Bootstrap knowledge of LLMs ASAP. With a bias/focus to GPT.
Avoid being a link dump. Try to provide only valuable well tuned information.
Neural network links before starting with transformers.
| #!/bin/bash | |
| pip --disable-pip-version-check list --outdated --format=json | python -c "import json, sys; print('\n'.join([x['name'] for x in json.load(sys.stdin)]))" | xargs -n1 pip install -U |
| { | |
| "anytime" : [ | |
| "Hey there sexy!", | |
| "I hope your day is as nice as your face!", | |
| "Have you been working out?", | |
| "I'm lucky to be your mirror!", | |
| "The Force is strong with you", | |
| "If I could high five you... I would!", | |
| "On a scale from 1 to 10, you're an 15!", | |
| "Being awesome is hard, but you'll manage", |
| { | |
| "anytime" : [ | |
| "Hey there sexy!", | |
| "I hope your day is as nice as your face!", | |
| "Have you been working out?", | |
| "I'm lucky to be your mirror!", | |
| "The Force is strong with you", | |
| "If I could high five you... I would!", | |
| "On a scale from 1 to 10, you're an 15!", | |
| "Being awesome is hard, but you'll manage", |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| """ | |
| This script will automate reporting malware to the npm team. | |
| It automates reporting via https://npmjs.com/support. | |
| Before using it, either ensure you have the Requests module installed, or install it with | |
| `pip install requests`. |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| """ | |
| The purpose of this script is to scan a directory (default: ports) for | |
| port configuration files that contain http-based URLS, and convert | |
| them to https if possible. | |
| It only looks for files with an extension of .cmake or .json. |
| # Download JSON files for CVEs from https://nvd.nist.gov/vuln/data-feeds | |
| # Extract JSON | |
| # Fire up WSL or a Linux terminal. Make sure you have jq installed. | |
| # Run this, send to a CSV file and then open/sort/whatever in Excel. | |
| cat nvdcve-1.1-2021.json | jq '.CVE_Items[].cve | .CVE_data_meta.ID + ", " + .problemtype.problemtype_data[].description[].value' | cut -d\" -f2 |
| #!/usr/bin/python | |
| # License: MIT | |
| # Author: Michael Scovetta <[email protected]> | |
| import re | |
| import sys | |
| """ | |
| Usage: |
| #!/bin/bash | |
| # Takes a list of URLs (output from ishttps) and turns them into a massive sed replacement script. | |
| FILENAME="$1" | |
| echo "sed -i '" | |
| while read -r url; do | |
| ESC_IN=$(echo "$url" | sed -e 's/[]\/$*.^[]/\\&/g') | |
| ESC_OUT=$(echo "$ESC_IN" | sed -e 's/http:/https:/') | |
| <!-- | |
| Source: | |
| https://blogs.microsoft.com/microsoftsecure/2017/09/07/new-iis-functionality-to-help-identify-weak-tls-usage/ | |
| --> | |
| <site name="Default Web Site" id="1" serverAutoStart="true"> | |
| <application path="/"> | |
| <virtualDirectory path="/" physicalPath="C:\inetpub\wwwroot" /> | |
| </application> | |
| <bindings> |