Skip to content

Instantly share code, notes, and snippets.

View kingabzpro's full-sized avatar
🦊
Hunting

Abid Ali Awan kingabzpro

🦊
Hunting
View GitHub Profile
@kingabzpro
kingabzpro / webinterface.py
Created February 24, 2022 16:38
Deploying Gradio App on Spaces Using DagsHub
title = "SavtaDepth WebApp"
description = "Savta Depth is a collaborative Open Source Data Science project for monocular depth estimation"
article = "[SavtaDepth Project from OperationSavta]('https://dagshub.com/OperationSavta/SavtaDepth')"
examples = [
["examples/00008.jpg"],
["examples/00045.jpg"],
]
@kingabzpro
kingabzpro / model_inference.py
Created February 24, 2022 16:37
Deploying Gradio App on Spaces Using DagsHub
import os
import torch
import gradio as gr
from fastai.vision.all import *
data = create_data(Path("src/data/processed"))
learner = unet_learner(
data, resnet34, metrics=rmse, wd=1e-2, n_out=3, loss_func=MSELossFlat(), path="src/"
)
learner.load("model")
@kingabzpro
kingabzpro / Ranking.py
Last active May 19, 2021 10:59
Password Ranking
def strength(data):
power=0
if not data["too_short"]:
power+=1
if not data["common_password"]:
power+=1
if not data["too_many_repeats"]:
power+=1
return power
@kingabzpro
kingabzpro / synthetic_username_password.csv
Created April 21, 2021 15:07
The data contains fake and real username and passwords leaked. I got this data from DataCamp
id user_name password
1 vance.jennings joobheco
2 consuelo.eaton 0869347314
3 mitchel.perkins fabypotter
4 odessa.vaughan aharney88
5 araceli.wilder acecdn3000
6 shawn.harrington 5278049
7 evelyn.gay master
8 noreen.hale murphy
9 gladys.ward lwsves2
@kingabzpro
kingabzpro / brute_force_data.csv
Last active April 21, 2021 13:29
SSH Brute Force IP/User/Password Data set can be downloaded on Kaggle https://www.kaggle.com/lako65/ssh-brute-force-ipuserpassword. Converting to CSV and Cleaning I have used online tool to convert Json to CSV and I have used MS Excel to clean data.
We can't make this file beautiful and searchable because it's too large.
username,timestamp,passwords,foreign_ip
albert,Mon Nov 5 08:31:18 2018,albert,109.87.224.151
root,Mon Nov 5 22:16:56 2018,daddy913,122.226.181.166
root,Mon Nov 5 07:18:16 2018,qwerty12,42.7.27.166
root,Sat Nov 3 19:30:58 2018,root,125.65.42.181
root,Mon Nov 5 08:53:41 2018,lolita,61.184.247.12
root,Wed Nov 7 04:38:15 2018,root,61.184.247.11
rendszergaz,Mon Nov 5 19:33:23 2018,rendszergaz,104.236.125.73
root,Mon Nov 5 05:09:25 2018,not4you,61.184.247.7
root,Mon Nov 5 06:33:26 2018,gunther,61.184.247.6
@kingabzpro
kingabzpro / Kaggle_DataScience_Competition_2020.ipynb
Created December 13, 2020 16:54
My Solution to Kaggle Data Science Competition 2020
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@kingabzpro
kingabzpro / mysolNotebook.ipynb
Last active November 20, 2020 14:05
Using SQL on Jupyter Notebook Using postgres local server Assessment test
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@kingabzpro
kingabzpro / Assesment.sql
Last active November 14, 2020 13:08
The Complete SQL Bootcamp 2020 Go from Zero to Hero Assessment Test 2 My solution.
select * from cd.facilities;
select name,membercost from cd.facilities;
select * from cd.facilities where membercost > 0;
select facid,name,membercost,monthlymaintenance from cd.facilities
where membercost > 0 and membercost< (monthlymaintenance/50);
select * from cd.facilities where name like '%Tennis%';

Keybase proof

I hereby claim:

  • I am kingabzpro on github.
  • I am kingabzpro (https://keybase.io/kingabzpro) on keybase.
  • I have a public key ASCOIbvw83TbQwNTOUzn7rapuEubBWdMIKyGoAKJ_LG6DAo

To claim this, I am signing this object: