Skip to content

Instantly share code, notes, and snippets.

View spenserpothier's full-sized avatar
🍔

Spenser Pothier spenserpothier

🍔
View GitHub Profile
@spenserpothier
spenserpothier / gist:2e95ff5186a5ff53ad62
Last active August 16, 2017 20:26
some python snippet for finding instance ids in events
instances = [x['resourceId'] for x in event['requestParameters']['resourcesSet']['items']
if re.search('i-([0-9]|[a-f]){8}', x['resourceId'])]
@spenserpothier
spenserpothier / style.css
Last active August 16, 2017 20:27
CSS Snippet for vertical centered element
.element {
position: relative;
top: 50%;
transform: translateY(-50%);
}
@spenserpothier
spenserpothier / keybase.md
Last active August 16, 2017 20:27
Keybase proof

Keybase proof

I hereby claim:

  • I am spenserpothier on github.
  • I am spenserpothier (https://keybase.io/spenserpothier) on keybase.
  • I have a public key whose fingerprint is 59A2 A73E FFCF 5306 C7F9 D0DD 7B30 C2DB 40F3 CFCD

To claim this, I am signing this object:

@spenserpothier
spenserpothier / find_iam_user.py
Last active August 16, 2017 20:28 — forked from OnlyInAmerica/find_iam_user.py
Find the IAM username belonging to the TARGET_ACCESS_KEY
#!/usr/bin/env python
# Find the IAM username belonging to the TARGET_ACCESS_KEY
# Useful for finding IAM user corresponding to a compromised AWS credential
# Usage:
# find_iam_user AWS_ACCESS_KEY_ID
# Requirements:
#
# Environmental variables:
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
# python: