Forwarded from UNDERCODE TESTING
๐ฆAnother Good AI Model for hacking:
Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.
The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
Advanced Persistent Threats (APT) Management
Architecture and Design
Business Continuity and Disaster Recovery
Cloud Security
Communication and Reporting
Cryptography and PKI
Data Analysis and Interpretation
Digital Forensics
GovernanceRiskand Compliance
Hacking
Identity and Access Management
Incident Management and Disaster Recovery Planning
Incident Response
Information Security Management and Strategy
Legal and Ethical Considerations
Malware Analysis
Network Security
Penetration Testing and Vulnerability Assessment
Physical Security
Regulatory Compliance
Risk Management
Scripting
Secure Software Development Lifecycle (SDLC)
Security in Emerging Technologies
Security Operations and Monitoring
Social Engineering and Human Factors
Software and Systems Security
Technologies and Tools
Threats Attacks and Vulnerabilities
Training
It took 24 hours to train 5 epochs on 1x A100.
Prompt format:
"### Instruction:
You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.
### Input:
Lily, how do evil twin wireless attacks work?
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.
The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
Advanced Persistent Threats (APT) Management
Architecture and Design
Business Continuity and Disaster Recovery
Cloud Security
Communication and Reporting
Cryptography and PKI
Data Analysis and Interpretation
Digital Forensics
GovernanceRiskand Compliance
Hacking
Identity and Access Management
Incident Management and Disaster Recovery Planning
Incident Response
Information Security Management and Strategy
Legal and Ethical Considerations
Malware Analysis
Network Security
Penetration Testing and Vulnerability Assessment
Physical Security
Regulatory Compliance
Risk Management
Scripting
Secure Software Development Lifecycle (SDLC)
Security in Emerging Technologies
Security Operations and Monitoring
Social Engineering and Human Factors
Software and Systems Security
Technologies and Tools
Threats Attacks and Vulnerabilities
Training
It took 24 hours to train 5 epochs on 1x A100.
Prompt format:
"### Instruction:
You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.
### Input:
Lily, how do evil twin wireless attacks work?
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
huggingface.co
segolilylabs/Lily-Cybersecurity-7B-v0.2 ยท Hugging Face
Weโre on a journey to advance and democratize artificial intelligence through open source and open science.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐พ Mozilla Builders: A Celebration of Community-Driven #AI Innovation
https://undercodenews.com/mozilla-builders-a-celebration-of-community-driven-ai-innovation/
@Undercode_News
https://undercodenews.com/mozilla-builders-a-celebration-of-community-driven-ai-innovation/
@Undercode_News
UNDERCODE NEWS
Mozilla Builders: A Celebration of Community-Driven AI Innovation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฎ Refurbished #Steam Deck OLEDs: A Bargain for Performance-Conscious Gamers
https://undercodenews.com/refurbished-steam-deck-oleds-a-bargain-for-performance-conscious-gamers/
@Undercode_News
https://undercodenews.com/refurbished-steam-deck-oleds-a-bargain-for-performance-conscious-gamers/
@Undercode_News
UNDERCODE NEWS
Refurbished Steam Deck OLEDs: A Bargain for Performance-Conscious Gamers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ Europol Takes Down Popular DDoS Platforms in Global Holiday Crackdown
https://undercodenews.com/europol-takes-down-popular-ddos-platforms-in-global-holiday-crackdown/
@Undercode_News
https://undercodenews.com/europol-takes-down-popular-ddos-platforms-in-global-holiday-crackdown/
@Undercode_News
