One Paragraph of project description goes here
These instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.
| ## | |
| ## Main configuration: creates several SQS queues using a module, then | |
| ## combines their policies into an application role. | |
| ## | |
| provider "aws" {} | |
| module "notifications_queue" { | |
| source = "./modules/sqs" | |
| queue_name = "Notifications" |
| # -*- coding: utf-8 -*- | |
| import os | |
| import time | |
| import hashlib | |
| from flask import Flask, render_template, redirect, url_for, request | |
| from flask_uploads import UploadSet, configure_uploads, IMAGES, patch_request_class | |
| from flask_wtf import FlaskForm | |
| from flask_wtf.file import FileField, FileRequired, FileAllowed | |
| from wtforms import SubmitField |
| /* json.dumps(StatusObject._json) */ | |
| { | |
| "created_at": "Thu Jul 28 00:08:39 +0000 2016", | |
| "in_reply_to_status_id": null, | |
| "id_str": "758454081656467456", | |
| "retweeted": false, | |
| "entities": { | |
| "hashtags": [ | |
| { |
| import numpy as np | |
| import pandas as pd | |
| from collections import defaultdict | |
| from scipy.stats import hmean | |
| from scipy.spatial.distance import cdist | |
| from scipy import stats | |
| import numbers | |
| def weighted_hamming(data): |
| From: http://redteams.net/bookshelf/ | |
| Techie | |
| Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp. | |
| Social Engineering: The Art of Human Hacking by Christopher Hadnagy | |
| Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam | |
| The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick | |
| Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others. | |
| Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor | |
| The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors |