Update README.md
Browse files
README.md
CHANGED
@@ -1,51 +1,44 @@
|
|
1 |
-
---
|
2 |
-
|
3 |
-
|
4 |
-
|
5 |
-
|
6 |
-
|
7 |
-
|
8 |
-
|
9 |
-
|
10 |
-
|
11 |
-
|
12 |
-
|
13 |
-
|
14 |
-
|
15 |
-
|
16 |
-
|
17 |
-
|
18 |
-
|
19 |
-
|
20 |
-
|
21 |
-
|
22 |
-
|
23 |
-
|
24 |
-
|
25 |
-
|
26 |
-
|
27 |
-
|
28 |
-
|
29 |
-
|
30 |
-
|
31 |
-
|
32 |
-
|
33 |
-
|
34 |
-
|
35 |
-
|
36 |
-
|
37 |
-
|
38 |
-
|
39 |
-
|
40 |
-
|
41 |
-
|
42 |
-
|
43 |
-
|
44 |
-
|
45 |
-
```
|
46 |
-
./llama-cli --hf-repo AlicanKiraz0/SenecaLLM-x-QwQ-32B-Q8_0-GGUF --hf-file senecallm-x-qwq-32b-q8_0.gguf -p "The meaning to life and the universe is"
|
47 |
-
```
|
48 |
-
or
|
49 |
-
```
|
50 |
-
./llama-server --hf-repo AlicanKiraz0/SenecaLLM-x-QwQ-32B-Q8_0-GGUF --hf-file senecallm-x-qwq-32b-q8_0.gguf -c 2048
|
51 |
-
```
|
|
|
1 |
+
---
|
2 |
+
license: mit
|
3 |
+
base_model:
|
4 |
+
- Qwen/QwQ-32B
|
5 |
+
pipeline_tag: text-generation
|
6 |
+
library_name: transformers
|
7 |
+
tags:
|
8 |
+
- cybersecurity
|
9 |
+
- ethicalhacking
|
10 |
+
- informationsecurity
|
11 |
+
- pentest
|
12 |
+
- code
|
13 |
+
- applicationsecurity
|
14 |
+
---
|
15 |
+
|
16 |
+
<img src="https://huggingface.co/AlicanKiraz0/SenecaLLM-x-QwQ-32B-Q4_K_M-GGUF/resolve/main/QwQ-32B_x_Seneca_v1.4.png" width="1000" />
|
17 |
+
|
18 |
+
Finetuned by Alican Kiraz
|
19 |
+
|
20 |
+
[](https://tr.linkedin.com/in/alican-kiraz)
|
21 |
+

|
22 |
+

|
23 |
+
|
24 |
+
Links:
|
25 |
+
- Medium: https://alican-kiraz1.medium.com/
|
26 |
+
- Linkedin: https://tr.linkedin.com/in/alican-kiraz
|
27 |
+
- X: https://x.com/AlicanKiraz0
|
28 |
+
- YouTube: https://youtube.com/@alicankiraz0
|
29 |
+
|
30 |
+
With the release of the new Qwen QwQ-32B, I quickly began training SenecaLLM v1.4 based on this model. During training:
|
31 |
+
* About 30 hours on BF16 with 4×H200
|
32 |
+
|
33 |
+
|
34 |
+
**It does not pursue any profit.**
|
35 |
+
|
36 |
+
With the new dataset I’ve prepared, it can produce quite good outputs in the following areas:
|
37 |
+
* Information Security v1.5
|
38 |
+
* Incident Response v1.3.1
|
39 |
+
* Threat Hunting v1.3.2
|
40 |
+
* Ethical Exploit Development v2.0
|
41 |
+
* Purple Team Tactics v1.3
|
42 |
+
* Reverse Engineering v2.0
|
43 |
+
|
44 |
+
"Those who shed light on others do not remain in darkness..."
|
|
|
|
|
|
|
|
|
|
|
|
|
|