UNDERCODE NEWS
Europol Takes Down Popular DDoS Platforms in Global Holiday Crackdown - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Seamless File Transfer Between iPhones and #Windows PCs: #Microsoft's Answer to AirDrop
https://undercodenews.com/seamless-file-transfer-between-iphones-and-windows-pcs-microsofts-answer-to-airdrop/
@Undercode_News
https://undercodenews.com/seamless-file-transfer-between-iphones-and-windows-pcs-microsofts-answer-to-airdrop/
@Undercode_News
UNDERCODE NEWS
Seamless File Transfer Between iPhones and Windows PCs: Microsoft's Answer to AirDrop - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆFree Ethical Hacking Courses and Tutorials:
https://www.udemy.com/topic/ethical-hacking/free/?srsltid=AfmBOop_fJwU6WN1SzIAmkEKWFfqf1Rz9DbQjvmHeiYedwa4p50nr81C
https://www.udemy.com/topic/ethical-hacking/free/?srsltid=AfmBOop_fJwU6WN1SzIAmkEKWFfqf1Rz9DbQjvmHeiYedwa4p50nr81C
Udemy
Top Free Ethical Hacking Courses & Tutorials Online - Updated [December 2024]
Take an Ethical Hacking course on Udemy. Ethical Hacking training gives you the skills you need to improve network security and defend against cyber invasion.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Advanced Web Scraping: Overcoming Pagination Limits
https://undercodenews.com/advanced-web-scraping-overcoming-pagination-limits/
@Undercode_News
https://undercodenews.com/advanced-web-scraping-overcoming-pagination-limits/
@Undercode_News
UNDERCODE NEWS
Advanced Web Scraping: Overcoming Pagination Limits - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from DailyCVE
๐ด Substance3D Modeler Out-of-Bounds Write Vulnerability (#CVE-2024-53000) - Critical
https://dailycve.com/substance3d-modeler-out-of-bounds-write-vulnerability-cve-2024-53000-critical/
@DailyCVE
https://dailycve.com/substance3d-modeler-out-of-bounds-write-vulnerability-cve-2024-53000-critical/
@DailyCVE
DailyCVE
Substance3D Modeler Out-of-Bounds Write Vulnerability (CVE-2024-53000) - Critical - DailyCVE
2024-12-12 Platform: Adobe Substance 3D Modeler Version: 1.14.1 and earlier Vulnerability: Out-of-Bounds Write (CWE-787) Severity: Critical (CVSS 3.1 base score: [โฆ]
Forwarded from DailyCVE
๐ด BIG-#IP (Advanced WAF/ASM) DoS Vulnerability (#CVE-2024-23308) - High Severity
https://dailycve.com/big-ip-advanced-waf-asm-dos-vulnerability-cve-2024-23308-high-severity/
@Daily_CVE
https://dailycve.com/big-ip-advanced-waf-asm-dos-vulnerability-cve-2024-23308-high-severity/
@Daily_CVE
DailyCVE
BIG-IP (Advanced WAF/ASM) DoS Vulnerability (CVE-2024-23308) - High Severity - DailyCVE
2024-12-12 : This vulnerability affects F5 BIG-IP devices running Advanced WAF or ASM. An attacker can crash a BIG-IP system [โฆ]
Forwarded from DailyCVE
๐ด MD5 Cache Filename Collision Vulnerability (Critical)
https://dailycve.com/md5-cache-filename-collision-vulnerability-critical/
@Daily_CVE
https://dailycve.com/md5-cache-filename-collision-vulnerability-critical/
@Daily_CVE
DailyCVE
MD5 Cache Filename Collision Vulnerability (Critical) - DailyCVE
2024-12-12 Vulnerability : MD5 hashing used for cache filenames is vulnerable to collisions. This means two different cache keys can [โฆ]
Forwarded from DailyCVE
๐ด #python-libarchive, Directory Traversal, #CVE-TBD (High)
https://dailycve.com/python-libarchive-directory-traversal-cve-tbd-high/
@Daily_CVE
https://dailycve.com/python-libarchive-directory-traversal-cve-tbd-high/
@Daily_CVE
DailyCVE
python-libarchive, Directory Traversal, CVE-TBD (High) - DailyCVE
2024-12-12 Platform: python-libarchive Version: Up to 4.2.1 Vulnerability: Directory Traversal Severity: High Date: December 12, 2024 What Undercode Says: A [โฆ]
Forwarded from DailyCVE
๐ด XWiki, Remote Code Execution (RCE), #CVE-TBD (Critical)
https://dailycve.com/xwiki-remote-code-execution-rce-cve-tbd-critical/
