Skip to content

Instantly share code, notes, and snippets.

Avatar
🔮
coding

Logan McDonald loganmeetsworld

🔮
coding
View GitHub Profile
@loganmeetsworld
loganmeetsworld / ids.txt
Last active Dec 4, 2019
All docket ids for NYSCEF filings of Child Victims Act claims through 11/16/2019
View ids.txt
_PLUS_13IDMlcGk0VYyy8HcftzQ
_PLUS_1bdCm9wn9_PLUS_tzOVn9N_PLUS_Z1A
_PLUS_55QImciPavNeXuqE0sHbw
_PLUS_5YCk4FAlQ3Bxgxk3UOvLg
_PLUS_HxpTwyTmj/zm0SolE0xpw
_PLUS_Lwa1kWOR4QobHYM0x4IqQ
_PLUS_M6VKLdn5ZRBG3K7T00kXA
_PLUS_NzsHIWD8JVgF0Ca7Zg2hw
_PLUS_qZx_PLUS_HnCTwU26OCFZMUluw
_PLUS_rDdP98vRuk/X0FBI8Iy6g
View lead-dev.md
@loganmeetsworld
loganmeetsworld / lm_srecon19_resources.md
Last active Nov 5, 2019
"Optimizing for Learning" talk resources from SRECon Americas 2019 (Brooklyn)
View lm_srecon19_resources.md

"Optimizing for Learning" Sources

Given at SRECon Americas 2019 (Brooklyn) by Logan McDonald

Resources from my research are presented in the order they are given in the talk. Here are my slides and all the art is by the amazing Emily Griffin. The resources are broken into the four sections of the talk:

Preparation

View revoke_sg_rules_lambda.py
security_groups = ec2.describe_security_groups()
bastion_dynamic_security_group = next(d for d in security_groups['SecurityGroups'] if d['GroupName'].endswith(CLUSTER + "-bastion-dynamic"))
# Revoke any ip ranges that contain a description with a time limit that exceeds the limit we set
ip_ranges_to_revoke = get_ip_ranges_to_revoke(bastion_dynamic_security_group, time_limit=6)
if ip_ranges_to_revoke:
ip_permissions_to_revoke = bastion_dynamic_security_group['IpPermissions']
ip_permissions_to_revoke[0]['IpRanges'] = ip_ranges_to_revoke
ec2.revoke_security_group_ingress(GroupId=bastion_dynamic_security_group['GroupId'], IpPermissions=ip_permissions_to_revoke)
View authorize_sg_rule.py
# Find bastion address using cluster instances returned from the AWS API and given cluster
bastion_instance = aws.describe_ecs_cluster_bastion_instances(session, cluster)
bastion_address = getBastionInstanceIp(bastion_instance)
# Find the user’s IP address
user_ip = requests.get(‘https://checkip.amazonaws.com/', timeout=0.1).text.rstrip()
# Use a break glass conditional for skipping the authorization
# Otherwise authorize a new rule using the user’s IP
# The description of the rule will be made with the user’s IP and the timestamp
View keybase.md

Keybase proof

I hereby claim:

  • I am loganmeetsworld on github.
  • I am loganmcdonald (https://keybase.io/loganmcdonald) on keybase.
  • I have a public key whose fingerprint is E008 B82E 3F6A 8EEA 3370 046D D70E FF8A B3EA 4435

To claim this, I am signing this object:

View nfl_crime_stats.rb
require 'httparty'
require 'json'
require 'pry'
require 'colorize'
module NFL
class Arrests
def initialize(search, crime)
@crime = crime
@search = search
View dabblet.css
/**
* Flamingo Sample
*/
@import url('https://fonts.googleapis.com/css?family=Lato|Tangerine|Inconsolata|Droid+Sans');
body {
font-family: sans-serif;
font-size: 14px;
padding: 50px;
background: #333;
You can’t perform that action at this time.