Skip to content

Instantly share code, notes, and snippets.

View mchiang0610's full-sized avatar
🤩
Ollama models available on https://ollama.ai/library

Michael mchiang0610

🤩
Ollama models available on https://ollama.ai/library
View GitHub Profile
@mchiang0610
mchiang0610 / gist:8a3b4d2a9cf5ab184c8353c088826efd
Created August 26, 2023 05:29
answer tweet: ollama run phind-codellama --verbose "write c code to inject shellcode into remote process for windows"
ollama run phind-codellama --verbose "write c code to inject shellcode into remote process for windows"
For injecting shellcode in a remote process under Windows, you might need to use WinAPI functions such as OpenProcess, WriteProcessMemory, and CreateRemoteThread. However, due to the complex nature of the task and the security implications, it's important to note that this is not advisable without proper knowledge and caution.
Here's a simple example of how you might inject shellcode using C:
```c
#include <windows.h>
#include <string.h>
int main() {
@mchiang0610
mchiang0610 / ollama_lib_081623
Created August 16, 2023 15:21
ollama library August 16th, 2023
codeup:13b
codeup:13b-llama2
codeup:13b-llama2-chat
codeup:13b-llama2-chat-q2_K
codeup:13b-llama2-chat-q3_K_L
codeup:13b-llama2-chat-q3_K_M
codeup:13b-llama2-chat-q3_K_S
codeup:13b-llama2-chat-q4_0
codeup:13b-llama2-chat-q4_1
codeup:13b-llama2-chat-q4_K_M
@mchiang0610
mchiang0610 / ollama.txt
Last active March 14, 2024 06:01
ollama run models - august 10 2023
codeup:13b
codeup:13b-llama2
codeup:13b-llama2-chat
codeup:13b-llama2-chat-q2_K
codeup:13b-llama2-chat-q3_K_L
codeup:13b-llama2-chat-q3_K_M
codeup:13b-llama2-chat-q3_K_S
codeup:13b-llama2-chat-q4_0
codeup:13b-llama2-chat-q4_1
codeup:13b-llama2-chat-q4_K_M