🦑ARP vulnerabilities:
Address Resolution Protocol (ARP) was designed when network security was underdeveloped.
Therefore the protocol is clear text with no embedded security. It does not validate ARP packets and even accepts ARP Responses even if an ARP Request has never been sent out. By default, no mechanism validates whether a rouge host sends malicious ARP messages or intercepts and alters ARP Requests/Replies. Several well-known attacks use the same process called ARP spoofing. The ultimate goal of the attackers is to get in the data path, as shown in, and steal private data.
Address Resolution Protocol (ARP) was designed when network security was underdeveloped.
Therefore the protocol is clear text with no embedded security. It does not validate ARP packets and even accepts ARP Responses even if an ARP Request has never been sent out. By default, no mechanism validates whether a rouge host sends malicious ARP messages or intercepts and alters ARP Requests/Replies. Several well-known attacks use the same process called ARP spoofing. The ultimate goal of the attackers is to get in the data path, as shown in, and steal private data.
🦑 AI-Chat-App-Hack-Vision integrating GPT-4 and Vision:
Overview
This project combines GPT-4 with Vision Studio using Azure services. It uses the sample nature dataset from Vision Studio and is inspired by the [Azure Search OpenAI Demo](https://github.com/Azure/azure-search-openai-demo).
Requirements
Azure Account
1. Azure Free Account: Sign up for free Azure credits.
2. Permissions:
- Role-Based Access Control (RBAC):
-
- Subscription or resource group access is mandatory.
- Azure OpenAI Access:
- Request access via [this form](https://aka.ms/oai/access).
Local Environment
1. Tools:
- Azure Developer CLI
- Python 3.9–3.11 (ensure
- Node.js 14+
- Git
- PowerShell 7+ (Windows only).
2. Setup:
- Install dependencies.
- Ensure Python and PowerShell paths are configured.
Azure Deployment
Steps
1. Prepare Local Code:
- Create a folder and navigate to it in your terminal.
- Authenticate:
- Initialize project:
2. Deploy Resources:
- Run
- Monitor for costs! Stop unused resources to avoid charges:
-
- After deployment, access the app via the provided URL.
Deployment Details
- Resources Deployed:
- Azure App Service (Basic Tier, 1 CPU core, 1.75 GB RAM).
- Azure OpenAI (Standard tier, GPT-4 model).
- Azure AI Search (Standard tier, 1 replica).
- Azure Blob Storage (ZRS).
- Azure Monitor (Pay-as-you-go).
- Cost Optimization:
- Use free SKUs where possible.
- Refer to the [Azure Pricing Calculator](https://azure.microsoft.com/en-us/pricing/calculator/) for estimates.
Running Locally
1. Ensure successful deployment with
2. Authenticate:
3. Start app:
- Navigate to the
- Run
- Open [http://localhost:50505](http://localhost:50505) in your browser.
Clean Up
To avoid unnecessary costs:
1. Run
2. Confirm cleanup by entering
For more details, refer to the [project repository](https://github.com/mattgotteiner/AI-Chat-App-Hack-Vision).
Overview
This project combines GPT-4 with Vision Studio using Azure services. It uses the sample nature dataset from Vision Studio and is inspired by the [Azure Search OpenAI Demo](https://github.com/Azure/azure-search-openai-demo).
Requirements
Azure Account
1. Azure Free Account: Sign up for free Azure credits.
2. Permissions:
- Role-Based Access Control (RBAC):
-
Microsoft.Authorization/roleAssignments/write permissions.- Subscription or resource group access is mandatory.
- Azure OpenAI Access:
- Request access via [this form](https://aka.ms/oai/access).
Local Environment
1. Tools:
- Azure Developer CLI
- Python 3.9–3.11 (ensure
python --version works).- Node.js 14+
- Git
- PowerShell 7+ (Windows only).
2. Setup:
- Install dependencies.
- Ensure Python and PowerShell paths are configured.
