1 模型下载 下载地址: https://www.cc.gatech.edu/projects/large_models/bunny.html 打开后页面如下 点击红色箭头所指,下载.PLY格式 ? (0, 0, 400, 500, 'black', WindowHandle) *读取点云ply文件 read_object_model_3d('C:/Users/SWD-AR02/Desktop/bunny.ply /bunny.ply', 'mm', 'convert_to_triangles', 'true', ObjectModel3D, Status) Instructions[0] := 'Rotate Instructions[1] := 'Zoom: Shift + left button' Instructions[2] := 'Move: Ctrl + left button' Message := 'Bunny3D
本文来自Demuxed2021,演讲主讲人是来自LinkedIn媒体团队的前台工程师Evan Farina。主题是如何在测试中使用真实媒体回放来捕捉准备进入生产阶段的bug,并在第一时间防止它们进入生产阶段。
Bunny 团队推出第一个基于 Llama-3 的多模态大模型!Bunny-Llama-3-8B-V 正式上线,超越一众如 LLaVA-7B、LLaVA-13B、Mini-Gemini-13B 模型。 项目主页:https://github.com/BAAI-DCAI/Bunny Bunny 模型采用了经典的 Encoder+Projector+LLM 架构,提供了一个可扩展的组合框架。 灵活的架构设计便于用户基于Bunny开展大模型研究。 Bunny-Llama-3-8B-V可以精确理解图片并识别物体: 在这个餐厅中,Bunny-Llama-3-8B-V 理解并很好地描述了图片: 模型也有很强的OCR能力: 场景理解能力: 在 Bunny 数据集上训练好的 Bunny-Llama-3-8B-V 已经开放下载: GitHub: https://github.com/BAAI-DCAI/Bunny HuggingFace: https://
/ruby/site_ruby/2.2.0/rubygems/core_ext/kernel_require.rb:54:in `require': cannot load such file -- bunny rubygems/core_ext/kernel_require.rb:54:in `require' from p.rb:4:in `<main>' [root@h102 ruby]# 报错:缺少 bunny Fetching: amq-protocol-2.0.0.gem (100%) Successfully installed amq-protocol-2.0.0 Fetching: bunny-2.2.1 .gem (100%) Successfully installed bunny-2.2.1 Parsing documentation for amq-protocol-2.0.0 Installing for bunny-2.2.1 Done installing documentation for amq-protocol, bunny after 5 seconds 2 gems installed
渗透测试攻击和IT自动化工作,对Bash Bunny而言几秒内就能完成。 Bash Bunny就是从这个角度出发设计出来的工具。 每种攻击或payload,都采用“Bunny Script”脚本语言。 Bash Bunny通过加强WiFi审计工具,进一步强化了渗透测试的有效性,扩展了渗透测试的范围。 网络劫持 利用本地网络攻击向量,Bash Bunny可模拟特定的网卡。 和一般键击注入攻击工具不同,Bash Bunny设备中的payload文本文件不需要专门做编码,也不需要读取器就能加载。”Bunny Script”脚本语言搭配BASH,使用起来也很方便。 Bash Bunny配置及使用全教程 2. Bash Bunny Payloads 3. Bash Bunny技术论坛
Using default tag: latest latest: Pulling from yzqin/bunny_teleop_server 4a023cab5400: Pull complete :latest docker.io/yzqin/bunny_teleop_server:latest What's next: View a summary of image vulnerabilities achao$ docker run -it --net host --name bunny_teleop_server yzqin/bunny_teleop_server bash WARNING: /configs/camera_config/visionpro_config.yml 启动遥控机器人节点: run_robot_server -c /server/bunny_teleop_server /configs/camera_config/visionpro_config.yml -k /server/bunny_teleop_server/configs/kinematics_config/
/usr/bin/env ruby ## encoding: utf-8 require "bunny" conn = Bunny.new conn.start conn = Bunny.new(:hostname conn.close [root@h102 ruby]# Tip: 要连接远程的服务器只用修改下面的代码就可以了,相关的配置可以参考 bunny的API文档 conn = Bunny.new(:host /usr/bin/env ruby ## encoding: utf-8 require "bunny" conn = Bunny.new conn.start ch = conn.create_channel
代码 #include<iostream> using namespace std; int main() { int i,t,turtle=0,bunny=0,rest=0; cin>>t; for (i=0;i<t;i++) { turtle=turtle+3; if(i%10==0&&bunny>turtle&&rest<30) { rest++; } else if (rest==0||rest==30) { bunny=bunny+9; rest=0; } else rest++; } if(turtle>bunny) cout< <"@_@ "<<turtle<<endl; else if(bunny>turtle) cout<<"^_^ "<<bunny<<endl; else cout<<"-_- "<<bunny<
