mradermacher/Llama-2-7b-chat-xgpt-GGUF
7B • Updated • 54
type stringclasses 1
value | custom_template null | created_at stringlengths 24 24 | id stringlengths 24 24 | slug stringlengths 2 124 | featured int64 0 1 | updated_at stringlengths 24 24 | visibility stringclasses 1
value | status stringclasses 2
values | feature_image stringclasses 7
values | published_at stringlengths 24 24 ⌀ | title stringlengths 2 127 | html stringlengths 4 358k ⌀ | plaintext stringlengths 1 82.3k ⌀ | mobiledoc stringlengths 99 369k | comment_id stringlengths 1 24 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
post | null | 2019-01-31T02:39:49.000Z | 63873b9a8b1c1e0007f52ee3 | v2-demo-post | 0 | 2019-02-15T07:20:06.000Z | public | draft | null | 2019-01-31T02:39:49.000Z | Koenig Demo Post | <p>Hey there! Welcome to the new Ghost editor - affectionately known as <strong>Koenig</strong>.</p><p>Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, ... | Hey there! Welcome to the new Ghost editor - affectionately known as Koenig.
Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, if that's what you prefer... | {"version":"0.3.1","atoms":[],"cards":[["hr",{}],["embed",{"url":"https://twitter.com/TryGhost/status/761119175192420352","html":"<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">Fun announcement coming this afternoon ? what could it be?</p>— Ghost (@TryGhost) <a href=\"https://twitter.com/TryGhost/... | 5c525ff5e604c8004fbbd5dd |
post | null | 2016-09-02T03:46:03.000Z | 63873b9a8b1c1e0007f52ee4 | conficker-domain-abuse | 0 | 2018-10-06T08:54:04.000Z | public | published | null | 2016-09-02T08:28:38.000Z | Conficker域名被滥用情况分析 | <!--kg-card-begin: markdown--><p>根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。</p>
<p>由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。</p>
<h2 id="conficker">Conficker域名现状及被滥用状况</h2>
<h3 id="conficker">Conficker简介</h3>
<p>Conficker是出现于2008年11... | 根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。
由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。
Conficker域名现状及被滥用状况
Conficker简介
Conficker是出现于2008年11月,曾感染了数百万台电脑。Conficker有一个独特的特性是它使用了DGA技术。利用随机生成的域名来防止网络设备的封堵。自此以后DGA技术也开始逐渐流行起来。关于con... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。\n\n由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。\n\n##Conficker域名现状及被滥用状况\n\n###Conficker... | 8 |
post | null | 2016-09-02T03:50:47.000Z | 63873b9a8b1c1e0007f52ee5 | cldap-is-now-the-3rd-reflection-amplified-ddos-attack-vector-surpassing-ssdp-and-chargen-en | 0 | 2021-05-08T05:10:18.000Z | public | published | null | 2017-11-01T10:14:35.000Z | CLDAP is Now the No.3 Reflection Amplified DDoS Attack Vector, Surpassing SSDP and CharGen | <!--kg-card-begin: markdown--><p>Author: Xu Yang,kenshin</p>
<p>With our <a href="https://ddosmon.net/">DDoSMon</a>, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection... | Author: Xu Yang,kenshin
With our DDoSMon, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection amplification attacks. They rank respectively 1st, 2nd, 3rd and 4th in th... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: Xu Yang,kenshin\n\n\nWith our [DDoSMon](https://ddosmon.net/), we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have b... | 12 |
post | null | 2016-09-02T06:44:58.000Z | 63873b9a8b1c1e0007f52ee6 | new-elknot-billgates-variant-with-xor-like-c2-configuration-encryption-scheme | 0 | 2018-10-06T08:53:33.000Z | public | published | null | 2016-09-02T07:46:45.000Z | New Elknot/Billgates Variant with XOR like C2 Configuration Encryption Scheme | <!--kg-card-begin: markdown--><h1 id="overview">Overview</h1>
<p>Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms <a href="https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf">[1]</a> <a href="http://blog.malwaremustdie.org/20... | Overview
Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [1] [2] [3] [4]. Multiple variants have been found since its first appearance, while the most infamous variant is called BillGates by many researchers because of its characteristic use of Bill and Gates modules [5]. Besid... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#Overview\nElknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [[1]](https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf) [[2... | 16 |
post | null | 2016-10-09T02:39:13.000Z | 63873b9a8b1c1e0007f52ee7 | invalid-rdata-in-dns | 0 | 2018-10-06T08:54:59.000Z | public | published | null | 2016-10-09T03:08:28.000Z | DNS中的“无效Rdata” | <!--kg-card-begin: markdown--><p>所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。</p>
