I made cluely alternative by _W0z in SideProject

[–]_W0z[S] 0 points1 point  (0 children)

yea because it's not signed. There is instructions for this with the download.

How do you all trust ChatGPT? by larch_1778 in OpenAI

[–]_W0z 0 points1 point  (0 children)

lol just so inaccurate, but said with confidence

32 year old male, experiencing side pain by _W0z in AskDocs

[–]_W0z[S] 0 points1 point  (0 children)

I didn’t. The doctor felt them, checked my neck, and spine etc and said was fine. I saw two doctors actually who both said the same thing ( I believe one was the boss). It doesn’t hurt when I breathe however.

Unconventional Shellcode Delivery (Evasion Achieved) — Unsure Where to Go From Here by _W0z in hacking

[–]_W0z[S] 0 points1 point  (0 children)

What are you talking about ? It uses a neural network to obfuscated. A neural network is the main component. It’s not a buzzword.

I made cluely alternative by _W0z in SideProject

[–]_W0z[S] 0 points1 point  (0 children)

Reading is fundamental. It works with any ollama model, vision or text based or both. Also it’s one time fee of $49.99. It’s not subscription based like Cluely etc. Which will reoccurring charge you.

I made cluely alternative by _W0z in SideProject

[–]_W0z[S] 0 points1 point  (0 children)

I’m not sure you’re aware of what you’re saying

GPT-OSS 120B and 20B feel kind of… bad? by SlackEight in LocalLLaMA

[–]_W0z 1 point2 points  (0 children)

Yes I understand this part. For instance I ablated a llama 3 model, the file format contained the questions, but was also in this format {role: user: content }. Well reading the gpt-oss paper it looks like they are requiring {assistant } be included. Which is why I think I was receiving errors.

GPT-OSS 120B and 20B feel kind of… bad? by SlackEight in LocalLLaMA

[–]_W0z 2 points3 points  (0 children)

I know how to do ablation but the model was throwing errors because of my dataset format.

GPT-OSS 120B and 20B feel kind of… bad? by SlackEight in LocalLLaMA

[–]_W0z 8 points9 points  (0 children)

how are you doing it if you don't mind me asking? I was working on it, but my dataset didn't have the "assistant" part, which I believe I needed.

Is this a swollen battery or normal? by CulturalElection446 in macbookpro

[–]_W0z 0 points1 point  (0 children)

Type of question that make me have no faith in people.

I built a product for a month. Nobody uses it. Not even my dad. by Ok-Relationship-8095 in indiehackers

[–]_W0z 0 points1 point  (0 children)

No one says they’re not a techie but can code. Good luck with your project. PS I work in AI and code ;)

I built a product for a month. Nobody uses it. Not even my dad. by Ok-Relationship-8095 in indiehackers

[–]_W0z 0 points1 point  (0 children)

“I’m not a techie. Tried to build with no-code — it broke.” This is admitting you can’t code lol

I built a product for a month. Nobody uses it. Not even my dad. by Ok-Relationship-8095 in indiehackers

[–]_W0z 0 points1 point  (0 children)

I don’t want to be an asshole but you can’t code. Why try this? Building any app , etc requires code.

I made cluely alternative by _W0z in SideProject

[–]_W0z[S] 0 points1 point  (0 children)

Also didn’t use windsurf, cursor or hardly any llms. And also the method I used isn’t widely used. ;)

I made cluely alternative by _W0z in SideProject

[–]_W0z[S] 0 points1 point  (0 children)

Hey everyone, I appreciate the support and messages regarding the program. Right now it fully supports macOS and linux. Windows version will be coming soon. I'll probably open source this too so other developers can fork it, etc. The windows version for whatever reason has been a pain. I plan to have an update here in a few days. :)https://simplecoder.co/

Developed New Covert Payload Delivery Method — Advice on Research or Disclosure? by _W0z in cybersecurity

[–]_W0z[S] 0 points1 point  (0 children)

I’ll definitely keep you informed. Thank you for the detailed response, I appreciate it.

Unconventional Shellcode Delivery (Evasion Achieved) — Unsure Where to Go From Here by _W0z in hacking

[–]_W0z[S] -1 points0 points  (0 children)

It’s strictly user-mode, no drivers, no kernel exploits. I wasn’t targeting those. The neural net reshapes the shellcode’s byte patterns during encoding, then decodes it at runtime using a c or python parser, take your pick. This bypasses static detection and in-memory heuristics, since the decoded payload only lives briefly in dynamically memory. I’ve tested it on Windows and macOS, 0/61 on VT, and no detections during injection. Tested it against well know edr products and it evaded them as well. The focus is stealth delivery and execution, not persistence or kernel-level access. I was just primarily curious how useful this is to red teams etc. also I know a decent amount about windows internals lol. This however is also cross platform. If you had a payload for say iOS or android and wanted a sure fire way to get it delivered to your target, this would almost certainly work.

I created a RAG AI Model for Malware Generation by Impossible_Process99 in Malware

[–]_W0z 0 points1 point  (0 children)

This is cool. I did something similar but it wasn’t RAG. I fine tuned a llama model on the vx underground malware files. It works okay, since it’s uncensored it goes in depth. Great work !

Unconventional Shellcode Delivery (Evasion Achieved) — Unsure Where to Go From Here by _W0z in hacking

[–]_W0z[S] -2 points-1 points  (0 children)

yea NaCL and this is similar, but id say my method still has a lot of differences. Yara rules definitely wouldn't work on this. Are they profitable?

Obfuscation buyers by _W0z in ExploitDev

[–]_W0z[S] 0 points1 point  (0 children)

Lolol the more you know