = '' | |
access_token = '' | |
access_secret = '' | |
auth = tweepy.OAuthHandler(consumer_key, consumer_secret) | |
auth.set_access_token(access_token, access_secret) |
name | download_total | |
---|---|---|
AFNetworking | 61983241 | |
Fabric | 50998892 | |
Crashlytics | 49667729 | |
SDWebImage | 45471101 | |
Alamofire | 42097177 | |
CocoaLumberjack | 36071914 | |
Bolts | 35294870 | |
FirebaseInstanceID | 30277793 | |
FirebaseAnalytics | 30254593 |
# With SSLyze 1.4.0, the code that performs connectivity testing with a server needs to be slightly changed: | |
# SSLyze before 1.4.0 | |
try: | |
server_info = ServerConnectivityInfo( | |
hostname='smtp.gmail.com', | |
port=587, | |
tls_wrapped_protocol=TlsWrappedProtocolEnum.STARTTLS_SMTP | |
) | |
server_info.test_connectivity_to_server() |
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
from __future__ import absolute_import | |
from __future__ import unicode_literals | |
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult | |
from sslyze.plugins.utils.certificate_utils import CertificateUtils | |
from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand | |
from sslyze.plugins.session_renegotiation_plugin import SessionRenegotiationScanCommand |
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult | |
from sslyze.plugins.robot_plugin import RobotScanCommand, RobotScanResultEnum | |
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError | |
from sslyze.ssl_settings import TlsWrappedProtocolEnum | |
SERVERS_TO_SCAN = [ | |
('www.google.com', 443, TlsWrappedProtocolEnum.HTTPS), | |
('smtp.gmail.com', 587, TlsWrappedProtocolEnum.STARTTLS_SMTP), | |
('imap.gmail.com', 993, TlsWrappedProtocolEnum.PLAIN_TLS), |
set _NT_SYMBOL_PATH=D:\Python36;srv*c:\mycache*https://msdl.microsoft.com/download/symbols | |
set OANOCACHE=1 | |
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -p:14724 -f:.\umdh1.txt | |
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -d .\umdh1.txt .\umdh2.txt > .\umd12.txt |
from pympler import tracker | |
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError | |
from sslyze.ssl_settings import TlsWrappedProtocolEnum | |
memory_tracker = tracker.SummaryTracker() | |
# Setup the server to scan and ensure it is online/reachable | |
hostname = 'smtp.gmail.com' | |
for i in range(20): | |
try: |
from pympler import tracker | |
from nassl.ssl_client import OpenSslVersionEnum, OpenSslVerifyEnum | |
import socket | |
from nassl.legacy_ssl_client import LegacySslClient, SslClient | |
memory_tracker = tracker.SummaryTracker() | |
for i in range(20): | |
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |