Skip to content

Instantly share code, notes, and snippets.

View adulau's full-sized avatar
👨‍💻
Doing stuff

Alexandre Dulaunoy adulau

👨‍💻
Doing stuff
View GitHub Profile
@adulau
adulau / time-to-query-api-nvd.md
Created January 1, 2023 10:34
Time to query the API v2.0 of NVD NIST

Getting CPEs

adulau@maurer:~$ curl -w "@curl-format.txt" -o /dev/null -s "https://services.nvd.nist.gov/rest/json/cpes/2.0/?resultsPerPage=20&startIndex=0"
     time_namelookup:  0,120529s
        time_connect:  0,225630s
     time_appconnect:  0,386989s
    time_pretransfer:  0,387033s
       time_redirect:  0,000000s
 time_starttransfer: 5,810461s
\documentclass[a4paper]{article}
\pagestyle{plain}
\usepackage{calc}
\usepackage[top=0.25in,bottom=0.75in,left=0.5in,right=0.5in]{geometry}
\usepackage{tikz}
\newlength{\wholeboxwd}
\setlength{\wholeboxwd}{0.99\textwidth}
\newlength{\wholeboxht}
\setlength{\wholeboxht}{0.95\textheight}

Keybase proof

I hereby claim:

  • I am adulau on github.
  • I am adulau (https://keybase.io/adulau) on keybase.
  • I have a public key whose fingerprint is 6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5

To claim this, I am signing this object:

{
"identity": "recursive-5003",
"qname": "www.aboil.info.",
"rrtype": "A",
"query-ip": "127.0.0.1",
"query-port": 34882,
"response-ip": "127.0.0.1",
"response-port": 5003,
"latency": 0.027,
"message": "CLIENT_RESPONSE",
@adulau
adulau / commoncrawl.md
Created June 25, 2022 13:33
Notes for commoncrawl
@adulau
adulau / hockeypuck-key-removed.md
Created May 27, 2022 07:59
How to remove keys from Hockeypuck OpenPGP key server

How to remove keys from Hockeypuck OpenPGP key server

  • First find the Hockeypuck hash of the key(s) to be removed via the web search of your key server instance;
  • On the index, copy the hash value (Hash=HASHVALUE) (it's the hex representation of MD5);
  • Connect to the PostgreSQL interface of your Hockeypuck server;
    • psql hkp
    • Find the corresponding keys from their hash value;
    • select rfingerprint from keys where md5 in ('HASHVALUE');
    • This will return the corresponding fingerprints;
  • Then delete the associated sub-keys;
@adulau
adulau / trackers.txt
Created February 20, 2022 15:42
Know trackers
http://95.107.48.115:80/announce
http://agusiq-torrents.pl:6969/announce
http://asnet.pw:2710/announce
http://fxtt.ru:80/announce
http://grifon.info:80/announce
http://mgtracker.org:2710/announce
http://mgtracker.org:6969/announce
http://ns349743.ip-91-121-106.eu:80/announce
http://open.acgnxtracker.com:80/announce
http://pt.lax.mx:80/announce
@adulau
adulau / tor2web-list.md
Last active April 29, 2026 18:21
Tor2web and tor proxies public list

Tor2web and tor proxies public list

List of services which are giving access to Tor network and especially Tor hidden services via web interface. We keep track of potential injection or abuse from such service (the column Scam).

List

Url Status Domain Log Techno Scam
https://onion.re/ DOWN onion.re full custom no
@adulau
adulau / summary.md
Created January 2, 2022 11:22
hashlookup-forensic-analyser - Sample summary report

Hashlookup logo

Overall statistics

Analysed directory /usr/lib/modules/5.11.0-41-generic/ on maurer running Linux-5.11.0-43-generic-x86_64-with-glibc2.29 at 2022-01-02 11:20:10.596458+00:00.

Run with hashlookup-forensic-analysed version 0.8.

Hashlookup type Numbers

title: "Hashlookup service - how to improve your digital forensic investigations" author: "Alexandre Dulaunoy" institute: "CIRCL" theme: "Frankfurt" colortheme: "beaver" fonttheme: "professionalfonts" mainfont: "Hack Nerd Font" fontsize: 10pt urlcolor: red