Azure Deployment
Steps
1. Prepare Local Code:
- Create a folder and navigate to it in your terminal.
- Authenticate:
azd auth login.- Initialize project:
azd init -t https://github.com/mattgotteiner/AI-Chat-App-Hack-Vision.2. Deploy Resources:
- Run
azd up to provision and deploy all resources.- Monitor for costs! Stop unused resources to avoid charges:
-
azd down or delete resources manually.- After deployment, access the app via the provided URL.
Deployment Details
- Resources Deployed:
- Azure App Service (Basic Tier, 1 CPU core, 1.75 GB RAM).
- Azure OpenAI (Standard tier, GPT-4 model).
- Azure AI Search (Standard tier, 1 replica).
- Azure Blob Storage (ZRS).
- Azure Monitor (Pay-as-you-go).
- Cost Optimization:
- Use free SKUs where possible.
- Refer to the [Azure Pricing Calculator](https://azure.microsoft.com/en-us/pricing/calculator/) for estimates.
Running Locally
1. Ensure successful deployment with
azd up.2. Authenticate:
azd auth login.3. Start app:
- Navigate to the
app directory.- Run
./start.ps1 or use VS Code's "Run & Debug".- Open [http://localhost:50505](http://localhost:50505) in your browser.
Clean Up
To avoid unnecessary costs:
1. Run
azd down.2. Confirm cleanup by entering
y when prompted.For more details, refer to the [project repository](https://github.com/mattgotteiner/AI-Chat-App-Hack-Vision).
Docs
Limited access to Azure OpenAI Service - Azure AI services
This document details the limited access policy for Azure OpenAI Service
🦑Damm G2a should patch this ..
https://drive.google.com/file/d/1QJygOCFebxM5GVIk3-Z67YeoFITJ-xJL/view?pli=1
https://drive.google.com/file/d/1QJygOCFebxM5GVIk3-Z67YeoFITJ-xJL/view?pli=1
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Network Protocol and Traffic Analyzers:
Wireshark - https://www.wireshark.org/
tcpdump - https://www.tcpdump.org/
EtherApe - http://etherape.sourceforge.net/
Capsa Free - https://www.colasoft.com/capsa-free/
Nmap - https://nmap.org/
Netcat (nc) - https://nc110.sourceforge.io/
Wireshark - https://www.wireshark.org/
tcpdump - https://www.tcpdump.org/
EtherApe - http://etherape.sourceforge.net/
Capsa Free - https://www.colasoft.com/capsa-free/
Nmap - https://nmap.org/
Netcat (nc) - https://nc110.sourceforge.io/
Wireshark
Wireshark • undefined
Wireshark: The world's most popular network protocol analyzer
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Network Performance Monitoring:
Nagios - https://www.nagios.org/
PRTG Network Monitor - https://www.paessler.com/prtg
Zabbix - https://www.zabbix.com/
SolarWinds Network Performance Monitor -
https://www.solarwinds.com/network-performance-monitor
ManageEngine OpManager - https://www.manageengine.com/network-monitoring/
Cacti - https://www.cacti.net/
Network Security Analysis
Snort - https://www.snort.org/
Suricata - https://suricata.io/
Zeek (formerly Bro) - https://zeek.org/
OpenVAS (now Greenbone Vulnerability Manager) - https://www.greenbone.net/en/vulnerability-management/
AlienVault OSSIM - https://cybersecurity.att.com/products/ossim
Nagios - https://www.nagios.org/
PRTG Network Monitor - https://www.paessler.com/prtg
Zabbix - https://www.zabbix.com/
SolarWinds Network Performance Monitor -
https://www.solarwinds.com/network-performance-monitor
ManageEngine OpManager - https://www.manageengine.com/network-monitoring/
Cacti - https://www.cacti.net/
Network Security Analysis
Snort - https://www.snort.org/
Suricata - https://suricata.io/
Zeek (formerly Bro) - https://zeek.org/
OpenVAS (now Greenbone Vulnerability Manager) - https://www.greenbone.net/en/vulnerability-management/
AlienVault OSSIM - https://cybersecurity.att.com/products/ossim
