Skip to content
View Hamiltonius's full-sized avatar

Block or report Hamiltonius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Hamiltonius/README.md

🌍 Data, Compliance, & Cyber Strategy

Bridging the gap between export controls, tech, and global trade -

Global Cyber Network

🛠️ Tinkering, Learning, and Building

Welcome, I’m Hamiltonius, a hobbyist and lifelong tinkerer exploring tech, automation, and security since the mid 90's. While my expertise is in compliance, economics, export controls, and government FAR 15/12 contracting, my foundation is built on hands-on learning—tinkering with everything from data pipelines to network security.

I believe broad knowledge builds better specialists, and I apply this philosophy across my projects. Whether it’s automating compliance workflows, analyzing market restrictions, or testing security tools, I take a practical, hands-on approach —iteration and improvement above all.


📌 Key Areas of Interest

🔹 Compliance & Contracting – U.S. Government acquisition processes, export controls, and regulatory frameworks.
🔹 Data-Driven Research – Python-based economic analysis and policy evaluation.
🔹 Security & Infrastructure – Learning network security, homelab setups, and best practices.
🔹 Automation & Scripting – Tools that save time, reduce errors, and enhance efficiency.


🖥️ Lesson of the Month: Gmail API Authentication & the Power of Scoped Access

Modern automation can begin with a simple question: “I wonder if I can build a pipeline to my email”, at least thats how it was for me!

The Gmail API makes that possible — safely — using OAuth 2.0 and scoped authorization. Instead of sharing passwords or enabling risky IMAP access, OAuth issues a temporary token after you approve the app. That token grants only what’s requested (e.g., “read-only” access to Gmail). This scoped design keeps credentials safe while allowing automation to handle high-volume inbox tasks — like retrieving attachments, filing messages, or building structured data pipelines.

🔐 Takeaway: OAuth turns authentication from an all-or-nothing model into a precision tool — empowering secure automation without compromising privacy or control.

💼 LinkedIn
📜 Open to discussions on compliance, automation, and cybersecurity

Pinned Loading

  1. Regulus Regulus Public

    Automated export control tracker for BIS policy changes and rule updates. Built for compliance and trade professionals.

    Python 2

  2. Contract-Communication-Macro Contract-Communication-Macro Public

    VBA Macro for SAP Export Formatting

    VBA 2

  3. PDF-Contract-Parser PDF-Contract-Parser Public

    Automates contract data extraction from PDFs to Excel, reducing manual entry and improving accuracy. This tool captures key details like Contract IDs, Period of Performance, and other essential des…

    Python 2 1

  4. compliance_app compliance_app Public

    A Flask-based web app that screens PDF documents for compliance terms from GDPR, NIST, and FAR frameworks, with a user-friendly interface for viewing and highlighting flagged terms.

    Python 1

  5. AR-Forecast AR-Forecast Public

    Simulated ML toolkit using scikit-learn to explore overdue accounts in defense contracting. Processes synthetic AR data for regression, classification, and pattern analysis. Part of the Regulus fin…

    Python