Skip to content

Instantly share code, notes, and snippets.

View chronikum's full-sized avatar
segmentation faulting

chronikum chronikum

segmentation faulting
View GitHub Profile
# Copyright (c) Meta Platforms, Inc. and affiliates.
# This software may be used and distributed according to the terms of the Llama 2 Community License Agreement.
PRESIGNED_URL="https://download.llamameta.net/*XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
TARGET_FOLDER="." # where all files should end up
mkdir -p ${TARGET_FOLDER}
# Setting this manually instead of prompting in cli
MODEL_SIZE="7B,7B-chat,13B,13B-chat"
@byt3bl33d3r
byt3bl33d3r / log4j_rce_check.py
Created December 10, 2021 06:02
Python script to detect if an HTTP server is potentially vulnerable to the log4j 0day RCE (https://www.lunasec.io/docs/blog/log4j-zero-day/)
#! /usr/bin/env python3
'''
Needs Requests (pip3 install requests)
Author: Marcello Salvati, Twitter: @byt3bl33d3r
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License)
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021.