逆向工程说明: 本文档基于 nof1.ai Alpha Arena 的公开文档、交易行为模式、API 响应格式和社区讨论,系统性地逆向推导出其 System Prompt 和 User Prompt 的完整结构,欢迎各路大佬戳戳评论,一起来进行这个有趣的实验。
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| installCursor() { | |
| local CURSOR_URL="https://downloader.cursor.sh/linux/appImage/x64" | |
| local ICON_URL="https://miro.medium.com/v2/resize:fit:700/1*YLg8VpqXaTyRHJoStnMuog.png" | |
| local APPIMAGE_PATH="/opt/cursor.appimage" | |
| local ICON_PATH="/opt/cursor.png" | |
| local DESKTOP_ENTRY_PATH="/usr/share/applications/cursor.desktop" | |
| echo "Checking for existing Cursor installation..." |
Debugging the Nvidia CEF processes (Nvidia Overlay or Nvidia App) can be achieved by editing
C:\Program Files\NVIDIA Corporation\NVIDIA app\CEF\Resources file NVIDIA (app/overlay).json
to add the flag nv-remote-debugging-port=XXXX (pick your port), then using chrome://inspect to connect.
The Nvidia Overlay performs RPC calls by calling into the native function window.cefQuery with data like
'{"command":"QUERY_IPC_EXTENSION_MESSAGE","system":"CrimsonNative","module":"ShareServer","method":"EnableInstantReplay","payload":{"enable":true}}'
to enable instant replay
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| ## License | |
| BSD 3-Clause License | |
| Copyright (c) 2024, Ljzd-PRO, https://github.com/Ljzd-PRO | |
| Redistribution and use in source and binary forms, with or without | |
| modification, are permitted provided that the following conditions are met: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # To generate mitm cert and key: | |
| # openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -passout pass:"third-wheel" -subj "/C=US/ST=private/L=province/O=city/CN=hostname.example.com" | |
| # see: https://github.com/campbellC/third-wheel | |
| [package] | |
| name = "http-ytproxy" | |
| version = "0.1.0" | |
| edition = "2021" | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # pip install m3u8_To_MP4 | |
| # Code to download m3u8 links as mp4 files | |
| import m3u8_To_MP4 | |
| import os | |
| def dl_m3u8(url, directory, filename): | |
| # Note directory should be the filepath to save the file ex: '/home/username/bin' | |
| # Directory can be a relative or absolute path | |
| # Filename should end with an .mp4 ex: 'test.mp4' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Working as of July 22nd, 2025 | |
| # - You'll need N_m3u8DL-RE (grab it from https://github.com/nilaoda/N_m3u8DL-RE/releases/latest) | |
| # - You'll need to edit the cookies (on line 10), the user agent (on line 12), and the names you want to download (on line 14). | |
| # - See this comment for a picture on how to populate these values: https://gist.github.com/dougbenham/400ca9fc488126bf9065e9a6cc3657ad?permalink_comment_id=5114236#gistcomment-5114236 | |
| $env:PATH += ";." | |
| $headers = @{ | |
| 'Accept-Encoding' = 'gzip, deflate' | |
| 'Cookie' = 'cf_clearance=..; XSRF-TOKEN=..; leakedzone_session=.. AND MAYBE MORE, PULL ALL COOKIES FROM FIREFOX' |
- Web Wormhole https://webwormhole.io/ https://github.com/saljam/webwormhole
- Localsend https://web.localsend.org/
- FilePizza https://file.pizza/
ShareDrop sharedrop.io https://github.com/szimek/sharedrop(SOLD, not recommended, use one of the forks)A clone SnapDrop snapdrop.net https://github.com/RobinLinus/snapdrop(SOLD, not recommended, use one of the forks)- A fork PairDrop https://pairdrop.net/ https://github.com/schlagmichdoch/pairdrop
- ToffeeShare https://toffeeshare.com/
- Instant.io https://instant.io/
NewerOlder