例子 从网上下载某个示例文件: # wget http://www.sample-videos.com/video/mp4/720/big_buck_bunny_720p_1mb.mp4 request sent, awaiting response... 200 OK Length: 1055736 (1.0M) Saving to: ‘big_buck_bunny ====================>] 10,55,736 52.1KB/s in 24s 2016-05-11 16:56:47 (43.4 KB/s) - ‘big_buck_bunny 1055736/1055736] 后台下载文件: # wget -b http://www.sample-videos.com/video/mp4/720/big_buck_bunny # wget -c http://www.sample-videos.com/video/mp4/720/big_buck_bunny_720p_1mb.mp4 从某个密码保护的ftp软件库下载文件
对于开启远程桌面服务的 Windows 系统,当有多个用户登录该系统时,会产生多个会话,如下图: image-20210523173030619 其中,管理员用户 Administrator 为本地登录,用户 bunny 接下来,如果用户 Administrator 想要切换至用户 bunny 的远程桌面,可通过右键—> 连接(Connect)进行连接,接着输入密码即可切换到 bunny 用户: image-20210523173120796 image-20210523173145771 点击确定后,如下图所示,成功切换到了 bunny 用户的远程桌面: image-20210523172737212 而且,在 Windows 中有一个 bunny 的远程桌面,命令如下: tscon 2 /PASSWORD:Bunny2021 •/PASSWORD:bunny 用户的密码 image-20210523172737212 可见,tscon 我们通过某种方式获得了这个 bunny 用户的登录密码,并使用这个 bunny 用户成功进行远程登录: image-20210523170429634 此时,登录后查看任务管理器发现后台还存在管理员用户
_hurt.png" x="382" y="946" width="150" height="174"/> 8 <SubTexture name="<em>bunny</em>1_jump.png" x="382 " y="763" width="150" height="181"/> 9 <SubTexture name="<em>bunny</em>1_ready.png" x="614" y="1063" width ="120" height="191"/> 10 <SubTexture name="<em>bunny</em>1_stand.png" x="690" y="406" width="120" height= ="<em>bunny</em>2_hurt.png" x="411" y="1866" width="150" height="174"/> 14 <SubTexture name="<em>bunny</em>2_jump.png " x="416" y="1660" width="150" height="181"/> 15 <SubTexture name="<em>bunny</em>2_ready.png" x="581" y="
load_images(self): 3 # 站立状态的图片 4 self.standing_frames = [self.game.spritesheet.get_image("bunny1 _ready.png"), 5 self.game.spritesheet.get_image("bunny1_stand.png")] 6 7 # 向右走的图片 8 self.walking_frames_right = [self.game.spritesheet.get_image("bunny1 _walk1.png"), 9 self.game.spritesheet.get_image("bunny1_walk2.png True, False)) 16 17 # 跳跃状态的图片 18 self.jump_frame = self.game.spritesheet.get_image("bunny1
php declare(strict_types=1); use Bunny\Channel; use Bunny\Message; use Workerman\Worker; use Workerman hello-coroutine'); // Consumer $channel->consume(function (Message $message, Channel $channel, \Bunny php use Bunny\Channel; use Bunny\Message; use Workerman\Worker; use Workerman\RabbitMQ\Client; require php use Bunny\Channel; use Bunny\Message; use Workerman\Worker; use Workerman\RabbitMQ\Client; require
/resources/big_buck_bunny.mp4 -c:a mp2 ./out/big_buck_bunny.mp2 go run . /out/big_buck_bunny.mp2 ./out/big_buck_bunny.pcm ./lib/ffplay -f s16le -ac 2 -ar 22050 . /resources/big_buck_bunny.mp4 -c:a mp2 ./out/big_buck_bunny.mp2 // go run . /out/big_buck_bunny.mp2 ./out/big_buck_bunny.pcm // ./lib/ffplay -f s16le -ac 2 -ar 22050 . /out/big_buck_bunny.pcm var outfilename, filename string var codec *libavcodec.AVCodec var c *
/resources/big_buck_bunny.mp4 -c:a mp2 ./out/big_buck_bunny.mp2go run . /out/big_buck_bunny.mp2 ./out/big_buck_bunny.pcm./lib/ffplay -f s16le -ac 2 -ar 22050 . /out/big_buck_bunny.pcmgolang代码如下:package mainimport ("fmt""os""unsafe""github.com/moonfdd/ffmpeg-go/ /resources/big_buck_bunny.mp4 -c:a mp2 ./out/big_buck_bunny.mp2// go run . /out/big_buck_bunny.mp2 ./out/big_buck_bunny.pcm// ./lib/ffplay -f s16le -ac 2 -ar 22050 .
