Skip to content

Instantly share code, notes, and snippets.

View hackerkid's full-sized avatar
🚀
Wingardium leviosa

Vishnu Ks hackerkid

🚀
Wingardium leviosa
View GitHub Profile
@hackerkid
hackerkid / send-message.py
Last active September 18, 2022 17:36 — forked from sosukeinu/send-message.py
Python script to send EML file using gmail SMTP server
#!/usr/bin/env python
# -*- mode: python; coding: utf-8-unix -*-
import sys
import os.path
import smtplib
if len(sys.argv) <= 2:
print('Usage:')
print(' $ python ' + sys.argv[0] + ' mailfrom rcptto <emlfile>')
print
Verifying my Blockstack ID is secured with the address 1FGK9xwr62ZgxCtK26VEVo3jSNkTUnuvUf https://explorer.blockstack.org/address/1FGK9xwr62ZgxCtK26VEVo3jSNkTUnuvUf
https://play.google.com/store/apps/details?id=com.showtimeapp
{"bpi": {"2017-09-08": 306.66,
"2017-09-09": 305.14,
"2017-09-10": 293.34,
"2017-09-11": 297.21,
"2017-09-12": 294.28,
"2017-09-13": 280.5,
"2017-09-14": 230.63,
"2017-09-15": 254.26,
"2017-09-16": 247.97,
"2017-09-17": 252.3,
tfidf_body = TfidfVectorizer().fit_transform(bodies)
tfidf_headlines = TfidfVectorizer().fit_transform(headlines)
for i in range(0, 10):
cosine_similarities = linear_kernel(tfidf_headlines[i], tfidf_body[i]).flatten()

Keybase proof

I hereby claim:

  • I am hackerkid on github.
  • I am vishnuks (https://keybase.io/vishnuks) on keybase.
  • I have a public key whose fingerprint is C42D 90D4 7431 6174 E6C3 261E AD1B 4BCC 2769 EE5A

To claim this, I am signing this object:

@hackerkid
hackerkid / file
Last active September 26, 2016 17:09
freedom_public
{"0.6864806429384607":"-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nCharset: UTF-8\r\n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\r\nro1u9qWVd2BHREWbVosiTf49rw/rUGH5Tw==\r\n=0CBt\r\n-----END PGP PUBLIC KEY BLOCK-----\r\n","0.9040975074848083":"-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nCharset: UTF-8\r\n\r\nxv8AAABSBAAAAAATCCqGSM49AwEHAgMElFqDkTynQqdgjOGD6buuhJvTSCX8Uvuw\r\nrfBDy1wwMJ9m0GmYB//yQc7Kgs55oKGspHgXK5oZdCulk9JTgn8gzc3/AAAACDxn\r\naXRodWI+wv8AAACOBB
Greetings!
We know you have dreams, we do too.
At Hack In The North, we work to break down whatever's keeping you from making those dreams a reality. Whether its knowledge or access to materials - whatever the barrier is, consider it a bit more manageable at Hack In the North. In Hack In The North, participants (“hackers”) get to spend 36 hours work to build or code something they dream of. There would be workshops, mentors, internet and piles of food to guide you along the way and keep you focused.
In all, you bring your ideas, and we give you everything you need to make them come to life. The solutions can range in platform and application, including elements of web development, mobile applications, hardware project, and more. Hackathons are one of the best ways to educate people about technology. Inexperienced hackers may often learn some new skills by participating in a hackathon.