Bootstrap knowledge of LLMs ASAP. With a bias/focus to GPT.
Avoid being a link dump. Try to provide only valuable well tuned information.
Neural network links before starting with transformers.
| Allow: CONNECT | |
| Allow: GET | |
| Allow: HEAD | |
| Allow: POST | |
| Allow: TRACE | |
| Client-IP: 0 | |
| Client-IP: 0177.0000.0000.0001 | |
| Client-IP: 0x7F000001 | |
| Client-IP: 10.0.0.0 | |
| Client-IP: 10.0.0.1 |
| # 2023-11-27 MIT LICENSE | |
| Here's the open source version of my ChatGPT game MonkeyIslandAmsterdam.com. | |
| It's an unofficial image+text-based adventure game edition of Monkey Island in Amsterdam, my home town. | |
| Please use it however you want. It'd be nice to see more ChatGPT-based games appear from this. If you get inspired by it, please link back to my X https://x.com/levelsio or this Gist so more people can do the same! | |
| Send me your ChatGPT text adventure game on X, I'd love to try it! |
| import os | |
| import assemblyai as aai | |
| from pytube import YouTube | |
| aai.settings.api_key = "INSERT YOUR API KEY HERE" | |
| youtube_url = "https://www.youtube.com/watch?v=f94wKh70cOY" | |
| # Let's download the YouTube video | |
| youtube = YouTube(youtube_url) | |
| audio = youtube.streams.filter(only_audio=True).first() |
Here's the conversation I had collaborating with ChatGPT to build a basic diagramming app.
Certifried (CVE-2022-26923) gives Domain Admin from non-privileged user with the requirement adding computer accounts or owning a computer account. Kerberos Relay targeting LDAP and Shadow Credentials gives a non-privileged domain user on a domain-joined machine local admin access on (aka owning) the machine. Combination of these two: non-privileged domain user escalating to Domain Admin without the requirement adding/owning computer accounts.
The attack below uses only Windows (no Linux tools interacting with the Domain), simulating a real-world attack scenario.
Prerequisites:
Script and the decoded strings from the EKANS/Snake ransomware. Original script written by @sysopfb - I've only modified the regexp to cover all cases where decryption was used in the sample.
Script:
import re
import sys
import pefile
import structYou may buy it by this affiliate link on aliexpress store.
http://oss.digirati.com.br/f3/
f3 - Fight Flash Fraud
Based on the Host communication instructions, but with a tweak for when the usb0 address is not found:
$ /sbin/ip link set usb0 up
Cannot find device "usb0"Because of the predictable network interface name scheme, though, usb0 may be renamed to something else:
| #include <BLEAdvertisedDevice.h> | |
| #include <BLEDevice.h> | |
| #include <BLEScan.h> | |
| const int PIN = 2; | |
| const int CUTOFF = -60; | |
| void setup() { | |
| pinMode(PIN, OUTPUT); | |
| BLEDevice::init(""); |