I hereby claim:
- I am dleybz on github.
- I am dleybz (https://keybase.io/dleybz) on keybase.
- I have a public key whose fingerprint is F5E1 58E2 D4B1 48C0 36F0 6399 1EB2 518A FD0D 9653
To claim this, I am signing this object:
| from scapy.all import * | |
| def arp_display(pkt): | |
| if pkt[ARP].op == 1: #who-has (request) | |
| if pkt[ARP].psrc == '0.0.0.0': # ARP Probe | |
| print "ARP Probe from: " + pkt[ARP].hwsrc | |
| print sniff(prn=arp_display, filter="arp", store=0, count=10) |
| from scapy.all import * | |
| def arp_display(pkt): | |
| if pkt[ARP].op == 1: #who-has (request) | |
| if pkt[ARP].psrc == '0.0.0.0': # ARP Probe | |
| if pkt[ARP].hwsrc == 'RE:PL:AC:E_:TH:IS': #make sure you input your MAC address here! | |
| print "My BigMACs bring all the boys to the yard" | |
| else: | |
| print "My BigMACs weren't big enough" |
| from twilio.rest import TwilioRestClient | |
| # Your can find your AccountSID and AuthToken from http://twilio.com/user/account | |
| account_sid = "YOUSHOULDPUTYOURSIDHERE" #Replace this with your account ID | |
| auth_token = "YOUSHOULDPUTYOURAUTHTOKENHERE" #Replacet his with your Auth Token | |
| client = TwilioRestClient(account_sid, auth_token) | |
| call = client.calls.create(to="+17078675309", #Replace this with the phone number you wish to recieve calls at | |
| from_="+19006492568", #Replace this with the phone number Twilio assigned to you | |
| url="http://twimlets.com/holdmusic?Bucket=com.twilio.music.ambient") |
| [unix_http_server] | |
| file=/tmp/supervisor.sock ; (the path to the socket file) | |
| [inet_http_server] ; inet (TCP) server disabled by default | |
| port=127.0.0.1:9002 ; (ip_address:port specifier, *:port for all iface) | |
| [supervisord] | |
| logfile=/tmp/supervisord.log ; (main log file;default $CWD/supervisord.log) | |
| logfile_maxbytes=50MB ; (max main logfile bytes b4 rotation;default 50MB) | |
| logfile_backups=10 ; (num of main logfile rotation backups;default 10) |
| cd / | |
| cd home/pi/Desktop | |
| sudo supervisord -c supervisord.conf | |
| cd / |
| #Reads in the csv containing emails and metadata, and extracts just the bodies of the emails | |
| setwd("GitHub/MappingHRC") | |
| whole<-read.csv("Emails.csv", stringsAsFactors = F) | |
| long<-subset(whole, subset = nchar(whole$ExtractedBodyText) > 10) | |
| simplified<-data.frame(long$ExtractedBodyText, stringsAsFactors = F) | |
| names(simplified)<-"Body" | |
| #Reads in the csv containing the names of states and their capitals | |
| coun_and_cap<-read.csv("countries.csv", stringsAsFactors = F)[-3] | |
| #from https://raw.githubusercontent.com/icyrockcom/country-capitals/master/data/country-list.csv |
I hereby claim:
To claim this, I am signing this object:
| #These lines will check if you have the necessary packages installed, installs them if they are not already installed, and opens them | |
| list.of.packages <- c("bigrquery", "ggplot2", "methods", "grid", "sysfonts", "showtext") | |
| new.packages <- list.of.packages[!(list.of.packages %in% installed.packages()[,"Package"])] | |
| if(length(new.packages)) install.packages(new.packages) | |
| library(bigrquery) | |
| library(ggplot2) | |
| library(methods) | |
| library(grid) | |
| library(sysfonts) | |
| library(showtext) |
| def encode_fraud(df): | |
| def fraud_binary(x): | |
| if x == 'No': | |
| return 0 | |
| else: | |
| return 1 | |
| # Apply the function to the fraud column | |
| df.loc[:, 'FraudFound'] = df['FraudFound'].apply(fraud_binary) | |
| return df |
| from category_encoders import TargetEncoder | |
| def encode_categorical(df): | |
| te = TargetEncoder() | |
| cols = df.select_dtypes('object').columns | |
| for col in cols: | |
| df.loc[:, col] = te.fit_transform(X=df[col], y=df['FraudFound']) | |
| return df |