- Graphics 58
- MachineLearning 5
- Javascript 4
- AccessControl 2
- CSP 2
- Rootkits 2
- Java 1
- chatbot 1
- AI 1
- AI 1
- APIHacking 1
- AWS 1
- Android 1
- AntiRootkit 1
- Apache Kafka 1
- Gitlab 1
- Gobuster 1
- IR 1
- JWT 1
- Langchain 1
- LoadBalancer 1
- Microsoft Entra 1
- Network Anomaly Detection 1
- Odoo 1
- PathTraversal 1
- PrivEscalation 1
- PrivilegeEscalation 1
- SNMP 1
- SOC 1
- SSO 1
- Vulnerabilites 1
- Wordpress 1
- cookie stealing 1
- crypto 1
- forensics 1
Graphics
Variable Petal Lines Animation
Variable Petal Lines Animation (v2)
Epitrochoid (v2) Curves
Epitrochoid (v2) Curves
Epitrochoid Curves
Epitrochoid Curves
Double polygon double rotation
Double polygon double rotation
Chasing polygon
Chasing polygon
Adding two hypotrochoid curves
This is the result of direct addition of two hypotrochoids on top of each other, i.e., (x, y) = (x_hypotrochoid1, y_hypotrochoid1) + (x_hypotrochoid2, y_hypotrochoid2)
Joining points on the hypotrochoids
Joining points on the hypotrochoid. Compare this with that of joining lines on the circle.
Joining points on the circle
Joining points on the circle to form heart-shaped line art. If instead of circle we used hyptrochoid then we will get the following:
Joining points on the hypotrochoids (generalized)
Joining points on the hypotrochoid. Compare this with that of joining lines on the circle.
Three Flower in Motion (v3)
Three Flower in Motion (v3)
Flower in Motion (v2)
Flower in Motion (v2)
Hypotrochoid Curves with Slow Rotation and Offset Control
Hypotrochoid Curves with Slow Rotation and Offset Control
Hypotrochoid Curves with Rotation and Offset Control
Hypotrochoid Curves with Rotation and Offset Control
Hypotrochoid Curve (v4)
Hypotrochoid Curve with Additional Scrollbars
Flower in Motion
Flower in Motion
Epicycloid Curves
Epicycloid Curves
Epicycloid Curves
Epicycloid Curves
Epicycloid Curves
Epicycloid Curves
Hypotrochoid Curve (v3)
Hypotrochoid Curve with Additional Scrollbars
Donut animation drawn using characters
AI generated javascript: Drawing a donut using characters.
Hypotrochoid Curve (v2)
Hypotrochoid Curve with Additional Scrollbars
Hypotrochoid Curves with Scrollbars, Labels, and Color Picker
Hypotrochoid Curves with Scrollbars, Labels, and Color Picker
Hypotrochoid Curves (save as PNG feature)
Hypotrochoid Curves (save as PNG feature)
Vortex Parametric Equation Visualization
Vortex Parametric Equation Visualization
Generalized Cardioid Shape
Generalized Cardioid Shape
Dynamic Petals
Dynamic Petals
Dynamic Petals with Red-Blue-Yellow Gradient
Dynamic Petals with Red-Blue-Yellow Gradient
Animated Sinusoidal Wave on Ellipse
Animated Sinusoidal Wave on Ellipse
Polygon Midpoint Generator
Polygon Midpoint Generator
Polygon with Colored Lines
Polygon with Colored Lines
Epicycloid Curves with Petal with Scrollbars, Labels, and Color Picker
Epicycloid Curves with Petal with Scrollbars, Labels, and Color Picker
Variable Petal Lines Animation
Variable Petal Lines Animation
Variable Petal Lines Animation
Variable Petal Lines Animation
Variable Petal Lines Animation
Variable Petal Lines Animation
Square with Colored Lines
Square with Colored Lines
Generalized chasing rotating polygon
Generalized chasing rotating polygon.
Parametric Equation Visualization with Rotation
AI generated javascript for prametric equation visualization.
