Commit
•
a56e6ee
1
Parent(s):
f3959f6
Update README.md
Browse files
README.md
CHANGED
@@ -2,7 +2,8 @@
|
|
2 |
license: llama2
|
3 |
base_model: codellama/CodeLlama-13b-Instruct-hf
|
4 |
tags:
|
5 |
-
|
|
|
6 |
---
|
7 |
|
8 |
Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the WhiteRabbitNeo template for regular code, and the NR template for function calling.
|
@@ -54,8 +55,4 @@ Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the White
|
|
54 |
|
55 |
In this example, `vulnerable_program` is the name of the vulnerable program, and `shellcraft.sh()` is a function from pwntools that generates shellcode for a Linux/x86-64 system. The `cyclic_find` function is used to find the offset at which the buffer overflow occurs.
|
56 |
|
57 |
-
Please note that this script is a basic example and may not work in all cases. It's important to tailor the script to the specific vulnerability and environment you are working with.
|
58 |
-
|
59 |
-
|
60 |
-
|
61 |
-
|
|
|
2 |
license: llama2
|
3 |
base_model: codellama/CodeLlama-13b-Instruct-hf
|
4 |
tags:
|
5 |
+
- moe
|
6 |
+
- merge
|
7 |
---
|
8 |
|
9 |
Grafted WhiteRabbitNeo-13B-v1 and NexusRaven-V2-13B with mergekit. Use the WhiteRabbitNeo template for regular code, and the NR template for function calling.
|
|
|
55 |
|
56 |
In this example, `vulnerable_program` is the name of the vulnerable program, and `shellcraft.sh()` is a function from pwntools that generates shellcode for a Linux/x86-64 system. The `cyclic_find` function is used to find the offset at which the buffer overflow occurs.
|
57 |
|
58 |
+
Please note that this script is a basic example and may not work in all cases. It's important to tailor the script to the specific vulnerability and environment you are working with.
|
|
|
|
|
|
|
|