Skip to content

Instantly share code, notes, and snippets.

@XerxesZorgon
XerxesZorgon / OpenBB_LSTM.ipynb
Created April 8, 2023 17:20
LSTM predicts AMC closing prices
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@troynj
troynj / Regex_hex.md
Last active February 21, 2023 06:55
Match a Hex Value with RegEx

Matching A Hex Value

Regular expressions (regex) are a powerful tool for pattern matching in text. They are used in a wide range of applications. A regular expression is a sequence of characters that defines a search pattern. It consists of a combination of literal characters, special characters, and operators that are used to match patterns in text. In this explanation, we will break down the various components of a regular expression and provide general definitions to help you understand how each part works. We will also use an example regular expression to demonstrate how each component works in practice.

Summary

Knowing how to match a hexadecimal (hex) value with a regular expression can be useful in a number of different contexts. Hexadecimal values are commonly used to represent colors in web development, so being able to validate and match hex color codes can be important for creating valid and consistent designs. Additionally, hex values can be used to represent binary data, such as image file

@akarayn
akarayn / root.sh
Created February 21, 2023 06:22
"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
#!/bin/bash
# Give the usual warning.
clear;
echo "[INFO] Automated Android root script started.\n\n[WARN] Exploit requires sdk module \"NDK\".\nFor more information, visit the installation guide @ https://goo.gl/E2nmLF\n[INFO] Press Ctrl+C to stop the script if you need to install the NDK module. Waiting 10 seconds...";
sleep 10;
clear;
# Download and extract exploit files.
echo "[INFO] Downloading exploit files from GitHub...";
@rlaphoenix
rlaphoenix / p2p_filename_ideas.md
Last active September 25, 2024 18:28
P2P Filename Suggestions/Ideas

P2P Blu-ray Filename Ideas

All of these are ideas to improve the Blu-ray P2P filenaming landscape.
None of these are particularly used yet apart from maybe my own releases or a handful of other people who had the same idea.

If you need current P2P filename rules, go to https://phoeniix.dev/filenames.

Discs

We should use a capacity nomenclature in place of what's typically the "Source Tag" (i.e. where WEB-DL or BluRay would be).

@sherrytp
sherrytp / Awesome_CS.md
Last active April 11, 2026 09:11
Awesome Quant resources

Awesome CS Courses Awesome

CS Course Lists other than ClassCentral[https://www.classcentral.com/]

Introduction

There is a lot of hidden treasure lying within university pages scattered across the internet. This list is an attempt to bring to light those awesome CS courses which make their high-quality material i.e. assignments, lectures, notes, readings & examinations available online for free.

Table of Contents

@ChristopherA
ChristopherA / shell-startup-order.md
Last active November 27, 2021 21:45
Shell Startup Order #bash #zsh

Shell Startup Order

Zsh 5.3

Ever since macOS Catalina 10.15, the default shell for macOS has been zsh.

As per man zsh under STARTUP/SHUTDOWN FILES.

   Commands  are  first  read from /etc/zshenv this cannot be overridden.
@ih2502mk
ih2502mk / list.md
Last active May 9, 2026 17:01
Quantopian Lectures Saved
@ChristopherA
ChristopherA / brew-bundle-brewfile-tips.md
Last active May 6, 2026 12:55
Brew Bundle Brewfile Tips

Brew Bundle Brewfile Tips

Copyright & License

Unless otherwise noted (either in this file or in a file's copyright section) the contents of this gist are Copyright ©️2020 by Christopher Allen, and are shared under spdx:Creative Commons Attribution Share Alike 4.0 International (CC-BY-SA-4.) open-source license.

Sponsor

If you more tips and advice like these, you can become a monthly patron on my GitHub Sponsor Page for as little as $5 a month; and your contributions will be multipled, as GitHub is matching the first $5,000! This gist is all about Homebrew, so if you like it you can support it by donating to them or becoming one of their Github Sponsors.

Debian System Hardening

I'm writing this as my notes on hardening a Kali Linux system running kernel version 5.6.14. This is by no means an exhaustive list of everything that could be done

This is meant for general-purpose, daily-use Linux laptop. Most notably, this is a one-user system. I'm the only user here, so countermeasures for user-infighting are not taken here. I also do a lot of programming (and debugging), so some features such as the kernel Yama module are not turned to their most restrictive settings.

I'm skipping pre- and during-install procedures, such as disk encryption, secure boot, etc.. You should start this process with an already-completed fully-encrypted, passworded install. I'm also assuming some very basic knowledge, such as what constitutes a strong password, and how to edit files.

Almost all of these changes require a reboot to take effect. I'm leaving out how to apply changes on-the-fly here, but expect to reboot after major changes. The etckeeper package may be help

@ayxos
ayxos / Nginx.sh
Last active March 18, 2021 18:58
Random Dev useful commands
#!/bin/sh
ssh user@src.com -t bash -ci "logs" >> report.log
# Remove duplicated lines
sort report.log | uniq > report_temp.log
# replace new items
mv -f report_temp.log report.log
# generating reports