|
--- |
|
license: mit |
|
library_name: transformers |
|
pipeline_tag: text-generation |
|
base_model: google/gemma-2-9b |
|
tags: |
|
- llama-cpp |
|
- gguf-my-repo |
|
- cybersecurity |
|
- ethicalhacking |
|
- informationsecurity |
|
- pentest |
|
--- |
|
|
|
<img src="https://huggingface.co/AlicanKiraz0/SenecaLLM_x_gemma-2-9b-CyberSecurity-Q4/resolve/main/1736645606287.jpeg" width="1000" /> |
|
|
|
Curated and trained by Alican Kiraz |
|
|
|
[![Linkedin](https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white)](https://tr.linkedin.com/in/alican-kiraz) |
|
![X (formerly Twitter) URL](https://img.shields.io/twitter/url?url=https%3A%2F%2Fx.com%2FAlicanKiraz0) |
|
![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UCEAiUT9FMFemDtcKo9G9nUQ) |
|
|
|
Links: |
|
- Medium: https://alican-kiraz1.medium.com/ |
|
- Linkedin: https://tr.linkedin.com/in/alican-kiraz |
|
- X: https://x.com/AlicanKiraz0 |
|
- YouTube: https://youtube.com/@alicankiraz0 |
|
|
|
SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use. |
|
|
|
**It does not pursue any profit.** |
|
|
|
Over time, it will specialize in the following areas: |
|
|
|
- Incident Response |
|
- Threat Hunting |
|
- Code Analysis |
|
- Exploit Development |
|
- Reverse Engineering |
|
- Malware Analysis |
|
|
|
"Those who shed light on others do not remain in darkness..." |
|
|