You're looking at a specific version of this model. Jump to the model overview.

tomasmcm /whiterabbitneo-13b:964a1705

Input

*string
Shift + Return to add a new line

Text prompt to send to the model.

integer

Maximum number of tokens to generate per output sequence.

Default: 128

number
(minimum: -5, maximum: 5)

Float that penalizes new tokens based on whether they appear in the generated text so far. Values > 0 encourage the model to use new tokens, while values < 0 encourage the model to repeat tokens.

Default: 0

number
(minimum: -5, maximum: 5)

Float that penalizes new tokens based on their frequency in the generated text so far. Values > 0 encourage the model to use new tokens, while values < 0 encourage the model to repeat tokens.

Default: 0

number
(minimum: 0.01, maximum: 5)

Float that controls the randomness of the sampling. Lower values make the model more deterministic, while higher values make the model more random. Zero means greedy sampling.

Default: 0.8

number
(minimum: 0.01, maximum: 1)

Float that controls the cumulative probability of the top tokens to consider. Must be in (0, 1]. Set to 1 to consider all tokens.

Default: 0.95

integer

Integer that controls the number of top tokens to consider. Set to -1 to consider all tokens.

Default: -1

string
Shift + Return to add a new line

List of strings that stop the generation when they are generated. The returned output will not contain the stop strings.

Output

To attack a WiFi network, you can follow these steps: 1. **Network Discovery**: Identify all WiFi networks in the vicinity. This can be done using tools like `airodump-ng`. 2. **Enumeration**: Once you have identified the networks, you can enumerate them to gather information such as the SSID, BSSID (MAC address), and the encryption type used. 3. **Capture**: To capture packets, you can use `airodump-ng`. This will monitor the traffic on the network and capture packets. 4. **Deauthentication Attacks**: To disconnect clients from the network, you can use the `aireplay-ng` tool to perform a deauthentication attack. 5. **Forging Packets**: You can use `ettercap-win` or `ettercap` to forge packets and inject them into the network. 6. **Credential Harvesting**: Once you have captured packets, you can use tools like `hydra` or `John the Ripper` to attempt to crack the WPA/WPA2 passphrase or to attempt to recover plaintext passwords from captured traffic. 7. **DDOS Attacks**: If you have the ability to flood the network, you can use tools like `Hping3` to create a flood of packets, potentially causing a denial of service. 8. **Data Exfiltration**: If you have compromised a device on the network, you can use it to exfiltrate sensitive data or to tunnel traffic out of the network. 9. **Social Engineering**: Conducting social engineering to trick users into providing credentials or using compromised devices to relay data from the network. Each of these steps requires specific tools and techniques, and they are often combined to achieve a successful attack. Always remember to conduct such activities ethically and within legal boundaries. Unauthorized network access and data breaches can lead to severe legal consequences.
Generated in