Nagios Open Source
Nagios: Free Open Source IT Monitoring Tools
Prevent IT downtime before it impacts your systems with Nagios Core – the free, open source monitoring solution trusted by 1M+ users worldwide. Monitor severs, networks & applications with powerful community-driven tools.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Wireless Network Analysis:
Kismet - https://kismetwireless.net/
Acrylic WiFi - https://www.acrylicwifi.com/
inSSIDer - https://www.metageek.com/products/inssider/
Ekahau HeatMapper - https://www.ekahau.com/heatmapper/
WiFi Analyzer (Microsoft Store) - https://www.microsoft.com/en-us/p/wifi-analyzer/9nblggh33n0n
Kismet - https://kismetwireless.net/
Acrylic WiFi - https://www.acrylicwifi.com/
inSSIDer - https://www.metageek.com/products/inssider/
Ekahau HeatMapper - https://www.ekahau.com/heatmapper/
WiFi Analyzer (Microsoft Store) - https://www.microsoft.com/en-us/p/wifi-analyzer/9nblggh33n0n
Kismet
Kismet: Wi-Fi, Bluetooth, RF, and more
Kismet is a sniffer, WIDS, and wardriving tool for Wi-Fi, Bluetooth, Zigbee, RF, and more, which runs on Linux and macOS
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Network Diagnostics and Troubleshooting:
PingPlotter - https://www.pingplotter.com/
MTR (My Traceroute) - https://github.com/traviscross/mtr
Angry IP Scanner - https://angryip.org/
PingPlotter - https://www.pingplotter.com/
MTR (My Traceroute) - https://github.com/traviscross/mtr
Angry IP Scanner - https://angryip.org/
GitHub
GitHub - traviscross/mtr: Official repository for mtr, a network diagnostic tool
Official repository for mtr, a network diagnostic tool - traviscross/mtr
Forwarded from Exploiting Crew (Pr1vAt3)
This is a beautiful malicous BadUSB implant photo. One of the best parts of #RedTeaming is going into an office and secretly swapping out USB cables on folks desks.
⬇️ 💻 Thanks to Lumafield’s Neptune industrial x-ray CT scanner, we can see the O.MG USB-C Cable isn’t just a regular USB cable. At its core, the O.MG Cable uses an ultra compact ESP32 Pico allow for keystroke injection attacks, remote control via wifi, hardware keylogging, ID/PID spoofing as well as remote command and control.
These are not really that new, and have existed in various forms and lesser capabilities at higher prices for almost ten years now.
Source: Linkedin
⬇️ 💻 Thanks to Lumafield’s Neptune industrial x-ray CT scanner, we can see the O.MG USB-C Cable isn’t just a regular USB cable. At its core, the O.MG Cable uses an ultra compact ESP32 Pico allow for keystroke injection attacks, remote control via wifi, hardware keylogging, ID/PID spoofing as well as remote command and control.
These are not really that new, and have existed in various forms and lesser capabilities at higher prices for almost ten years now.
Source: Linkedin
🦑Hack with 1 Plug:
Duckyspark v.0.4.1
Translator from USB-Rubber-Ducky payloads (Ducky script) to a Digispark code.
Usage:
in this case the translated payload will be saved in the file "digipayload.ino"
Ducky payloads you can find here: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads
or here: https://github.com/CedArctic/DigiSpark-Scripts
Or, you can simply write your own payloads using Ducky script
Ducky script syntax: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript
Recently we found the video "Digispark Flashing Guide & Ducky Payload Converters" that shows how to flash Digispark using the payloads generated by our script: https://www.youtube.com/watch?v=Lrn_hgckhGw&lc
Our site: https://awake.pro/
Upd: added 3d models of USB flesh drive to hide Digispark.
