Bootstrap knowledge of LLMs ASAP. With a bias/focus to GPT.
Avoid being a link dump. Try to provide only valuable well tuned information.
Neural network links before starting with transformers.
Allow: CONNECT | |
Allow: GET | |
Allow: HEAD | |
Allow: POST | |
Allow: TRACE | |
Client-IP: 0 | |
Client-IP: 0177.0000.0000.0001 | |
Client-IP: 0x7F000001 | |
Client-IP: 10.0.0.0 | |
Client-IP: 10.0.0.1 |
# 2023-11-27 MIT LICENSE | |
Here's the open source version of my ChatGPT game MonkeyIslandAmsterdam.com. | |
It's an unofficial image+text-based adventure game edition of Monkey Island in Amsterdam, my home town. | |
Please use it however you want. It'd be nice to see more ChatGPT-based games appear from this. If you get inspired by it, please link back to my X https://x.com/levelsio or this Gist so more people can do the same! | |
Send me your ChatGPT text adventure game on X, I'd love to try it! |
import os | |
import assemblyai as aai | |
from pytube import YouTube | |
aai.settings.api_key = "INSERT YOUR API KEY HERE" | |
youtube_url = "https://www.youtube.com/watch?v=f94wKh70cOY" | |
# Let's download the YouTube video | |
youtube = YouTube(youtube_url) | |
audio = youtube.streams.filter(only_audio=True).first() |
Here's the conversation I had collaborating with ChatGPT to build a basic diagramming app.
Certifried (CVE-2022-26923) gives Domain Admin from non-privileged user with the requirement adding computer accounts or owning a computer account. Kerberos Relay targeting LDAP and Shadow Credentials gives a non-privileged domain user on a domain-joined machine local admin access on (aka owning) the machine. Combination of these two: non-privileged domain user escalating to Domain Admin without the requirement adding/owning computer accounts.
The attack below uses only Windows (no Linux tools interacting with the Domain), simulating a real-world attack scenario.
Prerequisites:
Script and the decoded strings from the EKANS/Snake ransomware. Original script written by @sysopfb - I've only modified the regexp to cover all cases where decryption was used in the sample.
Script:
import re
import sys
import pefile
import struct
Based on the Host communication instructions, but with a tweak for when the usb0
address is not found:
$ /sbin/ip link set usb0 up
Cannot find device "usb0"
Because of the predictable network interface name scheme, though, usb0
may be renamed to something else:
#include <BLEAdvertisedDevice.h> | |
#include <BLEDevice.h> | |
#include <BLEScan.h> | |
const int PIN = 2; | |
const int CUTOFF = -60; | |
void setup() { | |
pinMode(PIN, OUTPUT); | |
BLEDevice::init(""); |
import time | |
import RPi.GPIO as GPIO | |
# We are going to use the BCM numbering | |
GPIO.setmode(GPIO.BCM) | |
# Set pin 26 as input using pull up resistor | |
GPIO.setup(26, GPIO.IN, pull_up_down=GPIO.PUD_UP) | |