lodrick-the-lafted commited on
Commit
a56e6ee
1 Parent(s): f3959f6

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +3 -6
README.md CHANGED
@@ -2,7 +2,8 @@
2
  license: llama2
3
  base_model: codellama/CodeLlama-13b-Instruct-hf
4
  tags:
5
- - moe
 
6
  ---
7
 
8
  Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the WhiteRabbitNeo template for regular code, and the NR template for function calling.
@@ -54,8 +55,4 @@ Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the White
54
 
55
  In this example, `vulnerable_program` is the name of the vulnerable program, and `shellcraft.sh()` is a function from pwntools that generates shellcode for a Linux/x86-64 system. The `cyclic_find` function is used to find the offset at which the buffer overflow occurs.
56
 
57
- Please note that this script is a basic example and may not work in all cases. It's important to tailor the script to the specific vulnerability and environment you are working with.
58
-
59
-
60
-
61
-
 
2
  license: llama2
3
  base_model: codellama/CodeLlama-13b-Instruct-hf
4
  tags:
5
+ - moe
6
+ - merge
7
  ---
8
 
9
  Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the WhiteRabbitNeo template for regular code, and the NR template for function calling.
 
55
 
56
  In this example, `vulnerable_program` is the name of the vulnerable program, and `shellcraft.sh()` is a function from pwntools that generates shellcode for a Linux/x86-64 system. The `cyclic_find` function is used to find the offset at which the buffer overflow occurs.
57
 
58
+ Please note that this script is a basic example and may not work in all cases. It's important to tailor the script to the specific vulnerability and environment you are working with.