You could edit 3d model, or just print on 3d printer ready-for-print .stl models
Duckyspark v.0.4.1
Translator from USB-Rubber-Ducky payloads (Ducky script) to a Digispark code.
Usage:
python3 Duckyspark_translator.py [payload.txt] [output_file]
or
python3 Duckyspark_translator.py [payload.txt]
in this case the translated payload will be saved in the file "digipayload.ino"
Ducky payloads you can find here: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads
or here: https://github.com/CedArctic/DigiSpark-Scripts
Or, you can simply write your own payloads using Ducky script
Ducky script syntax: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript
Recently we found the video "Digispark Flashing Guide & Ducky Payload Converters" that shows how to flash Digispark using the payloads generated by our script: https://www.youtube.com/watch?v=Lrn_hgckhGw&lc
Our site: https://awake.pro/
Upd: added 3d models of USB flesh drive to hide Digispark.
You could edit 3d model, or just print on 3d printer ready-for-print .stl models
🦑 Example of sFTP Credentials Leak in Private Program
Target Sub-Domain: trc[•]example[•]com
Impact: Full FTP Server Access Obtained
Details: sftp-config.json exposed sensitive credentials.
Severity: 🔴 Critical (9.6)
💡 Stay vigilant for exposed configuration files!
Target Sub-Domain: trc[•]example[•]com
Impact: Full FTP Server Access Obtained
Details: sftp-config.json exposed sensitive credentials.
Severity: 🔴 Critical (9.6)
💡 Stay vigilant for exposed configuration files!
🦑Top ChatGPT extensions for enhancing your productivity and web browsing experience:
1. Monica AI Copilot: A versatile assistant powered by GPT-4, offering functionalities like email drafting, web summaries, PDF chatting, and AI image generation, all while integrating with real-time web browsing.
2. AIPRM for ChatGPT: A powerful tool for marketers and content creators, featuring over 4,500 professional prompts for generating blog titles, ad copy, SEO strategies, and more.
3. Superpower ChatGPT: Adds features like organizing chat folders, custom prompt saving, and downloadable conversations. It’s a great organizational tool for frequent ChatGPT users.
4. Wiseone: Designed for readers, this extension simplifies complex text by providing definitions, context, and summaries directly within your browser.
5. YouTube Summary with ChatGPT & Claude: Summarizes YouTube videos and supports multilingual summaries, complete with timestamps for key points.
6. ChatGPT Writer: Specializes in creating emails and messages based on context, perfect for streamlining communication tasks.
7. Compose AI: Assists with sentence completion, rephrasing, and email replies, making it ideal for improving your writing speed and clarity.
These extensions are available on the Chrome Web Store and are useful for professionals, students, and casual users alike. Let me know if you'd like help with installation or exploring any of these!
1. Monica AI Copilot: A versatile assistant powered by GPT-4, offering functionalities like email drafting, web summaries, PDF chatting, and AI image generation, all while integrating with real-time web browsing.
2. AIPRM for ChatGPT: A powerful tool for marketers and content creators, featuring over 4,500 professional prompts for generating blog titles, ad copy, SEO strategies, and more.
3. Superpower ChatGPT: Adds features like organizing chat folders, custom prompt saving, and downloadable conversations. It’s a great organizational tool for frequent ChatGPT users.
4. Wiseone: Designed for readers, this extension simplifies complex text by providing definitions, context, and summaries directly within your browser.
5. YouTube Summary with ChatGPT & Claude: Summarizes YouTube videos and supports multilingual summaries, complete with timestamps for key points.
6. ChatGPT Writer: Specializes in creating emails and messages based on context, perfect for streamlining communication tasks.
7. Compose AI: Assists with sentence completion, rephrasing, and email replies, making it ideal for improving your writing speed and clarity.
These extensions are available on the Chrome Web Store and are useful for professionals, students, and casual users alike. Let me know if you'd like help with installation or exploring any of these!
