Building "10x-Hacker-Bot" | Using Code Llama to Detect Website Vulnerabilities
Today we're gonna but our white, grey, black, blue, purple whatever hats on and figure out some way to secure our websites by utilizing LLMs sequential pattern recognition. DISCLAIMER: No sites are being exploited here, this is an experiment to see if we can detect vulnerabilities NOT take any actions on those vulnerabilities to exploit any websites or do damage to any websites/businesses.
💰Support the stream!
CashApp: https://cash.app/$jawerty210
Venmo: https://venmo.com/jawerty210
Buy Me a Coffee: https://www.buymeacoffee.com/bjGHFVW355
Join The Discord: https://discord.gg/dv4TSzsk27
My Socials:
Github: https://github.com/jawerty
Twitter: https://twitter.com/jawerty
LinkedIn: https://www.linkedin.com/in/jawerty/
Twitch: https://www.twitch.tv/jaredthecoder10x
Rumble: https://rumble.com/c/c-3572412
00:00 Introduction / What we're building
20:25 Getting into the code (Analyzing network traffic)
1:29:26 Writing the initial prompt
1:58:58 Conversation on Fame / Ego
2:08:15 Back to the code
2:16:51 Setting up the Colab
2:31:40 Big talk about my life and purpose w/ Sai in chat
3:30:20 It's starting to learn the server architecture
3:47:20 Back to coding - User form simulation
4:06:30 Fixing Large Context Windows w/ Chunking + Summarizing
4:50:00 It's starting to work! Sort of
5:24:43 Where did "Schemers" come from?
5:31:54 It's late
5:40:23 It's summarizing the output im gonna eat/sleep now
-
0:36
AndrewOnizuka
1 year agoTML16: Protect Your Programs with Tau: Advanced Code Verification and Detection of Harmful Content
1 -
2:05
TechInsightHub: Navigating the Future of Technology with Ray Wesner
4 months agoCrack the Cyber Code: Train Your Team to Tackle Threats! | CloudNett's Inside Tips with Ray Wesner
11 -
1:03
InfinityNews
1 year agoHackers steal thousands of ChatGPT's language models in security breach
3 -
14:13
Kn19hts3c
8 months agoXXE | PART 21 | BUG BOUNTY TUTORIAL | MALAYALAM | ETHICAL HACKING
15 -
32:07
Kn19hts3c
8 months agoXXE | PART 20 | BUG BOUNTY TUTORIAL | MALAYALAM | ETHICAL HACKING
20 -
33:14
H@ck3r
11 months ago $0.01 earnedInject | Hack the Box | malayalam | Walkthrough
13 -
34:39
Simple Cyber Defense
2 years agoBrowser Vulnerabilites
57 -
10:33
Daniel Lowrie's Cybersecurity Show
7 months agoIDOR Hacking For Privilege Escalation - PortSwigger Web Security Academy Series
3 -
36:41
Tech With Tim
6 months ago $0.03 earnedPython Selenium Tutorial - Automate Websites and Create Bots
133 -
0:57
secpoint
4 years agoBlock hacker attacks from internet trolls
1