Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am olemartinorg on github.
  • I am olemartinorg (https://keybase.io/olemartinorg) on keybase.
  • I have a public key whose fingerprint is 2A14 6445 FECE 9F23 1643 29BD 1560 3F1F DC83 0D88

To claim this, I am signing this object:

@olemartinorg
olemartinorg / heartbleed-alert
Created April 9, 2014 21:44
This a script to find the email addresses to the peple responsible for a HTTPS site that's found to be leaking memory according to the heartbleed bug. It will read the public certificate, find the CN (domain name, usually) and look that up via whois to gather email adresses to contact. Can dump to CSV.
#!/usr/bin/env python2
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)
# The author disclaims copyright to this source code.
# Quick patch for nmap support 08/04/2014 sartan
#found this was very handy to scan my own web ranges to see if they were vulnerable.
# Modification by olemartinorg on 09/04/2014 to collect more information on certifcates and alert
# the people responsible for a site