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Easiest XSS Testing!! [Basic Recon Tips]
✅Tip: Use Inspect Element to find how the input is handled by the server. i.e. if it is enclosed as ''<your_payload>'' try to escape the closing '' '' by adding ''<your_payload> in the input field. This will break the filters in most cases.
This tip is just a very basic method to bypass filters. There are numerous other ways to bypass the filters and having a little knowledge on javascript will be a advantage for you guys...
I will be sharing next levels of bypassing on my coming posts✅
Source
✅Tip: Use Inspect Element to find how the input is handled by the server. i.e. if it is enclosed as ''<your_payload>'' try to escape the closing '' '' by adding ''<your_payload> in the input field. This will break the filters in most cases.
This tip is just a very basic method to bypass filters. There are numerous other ways to bypass the filters and having a little knowledge on javascript will be a advantage for you guys...
I will be sharing next levels of bypassing on my coming posts✅
Source
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Google Dorks basics:
site:.edu “phone number”– This Dork searches for websites on .edu domains that contain the words “phone number”. student “phone number” – This Dork searches for websites on .edu domains that contain the words “student” and “phone number”.
inurl:edu “login” – This Dork searches for websites on .edu domains that contain the words “login”. This Dork searches for school websites that contain student login information.
“powered by Undercode” site:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.
“powered by Undercode” site:.gov – This Dork searches for websites on .gov domains that contain the words “powered by Undercode”. This Dork searches for governmental websites that are running on the Undercode forum software.
“powered by Undercode” site:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.
“powered by Undercode” inurl:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.
“powered by Undercode” inurl:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.
inurl:.com “powered by Undercode” – This Dork searches for websites on .com domains that contain the words “powered by Undercode”. This Dork searches for websites that are running on the Undercode forum software.
inurl:.edu “register forum” – This Dork searches for websites on .edu domains that contain the words “register forum”. This Dork searches for school websites that allow you to register for a forum.
inurl:.gov “register forum” – This Dork searches for websites on .gov domains that contain the words “register forum”. This Dork searches for governmental websites that allow you to register for a forum
site:.edu “phone number”– This Dork searches for websites on .edu domains that contain the words “phone number”. student “phone number” – This Dork searches for websites on .edu domains that contain the words “student” and “phone number”.
inurl:edu “login” – This Dork searches for websites on .edu domains that contain the words “login”. This Dork searches for school websites that contain student login information.
“powered by Undercode” site:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.
“powered by Undercode” site:.gov – This Dork searches for websites on .gov domains that contain the words “powered by Undercode”. This Dork searches for governmental websites that are running on the Undercode forum software.
“powered by Undercode” site:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.
“powered by Undercode” inurl:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.
“powered by Undercode” inurl:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.
inurl:.com “powered by Undercode” – This Dork searches for websites on .com domains that contain the words “powered by Undercode”. This Dork searches for websites that are running on the Undercode forum software.
inurl:.edu “register forum” – This Dork searches for websites on .edu domains that contain the words “register forum”. This Dork searches for school websites that allow you to register for a forum.
inurl:.gov “register forum” – This Dork searches for websites on .gov domains that contain the words “register forum”. This Dork searches for governmental websites that allow you to register for a forum
🦑Advanced Steganography Tool made with Python:
Installation
1. Clone the repository:
2. Install required Python libraries:
How to Use
1. Navigate to the project directory:
2. Encoding/Decoding Files:
- For Audio Files:
- Encoding:
- Decoding:
- For Video Files:
- Encoding:
- Decoding:
- For Image Files:
- Encoding:
- Decoding:
- For Text Files:
- Encoding:
- Decoding:
3. For Help:
For more detailed usage and code, visit the repository [here](https://github.com/Sanjipan/Steganography).