<p>在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。</p>
<p>另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。</p>
<p>尽管还有很多其他... | 所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。
在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。
另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。
尽管还有很多其他类型的无效的rdata,但是相比IP地址来说,其他种类的数据影响较小。因此本文主要讨论IP地址。... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。\n\n在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。\n\n另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,... | 29 |
post | null | 2016-10-14T20:20:38.000Z | 63873b9a8b1c1e0007f52ee8 | a-quick-stats-on-the-608-083-mirai-ips-that-hit-our-honeypots-in-the-past-2-5-months | 0 | 2018-10-06T08:55:30.000Z | public | published | null | 2016-10-15T11:21:49.000Z | A quick stats on the 608,083 Mirai IPs that hit our honeypots in the past 2.5 months | <!--kg-card-begin: markdown--><p>Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, a... | Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, and TCP ports of 23 and 2323, whic... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investig... | 30 |
post | null | 2016-10-14T20:31:53.000Z | 63873b9a8b1c1e0007f52ee9 | new-mirai-variant-with-dga-chinese-version | 0 | 2020-08-11T03:52:24.000Z | public | published | null | 2016-12-12T04:10:57.000Z | Mirai 变种中的DGA | <!--kg-card-begin: markdown--><h3 id="">更新历史</h3>
<p>2016-12-09 首次发布<br>
2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误</p>
<h3 id="">概要</h3>
<p>两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。</p>
<blockquote>
<p><<a href="__GHOST_URL__/a-few-observations-of-the-new-mirai-variant-on-port-7547/">A Few Observations of Th... | 更新历史
2016-12-09 首次发布
2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误
概要
两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。
<A Few Observations of The New Mirai Variant on Port 7547>
我的同事Ye Genshen快速设置了一些蜜罐,并且很快取得收获:11月28日一天就捕获了11个样本。 迄今为止,我们的蜜罐已从6个托管服务器捕获了53个独立样本。
在分析其中一个新样本时,我的同事Qu Wenji发现一些类似DGA的代码,并猜测变种中包... | {"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"### 更新历史\n2016-12-09 首次发布\n2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误\n\n###概要\n\n两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。\n\n> <[A Few Observations of The New Mirai Variant on Port 7547](__GHOST_URL__/a-few-observations-... | 31 |
post | null | 2016-10-23T13:43:56.000Z | 63873b9a8b1c1e0007f52eea | a-dyn-twitter-ddos-event-report-and-mirai-botnet-review | 0 | 2018-10-06T08:55:47.000Z | public | published | null | 2016-10-23T14:21:21.000Z | 关于 dyn / twitter 受攻击情况的说明和 mirai 僵尸网络的回顾 | <!--kg-card-begin: markdown--><p>【更新记录】</p>
<p>2016-10-23 初始版本<br>
2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。</p>
<p>北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。</p>
<p>目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标... | 【更新记录】
2016-10-23 初始版本
2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。
北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。
目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标主要是Dynamic Network Services(dyn)公司,twitter、paypal、g... | {"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n【更新记录】\n\n2016-10-23 初始版本\n2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。\n\n\n北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,... | 32 |
post | null | 2016-10-27T15:41:40.000Z | 63873b9a8b1c1e0007f52eeb | a-mirai-botnet-c2-data-analysis | 0 | 2018-10-06T08:56:11.000Z | public | published | null | 2016-10-27T16:04:02.000Z | 关于 mirai 僵尸网络控制主机的数据分析 | "<!--kg-card-begin: markdown--><p>之前的文章中已经提及,我们的僵尸网络跟踪系统(...TRUNCATED) | "之前的文章中已经提及,我们的僵尸网络跟踪系统对mirai僵尸网络控制主机(...TRUNCATED) | "{\"version\":\"0.3.1\",\"markups\":[],\"atoms\":[],\"cards\":[[\"markdown\",{\"cardName\":\"card-ma(...TRUNCATED) | 33 |
post | null | 2016-11-29T03:32:51.000Z | 63873b9a8b1c1e0007f52eec | a-mirai-botnet-evolvement-new-variant-and-old-c2 | 0 | 2018-10-06T08:56:25.000Z | public | published | null | 2016-11-29T10:40:18.000Z | 德国电信断网:mirai僵尸网络的新变种和旧主控 | "<!--kg-card-begin: markdown--><p>【更新】</p>\n<ol>\n<li>2016-11-29 18:40:00 初始版本</li>\(...TRUNCATED) | "【更新】\n\n\n 1. 2016-11-29 18:40:00 初始版本\n 2. 2016-11-29 20:10:00 增加了对德国(...TRUNCATED) | "{\"version\":\"0.3.1\",\"markups\":[],\"atoms\":[],\"cards\":[[\"markdown\",{\"cardName\":\"card-ma(...TRUNCATED) | 34 |
This dataset card aims to be a base template for new datasets. It has been generated using this raw template.
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
BibTeX:
[More Information Needed]
APA:
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]
[More Information Needed]