ll3N1GmAll

Results 16 comments of ll3N1GmAll

I created this process to add ollama models to GPT4All: https://github.com/ll3N1GmAll/AI_GPT4All_Ollama_Models

Also, make sure the 'mysmb.py' script is in the same folder as your chosen exploit script.

This is still happening on Linux Mint 21 "timestamp":"2023-03-19T14:54:44.046+0000","rule":{"level":7,"description":"Host-based anomaly detection event (rootcheck).","id":"510","firedtimes":2,"mail":true,"groups":["ossec","rootcheck"],"gdpr":["IV_35.7.d"]},"agent":{"id":"027","name":"Mint21","ip":"192.168.1.19"},"manager":{"name":"secon-server-wazuh-manager"},"id":"1679237684.3782962","full_log":"Trojaned version of file '/usr/bin/diff' detected. Signature used: 'bash|^/bin/sh|file\\.h|proc\\.h|/dev/[^n]|^/bin/.*sh' (Generic).","decoder":{"name":"rootcheck"},"data":{"title":"Trojaned version of file detected.","file":"/usr/bin/diff"},"location":"rootcheck"}

Thanks for clarifying. Was I doing everything correctly though? Are there any methods of unhooking or bypassing CS in its current configuration?

I am seeing this when trying to launch a session on a Windows server 2012 R2 box. Tried encoded from CMD and obfuscated from PSH. Both respond the same as...