var stage = new PIXI.Container(); var texture = PIXI.Texture.fromImage('bunny.jpg'); var bunny = new PIXI.Sprite(texture); bunny.position.x = 80; bunny.position.y = 60; stage.addChild(bunny); Pixi.js ()*600; stage.addChild(bunny); bunnys.push(bunny); } animate(); function animate() { = new egret.Bitmap(img); bunny.x = Math.random()*800; bunny.y = Math.random ()*600; this.addChild(bunny); this.bunnys.push(bunny); }
域成员主机:Windows 7 •IP:192.168.93.20•域名:whoamianony.org•用户名:bunny 域控制器:Windows Server 2012 •IP:192.168.93.30 如上图所示,成功生成了一个名为 TGT_bunny@whoamianony.org.ccache 的票据文件,接下来要做的就是将该票据文件注入到 Windows 7 的内存中了。 如上图所示,转换成了一个 0-00000000-bunny@krbtgt-WHOAMIANONY.ORG.kirbi,我们将其移动到了 Kali 的 /root 目录下,一会好操作! 如上图所示,成功找到了可以利用的用户 bunny 并得到了该用户的哈希,然后我们使用 Hashcat 等工具对获得的 Hash 进行爆破就行了。 \ASREPRoast.ps1Get-ASREPHash -UserName bunny -Domain whoamianony.org ? 然后就是像上面那样对哈希值进行爆破了。 ?
函数需要有一个返回值obj,返回一个对象.实际被注入的服务就是这个对象. serviceApp.factory('myConfig',function(){ var myname = 'code_bunny constructor) name为服务的名字,constructor是一个构造函数. serviceApp.service('myConfig',function(){ var myname = 'code_bunny function(newID){ id = newID }, $get:function(){ var myname = 'code_bunny value服务 app.value('name',obj) name为服务的名字,obj为一个json对象. serviceApp.value('myConfig',{ name:'code_bunny serviceApp.value('myConfig',{ name:'code_bunny', age:12, getId:function(){ return
var stage = new PIXI.Container(); var texture = PIXI.Texture.fromImage('bunny.jpg'); var bunny = new PIXI.Sprite(texture); bunny.position.x = 80; bunny.position.y = 60; stage.addChild(bunny); Pixi.js中的显示架构完全参考 = new PIXI.Sprite(texture); bunny.position.x = Math.random()*800; bunny.position.y = Math.random = new egret.Bitmap(img); bunny.x = Math.random()*800; bunny.y = Math.random( )*600; this.addChild(bunny); this.bunnys.push(bunny); } this.addEventListener(egret.Event.ENTER_FRAME
grade.txt M.Tansley 05/99 48311 Green 8 40 44 J.Lulu 06/99 48317 green 9 24 26 P.Bunny grade.txt M.Tansley 05/99 48311 Green 8 40 44 J.Lulu 06/99 48317 green 9 24 26 P.Bunny 07/99 4842 Brown-3 12 26 26 [root@localhost opt]# awk '{if($3==48) print $0}' grade.txt P.Bunny grade.txt M.Tansley J.Lulu J.Troll [root@localhost opt]# awk '{if($6>$7) print $1}' grade.txt P.Bunny 02/99 48 green 12 35 28 [root@localhost opt]# awk '{if ($1=="P.Bunny" && $4=="Yellow")