Drawing double polygon
AI generated javascript for drawing double polygon - about 60%. And about 5% of code really needs lots of manual Chrome Devtool debugging + ChatGPT advise.
Pentagon with Colored Line
How to draw pentagon with colored lines. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.
Chasing rotating triangle
Chasing rotating triangle.
Drawing chasing triangle
Drawing chasing triangle.
Chasing and rotating square
Drawing chasing and rotating square.
Chasing on square
Chasing on square.
Chasing on rotating pentagon
Chasing on rotating pentagon.
Chasing pentagon
Chasing pentagon.
Chasing lines on rotating hexagon
Chasing lines on rotating hexagon.
Chasing lines and running color
Chasing lines and special effects of running color.
Chasing diagram on rotating hexagon
Chasing diagram on rotating hexagon.
Chasing on hexagon
Chasing diagram on hexagon.
Chasing diagram on diamond around a diamond
Chasing diagram on diamond around a diamond.
Chasing diagram on a circle
This is just drawing two circles and joing lines from one circle to another, and input parameter is just adjusting the index offset from 0 to connect.
Chasing diagram on hexagon around hexagon animated with color.
Chasing diagram on hexagon around hexagon animated with color shifting.
Chasing hexagon around hexagon
Drawing chasing hexagon around hexagon.
Chasing diagram on pentagon around pentagon
Drawing chasing diagram on pentagon around pentagon.
Chasing diagram on squares around squares
Drawing squares around squares, while having chasing diagram inside each square.
Chasing diagram inside a square
Chasing diagram inside a square.
Triangle around triangle with chasing diagram
How to draw triangle around existing triangle. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.
Chasing diagram on triangle
How to draw triangle. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.
MachineLearning
Continuity of thoughts problems in AI
The “continuity of thoughts” problem in large language models (LLMs) refers to the challenge of maintaining coherent and contextually relevant reasoning across multiple interactions or steps. This issue arises because LLMs, by design, generate responses based on the immediate input without inherently retaining long-term context or memory of previous interactions. Here are some key points and approaches related to this problem:
Using Groq to build AI agents framework
Groq primarily provides high-performance hardware for AI workloads and does not come with a specific proprietary AI agent framework. However, Groq’s ecosystem is designed to work seamlessly with widely-used AI frameworks, enabling the creation and deployment of AI agents by leveraging these existing tools.
Process of AI agent implementations using Groq
Creating AI agents using Groq involves leveraging the Groq hardware and software ecosystem, primarily designed for high-performance machine learning workloads. Groq processors are optimized for matrix operations and neural network computations, making them well-suited for implementing AI agents that require real-time decision-making or computationally intensive tasks.
AI agents framework
AI agents can be classified based on their purpose, behavior, and the techniques used to implement them. Here’s an overview of the most popular types of AI agents:
Implement a AI agent for bug hunting
How to implement a deliberative AI agent for web application bug hunting purposes
Javascript
60 jQuery exercises
Here’s a list of 60 jQuery exercises, categorized by difficulty and functionality.
60 AngularJS exercises
A list of 60 AngularJS exercises, categorized into different topics to cover basics, data binding, directives, routing, services, and advanced features.
Tools for deobfuscating, decoding, or decrypting JavaScript (II)
Another list of Javascript deobfuscation tools
Tools for deobfuscating, decoding, or decrypting JavaScript
Here’s a list of tools and websites commonly used for deobfuscating, decoding, or decrypting JavaScript. These tools serve various purposes, including simplifying obfuscated code, reversing encoded strings, or analyzing minified JavaScript.
AccessControl
Identifying Access Control Bugs
Access control bugs can be critical in exposing sensitive data or allowing unauthorized actions. Here are 30 methods to detect access control bugs systematically:
Identifying access control bugs through automation
Privilege Creep Detection
Example: Verify if permissions are retained after role changes.
