File size: 5,367 Bytes
cdbb604
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129

base_model: LeroyDyer/Mixtral_AI_CyberCoder
gate_mode: hidden # one of "hidden", "cheap_embed", or "random"
dtype: float16 # output dtype (float32, float16, or bfloat16)
## (optional)
experts_per_token: 2
experts:
  - source_model: cognitivecomputations/dolphin-2.8-mistral-7b-v02
    positive_prompts:
    - "Help me debug this code."
    - "Rewrite this function in Python."
    - "Optimize this C# script."
    - "Implement this feature using JavaScript."
    - "Convert this HTML structure into a more efficient design."
    - "Assist me with writing a program that"
    - "Create an application to."
    - "Rewrite this function in VB.NET."
    - "Optimize this VB.NET script."
    - "Implement this feature using JavaScript."
    - "Convert this HTML structure into a more efficient design."
    - "make a program that"
    - "Create an app to."
    - "Rewrite this function in rust."
    - "Optimize this javascript."
    - "Implement this feature using VbScript."
    - "Convert this HTML structure into a more efficient design."
    - "Design a model to"
    - "Create an object oriented model to match this use case"
    - "Create a uml model for this project "
    - "Create  an interface for this project in"
    - "Write a program to solve this problem"
    - "Modify this function to improve its performance"
    - "Refactor this code to enhance readability"
    - "Create a custom function for this specific use case"
    - "Optimize this algorithm to reduce computational complexity"
    - "Implement this feature by extending existing codebase"
    - "Integrate this API call into the application"
    - "Help me troubleshoot and fix this bug"
    - "Review and test this code snippet before deployment"
    - "Analyze this error log to identify potential issues"
    - "Generate a set of unit tests for this module"
    - "Evaluate different approaches to solving this problem"
    - "Do a web search for"
    - "Use the plugin to"
    - "How do you"
    - "Explain the concept of"
    - "Give an overview of"
    - "Compare and contrast between"
    - "Provide information about"
    - "Help me understand"
    - "Summarize"
    - "Make a recommendation on"
    - "Answer this question"
    - "How do you"
    - "Explain the concept of"
    - "Give an overview of"
    - "Compare and contrast between"
    - "Provide information about"
    - "Help me understand"
    - "Summarize"
    - "Make a recommendation on"
    - "Answer this question"
    ## (optional)
    # negative_prompts:
    #   - "This is a prompt expert_model_1 should not be used for"
  - source_model: segolilylabs/Lily-Cybersecurity-7B-v0.2
    positive_prompts:
    - "What are Pharming and Defacement?"
    - "Different types of buffer overflows and methods of detection?"
    - "techniques used for footprinting?."
    - "Implement this Open Source Footprinting using ."
    - "Network Enumeration using"
    - "Assist me with Exploitation of application vulnerabilities "
    - "What are Pharming and Defacement?"
    - "Different ways of identifying active IP addresses (ICMP) Internet Control Message Protocol is an active IP addresses?"
    - "techniques used for Brute Force Hacking."
    - "Implement hacking password and get access to system ."
    - "DOS (Denial of service) attack?"
    - "Assist me with a Smurf Attack "
    - "Different ways of identifying computer based social engineering attacks"
    - "techniques used for Brute Force Hacking."
    - "Implement SQL injection? ."
    - "DOS (Denial of service) attack?"
    - "Assist me with a Teardrop Attack "
    - " Bait and Switch "
    - "Assist me with a Buffer Overflow Attacks"
    - "Network Sniffing?"
    - "Assist me with a ARP Spoofing or ARP poisoning "
    - "Different ways of avoid or prevent ARP poisoning?"
    - "techniques used for Packet Filtering ."
    - "Implement SQL injection? ."
    - " cryptographic network protocols :?"
    - " with a Mac Flooding? "
    - " with a DHCP Rogue Server?"
    - " types of password cracking techniques?"
    - "add these numbers"
    - "whats 2+2"
    - "Explain this"
    - "Explain the concept of"
    - "Give an overview of"
    - "Compare and contrast between"
    - "Provide information about"
    - "Help me understand"
    - "Summarize"
    - "Make a recommendation on"
    - "Answer this question"
    - "subtraction"
    - "division"
    - "multiplication"
    - "addition"
    - "I need help with a math problem"
    - "Solve for x"
    - "Add these two numbers together: 4 + 3 = 7"
    - "Multiply 5 by 6: 5 * 6 = 30"
    - "Divide 8 by 2: 8 / 2 = 4"
    - "Find the remainder when 9 is divided by 3: 9 % 3 = 0"
    - "Calculate the square root of 16: sqrt(16) = 4"
    - "Simplify the expression (a+b)/(c-d): (a+b)/(c-d)"
    - "Factor out the common factor of 2 from 4x + 6y: 2(2x + 3y)"
    - "Solve for x in the equation 3x - 7 = 2x + 5: x = 12"
    - "Graph the line y = 2x + 3"
    - "Approximate pi to three decimal places: 3.142"
    - "Find the derivative of f(x) = sin(x): f'(x) = cos(x)"
    - "Integrate g(x) = x^2 over the interval [0, 1]: g(1) - g(0) = 1/3"
    - "Calculate the determinant of the matrix A = [[2, 3], [4, 5]]: det(A) = 2*5 - 3*4 = -2"
    - "Solve the system of equations Ax = b: x = [-5, 10]"
    - "Calculate the sum of the first n natural numbers using the formula Sn = n*(n+1)/2: sum(n=1 to 5) = 15"