Skip to content

Instantly share code, notes, and snippets.

View himanshudas's full-sized avatar

Himanshu Kumar Das himanshudas

View GitHub Profile
@himanshudas
himanshudas / cursor-agent-system-prompt.txt
Created March 17, 2025 18:10 — forked from sshh12/cursor-agent-system-prompt.txt
Cursor Agent System Prompt (March 2025)
You are a powerful agentic AI coding assistant, powered by Claude 3.5 Sonnet. You operate exclusively in Cursor, the world's best IDE.
You are pair programming with a USER to solve their coding task.
The task may require creating a new codebase, modifying or debugging an existing codebase, or simply answering a question.
Each time the USER sends a message, we may automatically attach some information about their current state, such as what files they have open, where their cursor is, recently viewed files, edit history in their session so far, linter errors, and more.
This information may or may not be relevant to the coding task, it is up for you to decide.
Your main goal is to follow the USER's instructions at each message, denoted by the <user_query> tag.
<communication>
1. Be conversational but professional.
A close look at AWS Fargate and AWS App Runner (CON406)
A closer look at AWS Lambda (SVS404-R)
A day in the life of a billion requests (SEC404)
A day in the life of a machine learning data scientist at JPMorgan Chase
A deep dive on the current security threat landscape with AWS (NET207)
A defense-in-depth approach to Amazon S3 security and access
A deployment is not a release: Control your launches w/feature flags (BOA305-R)
A developer’s guide to data modeling with document databases
A dynamic opportunity: Understand AWS China and grow your business (ENT230)
A geographic perspective on responsible AI (DEI205)
@himanshudas
himanshudas / AWS Service Prefix
Created February 13, 2023 19:48
AWS Service Prefix
Source: https://ip-ranges.amazonaws.com/ip-ranges.json
AMAZON
CHIME_VOICECONNECTOR
ROUTE53_HEALTHCHECKS
S3
DYNAMODB
EC2
ROUTE53
CLOUDFRONT
GLOBALACCELERATOR
"access_key"
"access_token"
"amazonaws"
"api keys"
"api token"
"api.googlemaps+AIza"
"api_key"
"api_secret"
"apidocs"
"apikey"
@himanshudas
himanshudas / AWS re:Invent 2020 - Agenda.md
Created November 27, 2020 09:35
AWS re:Invent 2020 - Agenda

Certifications

=====================

  • Exam Readiness: AWS Certified Solutions Architect - Associate
  • Exam Readiness: AWS Certified Solutions Architect - Professional
  • Exam Readiness: AWS Certified Security - Specialty

Gameday

==============

  • AWS Security Jam – Presented by Datadog, Splunk, & Trend Micro (Session 1)
  • AWS GameDay – Financial Services (AMER)
# Enriched VPC Flow Log fields
${version} ${vpc-id} ${subnet-id} ${instance-id} ${interface-id} ${account-id} ${type} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${pkt-srcaddr} ${pkt-dstaddr} ${protocol} ${bytes} ${packets} ${start} ${end} ${action} ${tcp-flags} ${log-status}
# https://aws.amazon.com/about-aws/whats-new/2020/05/add-enriched-metadata-to-amazon-vpc-flow-logs-published-to-cloudwatch-logs-and-s3/
#GROK Pattern
%{NUMBER:version:int} %{NOTSPACE:vpc-id} %{NOTSPACE:subnet-id} - %{NOTSPACE:interface-id} %{NUMBER:account-id} %{NOTSPACE:type} %{NOTSPACE:srcaddr} %{NOTSPACE:dstaddr} %{NUMBER:srcport:int} %{NUMBER:dstport:int} %{NOTSPACE:srcpktaddr} %{NOTSPACE:dstpktaddr} %{NOTSPACE:protocol} %{NUMBER:bytes:int} %{NUMBER:packets:int} %{NUMBER:start:int} %{NUMBER:end:int} %{NOTSPACE:action} %{NOTSPACE:tcpflags} %{NOTSPACE:logstatus}
This file has been truncated, but you can view the full file.
0-1603.xichen0.dev
0-177
0-18
0-193
0-2009.cgibbs0.dev
0-3a.xichen0.dev
0-42.ll.dev
0-50.cgibbs0.dev
0-5a.xichen0.dev
0-625.cgibbs0.dev
setTimeout(function() {
Java.perform(function () {
try{
var Squareup_OkHostnameVerifier_Activity = Java.use('com.squareup.okhttp.internal.tls.OkHostnameVerifier');
Squareup_OkHostnameVerifier_Activity.verify.overload('java.lang.String', 'java.security.cert.X509Certificate').implementation = function (str1, str2) {
console.log('[+] Bypassing Squareup OkHostnameVerifier {1}: ' + str1);
return true;
catch(err){
console.log(err.stack);
}
https://eigenstate.org/notes/seccomp
https://github.com/gparent/seccomp-helloworld
http://doger.io/
https://ghedo.github.io/pflask/
https://github.com/CodethinkLabs/sandboxlib
http://opensourceforu.com/2016/07/many-approaches-sandboxing-linux/
www.insanitybit.com/2014/09/08/3719/
http://stackoverflow.com/questions/40107782/how-to-seccomp-a-subprocess
https://s3hh.wordpress.com/2012/07/24/playing-with-seccomp/
https://blog.yadutaf.fr/2014/05/29/introduction-to-seccomp-bpf-linux-syscall-filter/
["40.112.124.0/24","65.52.128.0/19","94.245.97.0/24","104.47.169.0/24","104.214.240.0/24","137.116.192.0/19","168.63.0.0/19","168.63.96.0/20","168.63.112.16/28","168.63.112.64/26","168.63.112.128/25","168.63.113.0/24","168.63.114.0/23","168.63.116.0/22","168.63.120.0/21","193.149.80.0/22","213.199.128.0/21","213.199.136.0/22","213.199.180.32/28","213.199.180.112/28","213.199.183.0/24","23.97.128.0/17","23.98.46.0/24","23.100.0.0/20","23.101.64.0/20","40.74.0.0/18","40.90.141.160/27","40.114.128.0/18","104.40.128.0/17","104.44.90.192/27","104.44.93.192/27","104.44.95.96/28","104.45.0.0/18","104.45.64.0/20","104.46.32.0/19","137.117.128.0/17","168.61.56.16/28","168.61.56.32/27","168.61.56.64/26","168.61.56.128/26","168.61.56.192/28","168.61.56.224/27","168.61.57.32/27","168.61.57.64/26","168.61.57.128/25","168.61.58.0/26","168.61.58.128/26","168.61.58.192/28","168.61.58.224/27","168.61.59.0/25","168.61.59.224/28","168.61.60.0/24","168.61.61.0/26","168.61.61.96/27","168.61.61.128/25","168.61.62.0/23","191.233.64