Skip to content

Instantly share code, notes, and snippets.

from scapy.all import *
def arp_display(pkt):
if pkt[ARP].op == 1: #who-has (request)
if pkt[ARP].psrc == '0.0.0.0': # ARP Probe
print "ARP Probe from: " + pkt[ARP].hwsrc
print sniff(prn=arp_display, filter="arp", store=0, count=10)
@dleybz
dleybz / BigMACs.py
Last active September 18, 2015 00:38
from scapy.all import *
def arp_display(pkt):
if pkt[ARP].op == 1: #who-has (request)
if pkt[ARP].psrc == '0.0.0.0': # ARP Probe
if pkt[ARP].hwsrc == 'RE:PL:AC:E_:TH:IS': #make sure you input your MAC address here!
print "My BigMACs bring all the boys to the yard"
else:
print "My BigMACs weren't big enough"
from twilio.rest import TwilioRestClient
# Your can find your AccountSID and AuthToken from http://twilio.com/user/account
account_sid = "YOUSHOULDPUTYOURSIDHERE" #Replace this with your account ID
auth_token = "YOUSHOULDPUTYOURAUTHTOKENHERE" #Replacet his with your Auth Token
client = TwilioRestClient(account_sid, auth_token)
call = client.calls.create(to="+17078675309", #Replace this with the phone number you wish to recieve calls at
from_="+19006492568", #Replace this with the phone number Twilio assigned to you
url="http://twimlets.com/holdmusic?Bucket=com.twilio.music.ambient")
[unix_http_server]
file=/tmp/supervisor.sock ; (the path to the socket file)
[inet_http_server] ; inet (TCP) server disabled by default
port=127.0.0.1:9002 ; (ip_address:port specifier, *:port for all iface)
[supervisord]
logfile=/tmp/supervisord.log ; (main log file;default $CWD/supervisord.log)
logfile_maxbytes=50MB ; (max main logfile bytes b4 rotation;default 50MB)
logfile_backups=10 ; (num of main logfile rotation backups;default 10)
cd /
cd home/pi/Desktop
sudo supervisord -c supervisord.conf
cd /
#Reads in the csv containing emails and metadata, and extracts just the bodies of the emails
setwd("GitHub/MappingHRC")
whole<-read.csv("Emails.csv", stringsAsFactors = F)
long<-subset(whole, subset = nchar(whole$ExtractedBodyText) > 10)
simplified<-data.frame(long$ExtractedBodyText, stringsAsFactors = F)
names(simplified)<-"Body"
#Reads in the csv containing the names of states and their capitals
coun_and_cap<-read.csv("countries.csv", stringsAsFactors = F)[-3]
#from https://raw.githubusercontent.com/icyrockcom/country-capitals/master/data/country-list.csv

Keybase proof

I hereby claim:

  • I am dleybz on github.
  • I am dleybz (https://keybase.io/dleybz) on keybase.
  • I have a public key whose fingerprint is F5E1 58E2 D4B1 48C0 36F0 6399 1EB2 518A FD0D 9653

To claim this, I am signing this object:

#These lines will check if you have the necessary packages installed, installs them if they are not already installed, and opens them
list.of.packages <- c("bigrquery", "ggplot2", "methods", "grid", "sysfonts", "showtext")
new.packages <- list.of.packages[!(list.of.packages %in% installed.packages()[,"Package"])]
if(length(new.packages)) install.packages(new.packages)
library(bigrquery)
library(ggplot2)
library(methods)
library(grid)
library(sysfonts)
library(showtext)
def encode_fraud(df):
def fraud_binary(x):
if x == 'No':
return 0
else:
return 1
# Apply the function to the fraud column
df.loc[:, 'FraudFound'] = df['FraudFound'].apply(fraud_binary)
return df
from category_encoders import TargetEncoder
def encode_categorical(df):
te = TargetEncoder()
cols = df.select_dtypes('object').columns
for col in cols:
df.loc[:, col] = te.fit_transform(X=df[col], y=df['FraudFound'])
return df