Graphics

Adding two hypotrochoid curves

This is the result of direct addition of two hypotrochoids on top of each other, i.e., (x, y) = (x_hypotrochoid1, y_hypotrochoid1) + (x_hypotrochoid2, y_hypotrochoid2)

Joining points on the circle

Joining points on the circle to form heart-shaped line art. If instead of circle we used hyptrochoid then we will get the following:

Drawing double polygon

AI generated javascript for drawing double polygon - about 60%. And about 5% of code really needs lots of manual Chrome Devtool debugging + ChatGPT advise.

Pentagon with Colored Line

How to draw pentagon with colored lines. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.

Chasing diagram on a circle

This is just drawing two circles and joing lines from one circle to another, and input parameter is just adjusting the index offset from 0 to connect.

Chasing diagram on triangle

How to draw triangle. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.

Back to Top ↑

MachineLearning

Continuity of thoughts problems in AI

The “continuity of thoughts” problem in large language models (LLMs) refers to the challenge of maintaining coherent and contextually relevant reasoning across multiple interactions or steps. This issue arises because LLMs, by design, generate responses based on the immediate input without inherently retaining long-term context or memory of previous interactions. Here are some key points and approaches related to this problem:

Using Groq to build AI agents framework

Groq primarily provides high-performance hardware for AI workloads and does not come with a specific proprietary AI agent framework. However, Groq’s ecosystem is designed to work seamlessly with widely-used AI frameworks, enabling the creation and deployment of AI agents by leveraging these existing tools.

Process of AI agent implementations using Groq

Creating AI agents using Groq involves leveraging the Groq hardware and software ecosystem, primarily designed for high-performance machine learning workloads. Groq processors are optimized for matrix operations and neural network computations, making them well-suited for implementing AI agents that require real-time decision-making or computationally intensive tasks.

AI agents framework

AI agents can be classified based on their purpose, behavior, and the techniques used to implement them. Here’s an overview of the most popular types of AI agents:

Back to Top ↑

Javascript

60 jQuery exercises

Here’s a list of 60 jQuery exercises, categorized by difficulty and functionality.

60 AngularJS exercises

A list of 60 AngularJS exercises, categorized into different topics to cover basics, data binding, directives, routing, services, and advanced features.

Tools for deobfuscating, decoding, or decrypting JavaScript

Here’s a list of tools and websites commonly used for deobfuscating, decoding, or decrypting JavaScript. These tools serve various purposes, including simplifying obfuscated code, reversing encoded strings, or analyzing minified JavaScript.

Back to Top ↑

AccessControl

Identifying Access Control Bugs

Access control bugs can be critical in exposing sensitive data or allowing unauthorized actions. Here are 30 methods to detect access control bugs systematically:

Back to Top ↑

CSP

top 30 CSP bypass techniques

The top 30 CSP bypass techniques known in the CTF and bug bounty hunting communities, along with their explanations and use cases:

Top 100 Content Security Policy (CSP) features

Content Security Policy (CSP) is an HTTP header that provides a robust mechanism to mitigate certain types of attacks, such as Cross-Site Scripting (XSS) and data injection. Here are the top 50 features and directives supported by CSP:

Back to Top ↑

Rootkits

Back to Top ↑

Java

Back to Top ↑

chatbot

Back to Top ↑

AI

Back to Top ↑

AI

Back to Top ↑

APIHacking

Back to Top ↑

AWS

Back to Top ↑

Android

Back to Top ↑

AntiRootkit

Back to Top ↑

Apache Kafka

Back to Top ↑

Gitlab

Top GitLab’s bug bounty program hunters

Based on GitLab’s bug bounty program reports from recent years, here are some of the most notable bug hunters who have made significant contributions:

Back to Top ↑

Gobuster

Back to Top ↑

IR

Back to Top ↑

JWT

Back to Top ↑

Langchain

Back to Top ↑

LoadBalancer

Back to Top ↑

Microsoft Entra

Back to Top ↑

Network Anomaly Detection

Back to Top ↑

Odoo

Back to Top ↑

PathTraversal

Back to Top ↑

PrivEscalation

Back to Top ↑

PrivilegeEscalation

Back to Top ↑

SNMP

Back to Top ↑

SOC

Back to Top ↑

SSO

Back to Top ↑

Vulnerabilites

Back to Top ↑

Wordpress

100 differeny ways to test WordPress vulnerabilities

Testing a WordPress URL or webpage for vulnerabilities involves a structured methodology, leveraging both automated tools and manual techniques. Below are 100 different ways categorized into specific areas for comprehensive security testing:

Back to Top ↑

crypto

Back to Top ↑

forensics

Back to Top ↑