|
7499 | 7499 | - filename: ArliAI_QwQ-32B-ArliAI-RpR-v4-Q4_K_M.gguf
|
7500 | 7500 | sha256: fd67ca1e792efb25129cbd17b9b0f5c410dd963f17234828686928d21039b585
|
7501 | 7501 | uri: huggingface://bartowski/ArliAI_QwQ-32B-ArliAI-RpR-v4-GGUF/ArliAI_QwQ-32B-ArliAI-RpR-v4-Q4_K_M.gguf
|
| 7502 | +- !!merge <<: *qwen25 |
| 7503 | + name: "whiterabbitneo_whiterabbitneo-v3-7b" |
| 7504 | + icon: https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-V3-7B/resolve/main/whiterabbitneo-logo-defcon.png |
| 7505 | + urls: |
| 7506 | + - https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-V3-7B |
| 7507 | + - https://huggingface.co/bartowski/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-GGUF |
| 7508 | + description: | |
| 7509 | + A LLM model focused on security. |
| 7510 | + Topics Covered: |
| 7511 | + |
| 7512 | + - Open Ports: Identifying open ports is crucial as they can be entry points for attackers. Common ports to check include HTTP (80, 443), FTP (21), SSH (22), and SMB (445). |
| 7513 | + - Outdated Software or Services: Systems running outdated software or services are often vulnerable to exploits. This includes web servers, database servers, and any third-party software. |
| 7514 | + - Default Credentials: Many systems and services are installed with default usernames and passwords, which are well-known and can be easily exploited. |
| 7515 | + - Misconfigurations: Incorrectly configured services, permissions, and security settings can introduce vulnerabilities. |
| 7516 | + - Injection Flaws: SQL injection, command injection, and cross-site scripting (XSS) are common issues in web applications. |
| 7517 | + - Unencrypted Services: Services that do not use encryption (like HTTP instead of HTTPS) can expose sensitive data. |
| 7518 | + - Known Software Vulnerabilities: Checking for known vulnerabilities in software using databases like the National Vulnerability Database (NVD) or tools like Nessus or OpenVAS. |
| 7519 | + - Cross-Site Request Forgery (CSRF): This is where unauthorized commands are transmitted from a user that the web application trusts. |
| 7520 | + - Insecure Direct Object References: This occurs when an application provides direct access to objects based on user-supplied input. |
| 7521 | + - Security Misconfigurations in Web Servers/Applications: This includes issues like insecure HTTP headers or verbose error messages that reveal too much information. |
| 7522 | + - Broken Authentication and Session Management: This can allow attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities. |
| 7523 | + - Sensitive Data Exposure: Includes vulnerabilities that expose sensitive data, such as credit card numbers, health records, or personal information. |
| 7524 | + - API Vulnerabilities: In modern web applications, APIs are often used and can have vulnerabilities like insecure endpoints or data leakage. |
| 7525 | + - Denial of Service (DoS) Vulnerabilities: Identifying services that are vulnerable to DoS attacks, which can make the resource unavailable to legitimate users. |
| 7526 | + - Buffer Overflows: Common in older software, these vulnerabilities can allow an attacker to crash the system or execute arbitrary code. |
| 7527 | + - More .. |
| 7528 | + overrides: |
| 7529 | + parameters: |
| 7530 | + model: WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf |
| 7531 | + files: |
| 7532 | + - filename: WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf |
| 7533 | + sha256: 584bfc1f4c160928842866c566129f9789c4671af8e51a9e36ba0ebf10f24f41 |
| 7534 | + uri: huggingface://bartowski/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-GGUF/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf |
7502 | 7535 | - &llama31
|
7503 | 7536 | url: "github:mudler/LocalAI/gallery/llama3.1-instruct.yaml@master" ## LLama3.1
|
7504 | 7537 | icon: https://avatars.githubusercontent.com/u/153379578
|
|
0 commit comments