Installation
1. Clone the repository:
kali@kali:~$ git clone https://github.com/Sanjipan/Steganography
2. Install required Python libraries:
kali@kali:~$ pip install argparse
kali@kali:~$ pip install Wave
kali@kali:~$ sudo pip install opencv-python
kali@kali:~$ pip install numpy
kali@kali:~$ pip install Pillow
kali@kali:~$ pip install pytest-shutil
kali@kali:~$ pip install subprocess.run
kali@kali:~$ sudo pip install stegano
How to Use
1. Navigate to the project directory:
kali@kali:~$ cd Steganography
2. Encoding/Decoding Files:
- For Audio Files:
- Encoding:
sudo python3 ./Steganography.py -a -e <location of file>
- Decoding:
sudo python3 ./Steganography.py -a -d <location of file>
- For Video Files:
- Encoding:
sudo python3 ./Steganography.py -v -e <location of file>
- Decoding:
sudo python3 ./Steganography.py -v -d <location of file>
- For Image Files:
- Encoding:
sudo python3 ./Steganography.py -i -e <location of file>
- Decoding:
sudo python3 ./Steganography.py -i -d <location of file>
- For Text Files:
- Encoding:
sudo python3 ./Steganography.py -t -e <location of file>
- Decoding:
sudo python3 ./Steganography.py -t -d <location of file>
3. For Help:
sudo python3 ./Steganography.py -h
sudo python3 ./Steganography.py --help
For more detailed usage and code, visit the repository [here](https://github.com/Sanjipan/Steganography).
GitHub
GitHub - Sanjipan/Steganography: A Advance Steganography Tool made with Python The Program Supports Hiding Secret Text data into…
A Advance Steganography Tool made with Python The Program Supports Hiding Secret Text data into an innocent looking cover file like : .mp4, .wav, .png, .jpeg, .txt through the use of Steganography...
Forwarded from Exploiting Crew (Pr1vAt3)
YouTube
How to Hide Data in Images: Steganography for Ethical Hacking
In this video, we explore steganography—the technique of hiding data within other files. You’ll see how attackers can conceal messages, password files, scripts, and even malware inside seemingly innocent images, all while bypassing antivirus, Data loss protection…
Forwarded from Exploiting Crew (Pr1vAt3)
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Wild! Google announced that their quantum chip Willow was able to do a computation in 5 minutes that would take current top-tier computers 10,000,000,000,000,000,000,000,000 years to figure out 😳
The 105-qubit chip brings insane error correction, focusing on stability rather than just stacking more qubits. The result? A leap toward practical quantum computing that could revolutionize medicine, AI, and energy in the near future.
But here comes the crazy part.
As part of the Willow announcement, Google basically confirmed we're living in a multiverse:
"It lends credence to the notion that quantum computation occurs in many parallel universes, in line with the idea that we live in a multiverse, a prediction first made by David Deutsch."
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Wild! Google announced that their quantum chip Willow was able to do a computation in 5 minutes that would take current top-tier computers 10,000,000,000,000,000,000,000,000 years to figure out 😳
The 105-qubit chip brings insane error correction, focusing on stability rather than just stacking more qubits. The result? A leap toward practical quantum computing that could revolutionize medicine, AI, and energy in the near future.
But here comes the crazy part.
As part of the Willow announcement, Google basically confirmed we're living in a multiverse:
"It lends credence to the notion that quantum computation occurs in many parallel universes, in line with the idea that we live in a multiverse, a prediction first made by David Deutsch."
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Hack GraphRAG implementation:
Nano-GraphRAG is a lightweight, efficient, and portable implementation of GraphRAG. It's designed to be more user-friendly and hackable than the official version while retaining the core features.
Key Features
- Small yet powerful: ~1100 lines of core code (excluding tests/prompts).
- Highly portable: Supports integrations with Faiss, Neo4j, Ollama, etc.
- Asynchronous and fully typed: Suitable for modern Python workflows.
- Flexible backends:
- LLM: OpenAI, Amazon Bedrock, Ollama, others.
- Vector DB: Built-in
- Graph Storage: NetworkX (default), Neo4j (optional).
- Incremental and batch data handling: Easy to scale as data grows.
