Add example output
Browse files
README.md
CHANGED
@@ -70,6 +70,27 @@ For more details on llama.cpp implementation, refer to the [llama.cpp documentat
|
|
70 |
- Training Type: Instruction tuning
|
71 |
- Domain Focus: YARA rules, malware analysis, threat detection
|
72 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
73 |
## Intended Use
|
74 |
|
75 |
This model is designed to assist security professionals in:
|
|
|
70 |
- Training Type: Instruction tuning
|
71 |
- Domain Focus: YARA rules, malware analysis, threat detection
|
72 |
|
73 |
+
## Example Output
|
74 |
+
|
75 |
+
Here's an example of the model's YARA rule generation capabilities:
|
76 |
+
|
77 |
+
```yara
|
78 |
+
private rule Track_EXE_Files {
|
79 |
+
meta:
|
80 |
+
description = "Detects all EXE (Executable) files"
|
81 |
+
author = "ThreatFlux"
|
82 |
+
version = "1.0"
|
83 |
+
condition:
|
84 |
+
uint16(0) == 0x5A4D
|
85 |
+
}
|
86 |
+
```
|
87 |
+
|
88 |
+
The model provides detailed explanations of generated rules:
|
89 |
+
- Rule is marked private to prevent inclusion in final compiled rules
|
90 |
+
- Utilizes PE signature (MZ header) verification
|
91 |
+
- Includes condition logic explanation
|
92 |
+
- Provides technical details about hex values and their significance
|
93 |
+
|
94 |
## Intended Use
|
95 |
|
96 |
This model is designed to assist security professionals in:
|