I hereby claim:
- I am Riebart on github.
- I am riebart (https://keybase.io/riebart) on keybase.
- I have a public key whose fingerprint is 277C D4E5 2742 A486 CAB0 C857 98B6 9479 9B76 0FBE
To claim this, I am signing this object:
function pb_notify { | |
start=`date +%s%N` | |
"$@" | |
end=`date +%s%N` | |
start_ms=`echo $start | head -c 13` | |
end_ms=`echo $end | head -c 13` | |
dt_ms=$[(end_ms-start_ms)] | |
if which bc >/dev/null 2>&1 | |
then | |
dt=`echo "scale=3;$dt_ms/1000.0" | bc` |
#!/usr/bin/env python | |
""" | |
Given a list of IP addresses (or IP address ranges), one per line (with ranges given as "IP1-IP2"), | |
return a list of IP address ranges that represent the smallest possible list of IP address ranges | |
that does not contain any addresses not represented in the input list. | |
Only supports IPv4. | |
""" | |
import sys |
I hereby claim:
To claim this, I am signing this object:
from random import random | |
def accumulate(iterator): | |
total = 0 | |
for item in iterator: | |
total += item | |
yield total | |
# Generate a list of a bunch of values with random offsets so we can bucket them. | |
# Only step at most 10ms per 'packet', because we want a representative sample size. |
Windows Registry Editor Version 5.00 | |
[HKEY_CURRENT_USER\Software\Classes\*\shell] | |
[HKEY_CURRENT_USER\Software\Classes\*\shell\VSCode] | |
@="Open with Code" | |
"Icon"=hex(2):43,00,3a,00,5c,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,20,\ | |
00,46,00,69,00,6c,00,65,00,73,00,5c,00,4d,00,69,00,63,00,72,00,6f,00,73,00,\ | |
6f,00,66,00,74,00,20,00,56,00,53,00,20,00,43,00,6f,00,64,00,65,00,5c,00,43,\ | |
00,6f,00,64,00,65,00,2e,00,65,00,78,00,65,00,00,00 |
#!/bin/bash | |
# Install the SSM agent: | |
# Ref: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-startup-linux.html | |
cd /tmp | |
sudo yum install -y https://s3.amazonaws.com/ec2-downloads-windows/SSMAgent/latest/linux_amd64/amazon-ssm-agent.rpm | |
sudo start amazon-ssm-agent | |
echo ECS_CLUSTER="ECS_CLUSTER_NAME" >> /etc/ecs/ecs.config | |
export PATH=/usr/local/bin:$PATH |
from __future__ import print_function | |
from scapy.all import * | |
domain_name = "nhlscore.riebart.ca" | |
dns_server_ip = '172.31.15.145' | |
bpf_filter = 'dst port 53 and ip dst {0}'.format(dns_server_ip) | |
def dns_respond(pkt, rcode=0): | |
if (DNS in pkt and pkt[DNS].opcode == 0 and pkt[DNS].ancount == 0): | |
print('Responding to query for "%s" from "%s"' % (pkt[DNSQR].qname, pkt[IP].src)) |
#!/bin/bash | |
influxId=$(docker run --rm -d -p 8086:8086 -p 2003:2003 -e INFLUXDB_GRAPHITE_ENABLED=true influxdb) | |
grafanaId=$(docker run --rm -d -p 3000:3000 grafana/grafana) | |
echo "Sleeping while the containers spool up..." >&2 | |
sleep 10 | |
influxIp=$(docker inspect --format='{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' ${influxId}) |
# Generate a new certificate with key, marked exportable (the default), suitable for code signing. | |
# The certificate is stored in the personal certificate store. | |
New-SelfSignedCertificate -Subject "CN={YOUR NAME}" -KeySpec "Signature" -KeyUsage "DigitalSignature" -KeyUsageProperty "Sign" -Friendlyname "Code Signing" -NotAfter $([datetime]::now.AddYears(5)) -Type "CodeSigningCert" -CertStoreLocation cert:\currentuser\my -KeyAlgorithm RSA -Keylength 4096 -HashAlgorithm "SHA256" -Provider "Microsoft Enhanced RSA and AES Cryptographic Provider" | |
# To Sign a Powershell script with a certificate | |
# - Find the key, which you can usually do with the thumbprint and knowing where it was stored | |
# - This may or may not work for you, depending on whether or not you have access to a functioning timestamp server | |
# - Regardless of the timestamp, the signature will still work, just won't say when it was signed. | |
$cert = (ls cert:currentuser\my\0BD717BC985949E736067A15CC7502A1EAE6D031) |
#!/usr/bin/env python3 | |
""" | |
Provides a simple Python wrapper for invoking an API Gateway endpoint using IAM signed requests. | |
Example: | |
python3 apigateway-invoke.py GET \ | |
https://xxxxxxxxxx.execute-api.us-east-1.amazonaws.com/default/MethodName | jq . | |
""" | |
try: |