Installation
From Source (Recommended)
From PyPI
Quick Start
1. Set up API Keys:
- OpenAI API:
- For Azure OpenAI or Amazon Bedrock, refer to
2. Download a sample text:
3. Basic Usage:
4. Reuse Stored Contexts:
- Reinitialize with the same
Advanced Features
- Batch Insert:
- Incremental Insert:
- Async Support:
- Customizable Parameters:
- Use
Components and Extensibility
Built-in Components:
- LLM: OpenAI, Amazon Bedrock.
- Vector DB: Nano-vectordb, HNSWlib.
- Graph Storage: NetworkX, Neo4j.
Example Extensions:
- Embedding: Sentence-transformers, custom embeddings.
- Visualization: GraphML-based visualizations.
- Chunking: Token-based or custom splitters.
Benchmarking and Contributions
- Benchmarks for performance comparisons are available under
- Contributions for new components and features are welcomed!
Nano-GraphRAG is ideal for developers seeking a nimble and efficient RAG solution, especially for those who want the flexibility to experiment or build on top of it.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Hack GraphRAG implementation:
Nano-GraphRAG is a lightweight, efficient, and portable implementation of GraphRAG. It's designed to be more user-friendly and hackable than the official version while retaining the core features.
Key Features
- Small yet powerful: ~1100 lines of core code (excluding tests/prompts).
- Highly portable: Supports integrations with Faiss, Neo4j, Ollama, etc.
- Asynchronous and fully typed: Suitable for modern Python workflows.
- Flexible backends:
- LLM: OpenAI, Amazon Bedrock, Ollama, others.
- Vector DB: Built-in
nano-vectordb, HNSWlib, Milvus-lite, Faiss.- Graph Storage: NetworkX (default), Neo4j (optional).
- Incremental and batch data handling: Easy to scale as data grows.
Installation
From Source (Recommended)
Clone the repository
git clone https://github.com/gusye1234/nano-graphrag.git
cd nano-graphrag
pip install -e .
From PyPI
pip install nano-graphrag
Quick Start
1. Set up API Keys:
- OpenAI API:
export OPENAI_API_KEY="sk-..."
- For Azure OpenAI or Amazon Bedrock, refer to
.env.example.2. Download a sample text:
curl https://raw.githubusercontent.com/gusye1234/nano-graphrag/main/tests/mock_data.txt > ./book.txt
3. Basic Usage:
from nano_graphrag import GraphRAG, QueryParam
Initialize GraphRAG
graph_func = GraphRAG(working_dir="./dickens")
Insert text data
with open("./book.txt") as f:
graph_func.insert(f.read())
Perform a global search
print(graph_func.query("What are the top themes in this story?"))
Perform a local search for scalability
print(graph_func.query("What are the top themes in this story?", param=QueryParam(mode="local")))
4. Reuse Stored Contexts:
- Reinitialize with the same
working_dir to reload previous contexts.Advanced Features
- Batch Insert:
graph_func.insert(["TEXT1", "TEXT2", ...])
- Incremental Insert:
graph_func.insert("New text to add")
- Async Support:
await graph_func.ainsert("Async text")
await graph_func.aquery("What is this text about?")
- Customizable Parameters:
- Use
help(GraphRAG) and help(QueryParam) to explore.Components and Extensibility
Built-in Components:
- LLM: OpenAI, Amazon Bedrock.
- Vector DB: Nano-vectordb, HNSWlib.
- Graph Storage: NetworkX, Neo4j.
Example Extensions:
- Embedding: Sentence-transformers, custom embeddings.
- Visualization: GraphML-based visualizations.
- Chunking: Token-based or custom splitters.
Benchmarking and Contributions
- Benchmarks for performance comparisons are available under
examples/benchmarks.- Contributions for new components and features are welcomed!
Nano-GraphRAG is ideal for developers seeking a nimble and efficient RAG solution, especially for those who want the flexibility to experiment or build on top of it.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