@Daily_CVE
https://dailycve.com/xwiki-remote-code-execution-rce-cve-tbd-critical/
@Daily_CVE
DailyCVE
XWiki, Remote Code Execution (RCE), CVE-TBD (Critical) - DailyCVE
2024-12-12 : XWiki versions before 15.10.9 and 16.3.0 are vulnerable to a critical Remote Code Execution (RCE) flaw. This vulnerability [โฆ]
Forwarded from DailyCVE
๐ด XWiki Remote Code Execution Vulnerability (#CVE-TBD) - Critical
https://dailycve.com/xwiki-remote-code-execution-vulnerability-cve-tbd-critical/
@Daily_CVE
https://dailycve.com/xwiki-remote-code-execution-vulnerability-cve-tbd-critical/
@Daily_CVE
DailyCVE
XWiki Remote Code Execution Vulnerability (CVE-TBD) - Critical - DailyCVE
2024-12-12 : A critical remote code execution (RCE) vulnerability has been discovered in XWiki that allows any user with an [โฆ]
Forwarded from DailyCVE
๐ XWiki Scheduler Vulnerability (#CVE-2024-XXXX) (Moderate)
https://dailycve.com/xwiki-scheduler-vulnerability-cve-2024-xxxx-moderate/
@Daily_CVE
https://dailycve.com/xwiki-scheduler-vulnerability-cve-2024-xxxx-moderate/
@Daily_CVE
DailyCVE
XWiki Scheduler Vulnerability (CVE-2024-XXXX) (Moderate) - DailyCVE
2024-12-12 : A vulnerability has been discovered in Vulnerability Details: Platform: XWiki Version: XWiki versions 1.2-milestone-2 to 15.10.8 and 16.0.0-rc-1 [โฆ]
Forwarded from DailyCVE
๐ด Apache Superset SQL Injection Vulnerability (High Severity)
https://dailycve.com/apache-superset-sql-injection-vulnerability-high-severity/
@Daily_CVE
https://dailycve.com/apache-superset-sql-injection-vulnerability-high-severity/
@Daily_CVE
DailyCVE
Apache Superset SQL Injection Vulnerability (High Severity) - DailyCVE
2024-12-12 : A critical vulnerability (CVE-2024-xxxx) has been discovered in Apache Superset versions prior to 4.1.0. This vulnerability allows an [โฆ]
Forwarded from DailyCVE
๐ด NanoProxy: Potential Vulnerabilities Due to Outdated golangorg/x/#crypto Dependency (High)
https://dailycve.com/nanoproxy-potential-vulnerabilities-due-to-outdated-golangorg-x-crypto-dependency-high/
@Daily_CVE
https://dailycve.com/nanoproxy-potential-vulnerabilities-due-to-outdated-golangorg-x-crypto-dependency-high/
@Daily_CVE
DailyCVE
NanoProxy: Potential Vulnerabilities Due to Outdated golangorg/x/crypto Dependency (High) - DailyCVE
2024-12-12 Platform: ryanbekhen/nanoproxy Version: Not specified Vulnerability: Outdated golang.org/x/crypto dependency Severity: High Date: December 12, 2024 What Undercode Says: NanoProxy [โฆ]
Forwarded from DailyCVE
๐ด XWiki Remote Code Execution via Extension Sheet (#CVE-TBD) - Critical
https://dailycve.com/xwiki-remote-code-execution-via-extension-sheet-cve-tbd-critical/
@Daily_CVE
https://dailycve.com/xwiki-remote-code-execution-via-extension-sheet-cve-tbd-critical/
@Daily_CVE
DailyCVE
XWiki Remote Code Execution via Extension Sheet (CVE-TBD) - Critical - DailyCVE
2024-12-12 This article details a critical remote code execution (RCE) vulnerability within the XWiki platform. Vulnerability: Remote Code Execution (RCE) [โฆ]
Forwarded from DailyCVE
๐ต SimpleXLSX, Cross-site Scripting (XSS) Vulnerability (#CVE-2024-XXX)
https://dailycve.com/simplexlsx-cross-site-scripting-xss-vulnerability-cve-2024-xxx/
@Daily_CVE
https://dailycve.com/simplexlsx-cross-site-scripting-xss-vulnerability-cve-2024-xxx/
@Daily_CVE
DailyCVE
SimpleXLSX, Cross-site Scripting (XSS) Vulnerability (CVE-2024-XXX) - DailyCVE
2024-12-12 A Cross-site Scripting (XSS) vulnerability has been identified in the SimpleXLSX library, specifically in the `readXfs` and `toHTMLEx` functions. [โฆ]
Forwarded from UNDERCODE TESTING
๐ฆ ๐
๐๐๐ ๐๐ฅ๐๐ฌ๐ฌ๐๐ฌ ๐๐จ๐ซ ๐ ๐ฉ๐๐ญ๐ก๐ฐ๐๐ฒ ๐ข๐ง๐ญ๐จ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ง๐ ๐๐ญ๐ก๐ข๐๐๐ฅ ๐ก๐๐๐ค๐ข๐ง๐ ๐
๐จ๐ฎ๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ:
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