Skip to content

Instantly share code, notes, and snippets.

View TheSkallywag's full-sized avatar

Skallywag TheSkallywag

View GitHub Profile
@TheSkallywag
TheSkallywag / Imbalance-bars-FINAL.py
Created July 6, 2024 22:15 — forked from quant-views/Imbalance-bars-FINAL.py
Imbalance bars implementation based on the book Advances in Financial Machine Learning by Marcos Lopez de Prado
def delta(df):
a = np.diff(df['Price'])
a = np.insert(a, 0, 0)
df['Delta'] = a
return df
def labelling(df):
b = np.ones(len(df['Price']))
for i, delta in enumerate(df['Delta']):
if i > 0:

Crippling Facebook

Facebook works with advertisers to target you. These instructions are one of the many ways to begin crippling that relationship. When AI targeting is crippled, your psychosecurity improves :)

  1. On your desktop machine, goto https://accountscenter.facebook.com/ads/audience_based_advertising
  2. Maximize the browser window
  3. Press F12 and click on the Console tab
  4. Select the code below, copy it, paste it upon the Console line (The area next to the > character in the Console window), and press enter:
@TheSkallywag
TheSkallywag / pfctl-cheatsheet.txt
Created December 21, 2022 18:45 — forked from johnbianchi/pfctl-cheatsheet.txt
pfctl cheat sheet
#### General PFCTL Commands ####
$ pfctl -d disable # packet-filtering
$ pfctl -e enable # packet-filtering
$ pfctl -q # run quiet
$ pfctl -v -v # run even more verbose
#### Loading PF Rules ####
$ pfctl -f /etc/pf.conf # load /etc/pf.conf
$ pfctl -n -f /etc/pf.conf # parse /etc/pf.conf, but dont load it
$ pfctl -R -f /etc/pf.conf # load only the FILTER rules
$ pfctl -N -f /etc/pf.conf # load only the NAT rules
@TheSkallywag
TheSkallywag / stretchoid-ips-to-block.txt
Created December 19, 2022 22:16
stretchoid.com IPs as of Dec 19, 2022
I used this handy one-liner to search ip ranges while looking up its PTR record.
The PTR record will have the string "stretchoid". This process took about an hour.
for N in {128..255}; do echo "Testing 192.241.$N.0 - 192.241.$N.255" >> stretchoid_ips.txt; for L in {0..255}; do host -t PTR "192.241.$N.$L" | grep -qF 'stretchoid.com.' && echo "192.241.$N.$L `host -t PTR \"192.241.$N.$L\"`" >> stretchoid_ips.txt; done; done
Credit goes to sissy for the idea:
https://forum.netgate.com/topic/169024/stretchoid-com-ip-list-for-use-in-blocking-their-port-scans?_=1671484145965&lang=en-US
I then opened up the text file in notepad++ and did a regular expressions Search/Replace (CTRL+H)
@TheSkallywag
TheSkallywag / ThreatMetrixData.txt
Created October 21, 2022 00:04 — forked from ACK-J/ThreatMetrixData.txt
All the data the ThreatMetrix script collects after running and sends back to Lexis Nexis.
agent_publickey = 3059301306072a8648ce3d020106082a8648ce3d03010703420004f2b81b1902a771c8c24f09c6bd8be647d33bd139269856418a42c5a78343d943a03ac2173529a816f797a803563de6ecdd25572ce09af8c081c02303bac0c4d3
agent_publickey_hash = 525f76180e55012341ffe12bcfb5587adad1b920
agent_publickey_hash_result = not found
agent_publickey_hash_type = web:ecdsa
agent_type = browser_computer
alert_id = 9598
api_call_datetime = 2019-12-16 15:24:42.595
api_key = fioxxxxxxxxxx370
api_site_id = api101.qa2.sac.
api_type = session-query
@TheSkallywag
TheSkallywag / metrix_block.py
Created October 21, 2022 00:04 — forked from ACK-J/metrix_block.py
Find all the domains ThreatMetrix is using to exfil user tracking data
from shodan import Shodan
api = Shodan('API-KEY')
results = api.search('org:"Threat Metrix" port:443 Bad Request')
for banner in results['matches']:
# Only care about services that use SSL
if 'ssl' in banner:
print(banner['ssl']['cert']['subject']['CN'])
Add a new user to the www-data group
In this example, add a new user called vivek to the www-data group, enter:
sudo useradd -g www-data vivek
### set the password for vivek user ###
sudo passwd vivek
@TheSkallywag
TheSkallywag / ex bank marketing predictive model.py
Created January 24, 2022 01:50 — forked from BioSciEconomist/ex bank marketing predictive model.py
Predictive model training, validation, and scoring basic example
# *-----------------------------------------------------------------
# | PROGRAM NAME: ex bank marketing predictive model.py
# | DATE: 5/1/20
# | CREATED BY: MATT BOGARD
# | PROJECT FILE:
# *----------------------------------------------------------------
# | PURPOSE: basic example of predictive modeling, evaluation, and scoring
# *----------------------------------------------------------------
# Import numpy and pandas
@TheSkallywag
TheSkallywag / ex VAR.py
Created January 24, 2022 00:48 — forked from BioSciEconomist/ex VAR.py
Example VAR model for python
# *-----------------------------------------------------------------
# | PROGRAM NAME: ex VAR.py
# | DATE: 2/23/21
# | CREATED BY: MATT BOGARD
# | PROJECT FILE:
# *----------------------------------------------------------------
# | PURPOSE: source: https://www.machinelearningplus.com/time-series/vector-autoregression-examples-python/
# *----------------------------------------------------------------
# see also my blog post: http://econometricsense.blogspot.com/2011/05/vector-autoregressions-and-bayesian.html
################################################################################################
# name: barplot-03.py
# desc: Simple bar plot with options
# date: 2018-07-02
# Author: conquistadorjd
# Documentation : https://matplotlib.org/api/_as_gen/matplotlib.pyplot.bar.html#matplotlib.pyplot.bar
################################################################################################
from matplotlib import pyplot as plt
import numpy as np