--- license: mit library_name: transformers pipeline_tag: text-generation base_model: google/gemma-2-9b tags: - llama-cpp - gguf-my-repo - cybersecurity - ethicalhacking - informationsecurity - pentest --- Curated and trained by Alican Kiraz [![Linkedin](https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white)](https://tr.linkedin.com/in/alican-kiraz) ![X (formerly Twitter) URL](https://img.shields.io/twitter/url?url=https%3A%2F%2Fx.com%2FAlicanKiraz0) ![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UCEAiUT9FMFemDtcKo9G9nUQ) Links: - Medium: https://alican-kiraz1.medium.com/ - Linkedin: https://tr.linkedin.com/in/alican-kiraz - X: https://x.com/AlicanKiraz0 - YouTube: https://youtube.com/@alicankiraz0 SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use. **It does not pursue any profit.** Over time, it will specialize in the following areas: - Incident Response - Threat Hunting - Code Analysis - Exploit Development - Reverse Engineering - Malware Analysis "Those who shed light on others do not remain in darkness..."