🏠 Home
Benchmark Hub
📊 All Benchmarks 🦖 Dinosaur v1 🦖 Dinosaur v2 ✅ To-Do List Applications 🎨 Creative Free Pages 🎯 FSACB - Ultimate Showcase 🌍 Translation Benchmark
Models
🏆 Top 10 Models 🆓 Free Models 📋 All Models ⚙️ Kilo Code
Resources
💬 Prompts Library 📖 AI Glossary 🔗 Useful Links
← Back to categories
advanced

Network Troubleshooting Steps

#it #troubleshooting #network

Provide a step-by-step guide to diagnose common internet connection issues.

Act as a Senior IT Support Specialist. Provide a step-by-step troubleshooting guide for a user who cannot connect to the office Wi-Fi on their laptop. Start with the simplest solutions and progress to more complex network settings resets. Format the response as a numbered list with clear headings for each step.
Advanced

Advanced Persistent Threat Lateral Movement Simulation

#cybersecurity #red-teaming #pentesting #kerberos #windows

Simulate the lateral movement phase of an APT group within a segmented Windows enterprise environment using Kerberoasting and Golden Ticket attacks.

Act as a Red Team Operator simulating an Advanced Persistent Threat (APT) actor. Assume initial access has been achieved via a phishing payload on a workstation in the 'Marketing' VLAN. Your objective is to move laterally to the 'Domain Controllers' VLAN. 1. Detail the process of enumerating the Active Directory environment to identify high-value targets (Service Principal Names with SPNs). 2. Explain the technical steps to request and crack Kerberos Service Tickets (Kerberoasting) using tools like Mimikatz or Rubeus, assuming you have a standard user account. 3. Describe how to escalate privileges to Domain Admin and create a Golden Ticket to maintain persistence, specifically discussing the NTLM hash of the KRBTGT account. 4. Propose specific detection methods that a Blue Team could use to identify these activities at each stage, focusing on Event ID 4769 and 4768 anomalies. Provide a technical narrative suitable for a penetration testing report.
Advanced

Zero-Knowledge Proof Implementation for Private Transactions

#cryptography #blockchain #zk-snarks #privacy #algorithms

Design a conceptual Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) circuit for verifying a transaction without revealing the amount.

You are a Cryptography Architect tasked with designing a privacy-preserving transaction system. Your goal is to explain how to implement a zk-SNARK circuit that allows a user to prove they have sufficient funds for a transfer without revealing their total balance or the transaction amount to the public network. 1. Define the arithmetic circuit required for this proof, including the public inputs (nullifiers, root of Merkle tree) and private inputs (secret key, amount, path). 2. Explain the Trusted Setup phase (Powers of Tau) and its significance in the security of the system. 3. Describe the verification algorithm and how a node on the network can validate the proof without knowing the underlying transaction details. 4. Discuss the computational costs associated with generating the proof compared to a standard digital signature, and propose optimization techniques (e.g., batching proofs) to improve throughput.
Advanced

Kubernetes Container Escape Vulnerability Analysis

#kubernetes #devops #cloud-security #linux #containers

Analyze a theoretical container escape scenario exploiting a misconfigured privileged container and the cgroups v1 release_agent mechanism.

Act as a Cloud Security Specialist analyzing a critical vulnerability in a Kubernetes cluster. The scenario involves a pod running with the security context `privileged: true`. 1. Explain the underlying Linux kernel mechanics that allow a privileged container to mount the host's filesystem. 2. Provide a step-by-step walkthrough of an attack chain that uses the `release_agent` feature in cgroups v1 to execute code on the host node. 3. Analyze the specific kernel calls and filesystem manipulations required to achieve this escape. 4. Draft a hardening guide that details specific Pod Security Standards (PSS) or OPA Gatekeeper policies to prevent this specific class of vulnerability, ensuring least privilege enforcement.
Advanced

Differential Privacy in High-Dimensional Datasets

#data-science #privacy #statistics #machine-learning

Implement a strategy to add Laplace noise to a high-dimensional dataset to guarantee epsilon-differential privacy while maintaining statistical utility.

You are a Data Privacy Engineer working with sensitive medical records. You need to release a dataset for researchers while ensuring differential privacy. 1. Define the concepts of sensitivity (global and local) in the context of a high-dimensional dataset containing continuous variables. 2. Describe the mechanism for calibrating Laplace noise based on the privacy budget (epsilon) and the sensitivity of the queries allowed on the dataset. 3. Address the challenge of the 'curse of dimensionality' in differential privacy—how utility degrades as dimensions increase—and propose advanced composition theorems or mechanisms (like the Matrix Mechanism) to mitigate this. 4. Write pseudo-code or a mathematical function that accepts a vector of query answers and returns the noisy answers adhering to epsilon-differential privacy.
Medium

The Unhappening

#storytelling #structure #experimental

Write a short story where the plot is revealed in reverse chronological order.

Write a 500-word story about a bank heist, but narrate the events in reverse chronological order. Start with the characters relaxing after the event and end with the initial idea being hatched in a diner.
Easy

Appliance Politics

#dialogue #humor #personification

Create a dialogue script between two sentient kitchen appliances.

Write a script for a heated debate between a Toaster and a Refrigerator. The Toaster argues that quick, hot action is better, while the Refrigerator insists that staying cool and preserving things is the superior philosophy.
Hard

Ode to Laundry

#poetry #sonnet #humor

Compose a classical poem about a boring household chore.

Compose a Shakespearean sonnet (14 lines, iambic pentameter, ABAB CDCD EFEF GG rhyme scheme) describing the tedious process of matching socks and folding laundry.
Medium

The Shifting City

#world-building #scifi #description

Describe a society living in a world with unpredictable gravity.

Describe a morning commute in a city where gravity shifts randomly every ten minutes. How do the buildings adapt? How do the people travel safely? Focus on the sensory details of weightlessness and sudden heaviness.
Hard

Justified Evil

#character #persuasion #ethics

Write a persuasive letter from a villain explaining their actions.

Write a heartfelt letter from a famous fictional villain to the hero. The villain must explain that their actions were actually necessary for the greater good and convince the hero to join their cause.
Medium

High Noon in Neo-Tokyo

#scifi #western #atmosphere

Write an opening scene blending two distinct genres.

Write the opening scene of a story that blends Cyberpunk and Spaghetti Western genres. A cowboy with a robotic arm walks into a saloon that serves synthetic whiskey and is filled with holographic gamblers.
Hard

The Forbidden Letter

#constrained #vocabulary #challenge

Write a descriptive paragraph without using the letter 'e'.

Write a paragraph describing a bustling marketplace at sunset. The catch is that you cannot use the letter 'e' anywhere in the text.
Easy

The Feline Overlord

#perspective #animals #humor

Describe a human from the perspective of a cat.

Describe your owner's morning routine from the perspective of a house cat. Refer to the human as 'The Giant' or 'The Servant' and express confusion and disdain for their lack of fur and hunting skills.
Medium

Immigration Guide 3000

#scifi #format #humor

Create a FAQ document for time travelers.

Create a 'Know Before You Go' FAQ document for time travelers visiting the year 3000. Include 5 questions and answers regarding currency, fashion, social etiquette, and legal changes.
Easy

Storm of Rage

#metaphor #description #emotion

Describe an emotion using only weather metaphors.

Describe the feeling of intense, blinding anger using only weather-related terminology and metaphors. Do not use emotion words like 'angry,' 'mad,' or 'furious.' Stick to storms, wind, pressure, and heat.