XuanwuLab / llama.cpp_deepseekLinks
☆17Updated 8 months ago
Alternatives and similar repositories for llama.cpp_deepseek
Users that are interested in llama.cpp_deepseek are comparing it to the libraries listed below
Sorting:
- Watermark For Text☆22Updated 8 months ago
- ☆110Updated last year
- linux kernel internals research details☆45Updated last year
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆22Updated last year
- transformer安全相关☆32Updated last year
- ☆17Updated 5 years ago
- ☆48Updated 3 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆36Updated 3 months ago
- awesome resources about 5G security 🐿☆17Updated 3 years ago
- Simple PoC causing overflow☆19Updated 2 years ago
- ☆19Updated 4 years ago
- fastjson rce env based on springboot☆40Updated 4 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆75Updated 2 years ago
- 网络包测试工具☆45Updated last year
- ☆83Updated 3 years ago
- Go语言,不允许import,请开始你的表演☆63Updated 3 years ago
- CVE-2022-0185 POC and Docker and Analysis write up☆38Updated 3 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Updated 7 months ago
- schemeflood demo☆51Updated 4 years ago
- 探究底层机制:二进制安全☆35Updated 2 years ago
- CLI tool for tracking dependents repositories and sorting result by Stars ⭐☆43Updated last year
- translate OWASP project into Chinese,and some document☆17Updated 7 years ago
- ☆25Updated 3 years ago
- Docker 逃逸 Release Agent 利用始末☆68Updated 3 years ago
- collections of container escape techniques 🐿☆73Updated 4 years ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆19Updated 3 months ago
- Here is Hacking-Group-0872-Slide☆33Updated last year
- Learning eBPF from zero to hero☆37Updated last year
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆33Updated 3 months ago
- WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execu…☆96Updated last year