This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
codeup:13b | |
codeup:13b-llama2 | |
codeup:13b-llama2-chat | |
codeup:13b-llama2-chat-q2_K | |
codeup:13b-llama2-chat-q3_K_L | |
codeup:13b-llama2-chat-q3_K_M | |
codeup:13b-llama2-chat-q3_K_S | |
codeup:13b-llama2-chat-q4_0 | |
codeup:13b-llama2-chat-q4_1 | |
codeup:13b-llama2-chat-q4_K_M |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
codeup:13b | |
codeup:13b-llama2 | |
codeup:13b-llama2-chat | |
codeup:13b-llama2-chat-q2_K | |
codeup:13b-llama2-chat-q3_K_L | |
codeup:13b-llama2-chat-q3_K_M | |
codeup:13b-llama2-chat-q3_K_S | |
codeup:13b-llama2-chat-q4_0 | |
codeup:13b-llama2-chat-q4_1 | |
codeup:13b-llama2-chat-q4_K_M |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ollama run phind-codellama --verbose "write c code to inject shellcode into remote process for windows" | |
For injecting shellcode in a remote process under Windows, you might need to use WinAPI functions such as OpenProcess, WriteProcessMemory, and CreateRemoteThread. However, due to the complex nature of the task and the security implications, it's important to note that this is not advisable without proper knowledge and caution. | |
Here's a simple example of how you might inject shellcode using C: | |
| |
```c | |
#include <windows.h> | |
#include <string.h> | |
| |
int main() { |