CSP
top 30 CSP bypass techniques
The top 30 CSP bypass techniques known in the CTF and bug bounty hunting communities, along with their explanations and use cases:
Top 100 Content Security Policy (CSP) features
Content Security Policy (CSP) is an HTTP header that provides a robust mechanism to mitigate certain types of attacks, such as Cross-Site Scripting (XSS) and data injection. Here are the top 50 features and directives supported by CSP:
Rootkits
Linux user space rootkit technologies
Linux user space rootkit technologies
Linux kernel rootkits
Linux kernel rootkits
Java
Back to Top ↑chatbot
Back to Top ↑AI
400 Plus questions to test any generative AI system
400 Plus (redacted) questions and answers to test any generative AI system.
AI
400 Plus questions to test any generative AI system
400 Plus (redacted) questions and answers to test any generative AI system.
APIHacking
100 ways of API Hacking
100 ways of API Hacking
AWS
Examples of development of applications using Amazon Bedrocks
Examples of development of applications using Amazon Bedrocks
Android
How to run Android headless in the cloud
How to run Android headless in the cloud
AntiRootkit
Anti rootkit technologies
How to detect rootkits, or tracing kernel activities
Apache Kafka
AI generated checklist: Apache Kafka
Top 20 applications of Apache Kafka
Gitlab
Top GitLab’s bug bounty program hunters
Based on GitLab’s bug bounty program reports from recent years, here are some of the most notable bug hunters who have made significant contributions:
Gobuster
20 examples of using gobuster for directory traversal and discovery
Below are 20 examples of using gobuster
for directory traversal and discovery. These examples cover different scenarios, including custom wordlists, extensions, and output formatting.
IR
Opensource Security Operation Centers and Incident Response system
Opensource Security Operation Centers and Incident Response system.
JWT
30 common mistakes in JSON Web Tokens (JWT) : authentication or authorization
Here are 30 common mistakes to avoid when using JSON Web Tokens (JWT) for authentication or authorization:
Langchain
List of LangChain applications
What is LangChain?
LoadBalancer
RFCs related to load balancers and their associated protocols
A list of the most important RFCs related to load balancers and their associated protocols.
Microsoft Entra
Microsoft Entra: SSO design from the start
Microsoft Entra: SSO design from the start
Network Anomaly Detection
50 different Wireshark or TCPDump filters for network anomalies detection
Here’s a list of 50 different Wireshark or TCPDump filters that can help detect a variety of network attacks or anomalies. Filters are categorized for convenience.
Odoo
Odoo Setup Guides
Odoo Setup Guides
PathTraversal
Path traversal vulnerability and how its different types of manifestation
Path traversal, also known as directory traversal, is a common security vulnerability that can allow attackers to read arbitrary files on a server. Below is a list of general ways path traversal can be exploited to achieve this:
PrivEscalation
List of linux privilege escalation methods
List of Linux privilege escalation vulnerabilities with available Proof-of-Concepts (POCs) from 2019 to 2024:
PrivilegeEscalation
100 ways to achieve privilege escalation in Linux
100 ways to achieve privilege escalation in Linux
SNMP
20 command-line examples to enumerate SNMP (Simple Network Management Protocol) information
20 command-line examples to enumerate SNMP (Simple Network Management Protocol) information when provided with an IP address and UDP port 161:
SOC
Opensource Security Operation Centers and Incident Response system
Opensource Security Operation Centers and Incident Response system.
SSO
Microsoft Entra: SSO design from the start
Microsoft Entra: SSO design from the start
Vulnerabilites
Assetnote.io Vulnerabilities Writeup
Assetnote.io Vulnerabilities Writeup
Wordpress
100 differeny ways to test WordPress vulnerabilities
Testing a WordPress URL or webpage for vulnerabilities involves a structured methodology, leveraging both automated tools and manual techniques. Below are 100 different ways categorized into specific areas for comprehensive security testing:
crypto
Crypto Currency Setup Notes
Crypto Currency Setup Notes
forensics
Linux C2 attack emulation
Here’s an explanation for each URL in 2-3 lines: