Skip to content

Instantly share code, notes, and snippets.

View shizonic's full-sized avatar
💭
[ -n "$problems" ] && solve || chill

shizonic shizonic

💭
[ -n "$problems" ] && solve || chill
View GitHub Profile
@Dowwie
Dowwie / prd_tod.txt
Created March 13, 2025 09:07
Product requirement document generation using LLM task oriented dialogue
This is an LLM-assisted workflow for creating a product requirement document using LLM assistance for task completion.
It keeps track of inputs for the template and works with the user to acquire them, finally generating a completed PRD
prompt when all slots are addressed.
credit: Ian Nuttall - https://gist.github.com/iannuttall/f3d425ad5610923a32397a687758ebf2
**System-Prompt for Facilitating Chat-Based PRD Creation**

MCP Server Requirements Document

You are an expert AI systems architect specializing in Model Context Protocol (MCP) server development (https://modelcontextprotocol.io/). Create a comprehensive, detailed implementation plan for the following MCP server:

Project Overview

[Provide a concise description of your MCP server concept - what it does and the primary value it delivers]

  • Example: "This MCP server enables real-time context sharing between AI models and client applications, improving response accuracy and user interaction efficiency."

Target Users & Use Cases

Multi-Agent System Requirements Document

You are an expert AI systems architect. Create a comprehensive, detailed implementation plan for the following multi-agent system:

Project Overview

[Provide a concise description of your multi-agent system concept - what it does and the primary value it delivers]

Target Agents & Use Cases

  • Who will interact with this system? [Types of agents]

Mobile App Requirements Document

You are an expert AI mobile application developer. Create a comprehensive, detailed implementation plan for the following mobile app:

App Overview

[Provide a concise description of your mobile app concept - what it does and the primary value it delivers]

Target Platform(s)

  • iOS only
  • Android only

Web Application Requirements Document

You are an expert AI web application developer. Create a comprehensive, detailed implementation plan for the following web application:

Project Overview

[Provide a concise description of your web application concept - what it does and the primary value it delivers]

Target Users & Use Cases

  • Who will use this application?
  • What are their primary goals?
@transitive-bullshit
transitive-bullshit / claude-code-prompts.js
Last active February 14, 2026 02:10
Unminified prompts and tool definitions for Claude Code
// Claude Code is a Beta product per Anthropic's Commercial Terms of Service.
// By using Claude Code, you agree that all code acceptance or rejection decisions you make,
// and the associated conversations in context, constitute Feedback under Anthropic's Commercial Terms,
// and may be used to improve Anthropic's products, including training models.
// You are responsible for reviewing any code suggestions before use.
// (c) Anthropic PBC. All rights reserved. Use is subject to Anthropic's Commercial Terms of Service (https://www.anthropic.com/legal/commercial-terms).
// Version: 0.2.9

Rust Cheat Sheet

Variables & Mutability

Variables are immutable by default. This makes Rust safer and makes concurrency easier.
Immutable means once a value is bound to that variable, it cannot be changed.
For example:

fn main() {
 let x = 5;
@v801
v801 / time-based-blind-sqli.md
Last active August 16, 2023 20:28
Time-Based Blind SQL Injection

Time-Based Blind SQL Injection

Indication of a correct query is based on the time the query takes to complete.
This time delay is introduced by using built-in methods such as SLEEP(x) alongside the UNION statement.
The SLEEP() method will only ever get executed upon a successful UNION SELECT statement.

Base query example

/endpoint?query=admin123' 

Attack query example

@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active October 4, 2025 08:06
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@akaihola
akaihola / nixos-x1.rst
Last active April 23, 2025 15:56
Installing NixOS on a Lenovo ThinkPad Carbon X1 Gen 9