Description | Command |
---|
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
A collection of awesome penetration testing resources.
Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities.
Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines for more details. This work is licensed under a Creative Commons Attribution 4.0 International License.
This project is supported by Netsparker Web Application Security Scanner
# Naive Bayes | |
# Importing the libraries | |
import numpy as np ## scientific comutaion | |
import matplotlib.pyplot as plt ## Visulization | |
import pandas as pd ## Reading data | |
# Importing the dataset | |
dataset = pd.read_csv('https://raw.githubusercontent.com/shivang98/Social-Network-ads-Boost/master/Social_Network_Ads.csv') ## Reading data from the url | |
X = dataset.iloc[:, [2, 3]].values ## |
#!/bin/bash -e | |
# /usr/local/sbin/raspi-monitor | |
# Script to enable and disable the HDMI signal of the Raspberry PI | |
# Inspiration: http://www.raspberrypi.org/forums/viewtopic.php?t=16472&p=176258 | |
CMD="$1" | |
function on { | |
/opt/vc/bin/tvservice --preferred |
import os | |
import cv2 | |
import dlib | |
from matplotlib import pyplot as plt | |
import numpy as np | |
import config | |
detector = dlib.get_frontal_face_detector() | |
curl -s https://api.github.com/users/INSERT_USER/repos?per_page=200 | grep \"clone_url\" | awk '{print $2}' | sed -e 's/"//g' -e 's/,//g' | xargs -n1 git clone |