Skip to content

Instantly share code, notes, and snippets.

View nabla-c0d3's full-sized avatar
🌴

Alban Diquet nabla-c0d3

🌴
View GitHub Profile
@nabla-c0d3
nabla-c0d3 / sslyze_api.py
Created December 18, 2017 04:13
Using SSLyze as a Python module
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import unicode_literals
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult
from sslyze.plugins.utils.certificate_utils import CertificateUtils
from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand
from sslyze.plugins.session_renegotiation_plugin import SessionRenegotiationScanCommand
@nabla-c0d3
nabla-c0d3 / gist:f952c6fcc1e9d359dbfe
Last active December 22, 2022 12:47
Hooking a variadic function with Cydia Substrate
//
// LibC.m
//
// Created by Alban Diquet on 5/14/14.
// Copyright (c) 2014 Alban Diquet. All rights reserved.
//
#import <CydiaSubstrate.h>
#import "LibC.h"
import time
from invoke import task, Context
CMD_COMPOSE = "docker-compose -f docker-compose.dev.yml"
CMD_RUN_APP = f"{CMD_COMPOSE} run --rm app"
@task
def build(ctx):
@nabla-c0d3
nabla-c0d3 / client_auth.md
Created February 25, 2018 01:48 — forked from mtigas/gist:952344
Mini tutorial for configuring client-side SSL certificates.

Client-side SSL

For excessively paranoid client authentication.

Using self-signed certificate.

Create a Certificate Authority root (which represents this server)

Organization & Common Name: Some human identifier for this server CA.

openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
name download_total
AFNetworking 61983241
Fabric 50998892
Crashlytics 49667729
SDWebImage 45471101
Alamofire 42097177
CocoaLumberjack 36071914
Bolts 35294870
FirebaseInstanceID 30277793
FirebaseAnalytics 30254593
@nabla-c0d3
nabla-c0d3 / gist:715cdfe2ffb9d13726eb
Created March 2, 2015 06:00
MitM Script for XMPP StartTLS Stripping
#!/usr/bin/env python
import sys, socket, thread, ssl
from select import select
HOST = '0.0.0.0'
PORT = 5222
BUFSIZE = 4096
# Change this with the first two bytes of the SSL client hello
@nabla-c0d3
nabla-c0d3 / delete_old_tweets.py
Created January 19, 2019 23:42
Delete old tweets
import tweepy
from datetime import datetime, timedelta
consumer_key = ''
consumer_secret = ''
access_token = ''
access_secret = ''
auth = tweepy.OAuthHandler(consumer_key, consumer_secret)
auth.set_access_token(access_token, access_secret)
@nabla-c0d3
nabla-c0d3 / sslyze-api-1-4-0.py
Last active March 4, 2018 18:58
Migrating to SSLyze 1.4.0
# With SSLyze 1.4.0, the code that performs connectivity testing with a server needs to be slightly changed:
# SSLyze before 1.4.0
try:
server_info = ServerConnectivityInfo(
hostname='smtp.gmail.com',
port=587,
tls_wrapped_protocol=TlsWrappedProtocolEnum.STARTTLS_SMTP
)
server_info.test_connectivity_to_server()
@nabla-c0d3
nabla-c0d3 / sslyze_robot.py
Last active December 18, 2017 06:01
Scanning for the ROBOT Vulnerability at Scale
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult
from sslyze.plugins.robot_plugin import RobotScanCommand, RobotScanResultEnum
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
SERVERS_TO_SCAN = [
('www.google.com', 443, TlsWrappedProtocolEnum.HTTPS),
('smtp.gmail.com', 587, TlsWrappedProtocolEnum.STARTTLS_SMTP),
('imap.gmail.com', 993, TlsWrappedProtocolEnum.PLAIN_TLS),
set _NT_SYMBOL_PATH=D:\Python36;srv*c:\mycache*https://msdl.microsoft.com/download/symbols
set OANOCACHE=1
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -p:14724 -f:.\umdh1.txt
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -d .\umdh1.txt .\umdh2.txt > .\umd12.txt