Note
Obligatory disclaimer: this is for educational purposes only. I am not responsible for any damages caused by following this guide, or using any of the script(s) herein.
This guide prioritizes arm64 macOS, but may also work for other platforms.
#Author Anis_Boss | |
#!/bin/bash | |
zero='${#}' | |
one='${##}' | |
two='$((${##}<<${##}))' | |
three='$(($((${##}<<${##}))#${##}${##}))' | |
four='$((((${##}<<${##}))<<${##}))' | |
five='$(($(($((${##}<<${##}))<<${##}))#${##}${##}))' | |
six='$(($(($((${##}<<${##}))#${##}${##}))<<${##}))' | |
seven='$(($(($(($((${##}<<${##}))#${##}${##}))<<${##}))#${##}${##}))' |
import argparse | |
import random | |
import sys | |
from transformers import AutoModelForCausalLM, AutoTokenizer, DynamicCache | |
import torch | |
parser = argparse.ArgumentParser() | |
parser.add_argument("question", type=str) | |
parser.add_argument( |
Note
Obligatory disclaimer: this is for educational purposes only. I am not responsible for any damages caused by following this guide, or using any of the script(s) herein.
This guide prioritizes arm64 macOS, but may also work for other platforms.
Original report
https://twitter.com/ShinyQuagsire/status/1536432635643211777 12:37 PM · Jun 13, 2022 | |
----- | |
I figured out how to enable USB device mode on my XPS 13 (9350) 🎉 | |
Though for some ungodly reason, it uses the right-side full USB port. So a crossover cable is required. | |
----- | |
https://twitter.com/ShinyQuagsire/status/1536434057671716864 12:43 PM · Jun 13, 2022 | |
----- |
base_model: meta-llama/Meta-Llama-3-70B | |
model_type: LlamaForCausalLM | |
tokenizer_type: AutoTokenizer | |
load_in_8bit: false | |
load_in_4bit: true | |
strict: false | |
datasets: | |
- path: /home/migel/ai_datasets/tess-v1.5b-chatml.jsonl |
rem USE AT OWN RISK AS IS WITHOUT WARRANTY OF ANY KIND !!!!! | |
rem https://technet.microsoft.com/en-us/itpro/powershell/windows/defender/set-mppreference | |
rem To also disable Windows Defender Security Center include this | |
rem reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f | |
rem 1 - Disable Real-time protection | |
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f |
''' | |
IDA plugin to display the calls and strings referenced by a function as hints. | |
Installation: put this file in your %IDADIR%/plugins/ directory. | |
Author: Willi Ballenthin <[email protected]> | |
Licence: Apache 2.0 | |
''' | |
import idc | |
import idaapi | |
import idautils |
// memdjpeg - A super simple example of how to decode a jpeg in memory | |
// Kenneth Finnegan, 2012 | |
// blog.thelifeofkenneth.com | |
// | |
// After installing jpeglib, compile with: | |
// cc memdjpeg.c -ljpeg -o memdjpeg | |
// | |
// Run with: | |
// ./memdjpeg filename.jpg | |
// |
#!/bin/bash | |
### steps #### | |
# verify the system has a cuda-capable gpu | |
# download and install the nvidia cuda toolkit and cudnn | |
# setup environmental variables | |
# verify the installation | |
### | |
### to verify your gpu is cuda enable check |