Skip to content

Instantly share code, notes, and snippets.

View knoxilla's full-sized avatar
🤔
Well That's Fun!

Thomas Knox knoxilla

🤔
Well That's Fun!
View GitHub Profile
@TomRyan-321
TomRyan-321 / security-group-cleanup.py
Last active October 29, 2024 02:54 — forked from lingmann/security-group-cleanup.py
Security Group Cleanup using boto3 with RDS check fixed
#!/usr/bin/env python
import boto3
import argparse
def lookup_by_id(sgid):
sg = ec2.get_all_security_groups(group_ids=sgid)
return sg[0].name
@erichelgeson
erichelgeson / Grails 3.3.3 Upgrade Notes.md
Last active June 6, 2018 21:33
Grails 3.3.x Upgrade Notes

3.3.3 - Current

  • 3.3.0- 07/26/2017
  • 3.3.0.RC1 - Current release 06/26/2017
  • 3.3.0.M2 - Current release 05/30/2017
  • 3.3.0.M1 - Released 05/09/2017

Please fork or leave a comment on this gist to add any other issues or notes you've encountered when upgrading to 3.3.

Documentation

# courtesy of http://stackoverflow.com/questions/4006324/how-to-atomically-delete-keys-matching-a-pattern-using-redis
EVAL "for _,k in ipairs(redis.call('keys', 'seq*')) do redis.call('del', k) end" 0
@ryu1kn
ryu1kn / Makefile
Last active March 19, 2023 13:02
Encrypt/decrypt with AWS KMS using AWS cli
# How to encrypt/decrypt your text/blob secret with AWS KMS with AWS cli
KEY_ID=alias/my-key
SECRET_BLOB_PATH=fileb://my-secret-blob
SECRET_TEXT="my secret text"
ENCRYPTED_SECRET_AS_BLOB=encrypted_secret_blob
DECRYPTED_SECRET_AS_BLOB=decrypted_secret_blob # Result of decrypt-blob target
encrypt-text:
@BretFisher
BretFisher / docker-for-mac.md
Last active June 23, 2025 11:39
Getting a Shell in the Docker Desktop Mac VM

2021 Update: Easiest option is Justin's repo and image

Just run this from your Mac terminal and it'll drop you in a container with full permissions on the Docker VM. This also works for Docker for Windows for getting in Moby Linux VM (doesn't work for Windows Containers).

docker run -it --rm --privileged --pid=host justincormack/nsenter1

more info: https://github.com/justincormack/nsenter1


snippet gg
ggplot(${1:data}, aes(${2:aes})) +
geom_${3:geom}()
snippet shiny
library(shiny)
ui <- fluidPage(
${1:ui}
)
@RichardBronosky
RichardBronosky / README.MD
Last active July 29, 2025 14:50
cb - A leak-proof tee to the clipboard - Unify the copy and paste commands into one intelligent chainable command.

cb

A leak-proof tee to the clipboard

This script is modeled after tee (see [man tee][2]) and works on Linux, macOS, Cygwin, WSL/WSL2

It's like your normal copy and paste commands, but unified and able to sense when you want it to be chainable.

This project started as an answer to the StackOverflow question: [How can I copy the output of a command directly into my clipboard?][3]

@nmarley
nmarley / dec.py
Last active March 6, 2025 11:56
AWS KMS encryption/decryption using Python/Boto3
import boto3
import base64
if __name__ == '__main__':
session = boto3.session.Session()
kms = session.client('kms')
encrypted_password = 'AQECAHjgTiiE7TYRGp5Irf8jQ3HzlaQaHGYgsUJDaavnHcFm0gAAAGswaQYJKoZIhvcNAQcGoFwwWgIBADBVBgkqhkiG9w0BBwEwHgYJYIZIAWUDBAEuMBEEDDwxVQuG0oVwpkU7nQIBEIAoVGk1/wpserb+GVUOzE7PiL/Nr9fTDFKZfpKpF0ip2ct4B2q0Wn6ZZw=='
binary_data = base64.b64decode(encrypted_password)
@rondomondo
rondomondo / check_jwt_sig.py
Last active February 21, 2024 14:55
Two methods/examples of how to decode and verify the signature of AWS cognito JWT web tokens externally. This uses RSA key pair and alternatively PKCS1_v1_5. See https://gist.github.com/rondomondo/efff911f2c41c295e23415e94e12b8d3 for example of signing and verification by downloading an ISSUERS PKI SSL certificate from the signers website, and h…
#!/usr/bin/env python
import os
import time
import json
import base64
import requests
import argparse
from base64 import urlsafe_b64decode, b64decode
from Crypto.Hash import SHA256, SHA512
#!/bin/sh
# Install the Lambda Linux EPLL repository on Amazon Linux
# See https://lambda-linux.io/#getting-started
# Download package signing public key using HTTPS
curl -X GET -o RPM-GPG-KEY-lambda-epll https://lambda-linux.io/RPM-GPG-KEY-lambda-epll
# Import package signing public key
sudo rpm --import RPM-GPG-KEY-lambda-epll
# Download EPLL Release (signed) RPM package using HTTPS