File size: 1,535 Bytes
8fd90ab
 
3915045
8fd90ab
3915045
8fd90ab
3915045
 
8fd90ab
3915045
 
 
8fd90ab
3915045
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
---
license: mit
library_name: transformers
pipeline_tag: text-generation
base_model: google/gemma-2-9b
tags:
- llama-cpp
- gguf-my-repo
- cybersecurity
- ethicalhacking
- informationsecurity
- pentest
---

<img src="https://huggingface.co/AlicanKiraz0/SenecaLLM_x_gemma-2-9b-CyberSecurity-Q4/resolve/main/1736645606287.jpeg" width="1000" />

Curated and trained by Alican Kiraz

[![Linkedin](https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white)](https://tr.linkedin.com/in/alican-kiraz) 
![X (formerly Twitter) URL](https://img.shields.io/twitter/url?url=https%3A%2F%2Fx.com%2FAlicanKiraz0) 
![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UCEAiUT9FMFemDtcKo9G9nUQ) 

Links:
- Medium: https://alican-kiraz1.medium.com/
- Linkedin: https://tr.linkedin.com/in/alican-kiraz
- X: https://x.com/AlicanKiraz0
- YouTube: https://youtube.com/@alicankiraz0

SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use.

**It does not pursue any profit.**

Over time, it will specialize in the following areas:

- Incident Response
- Threat Hunting
- Code Analysis
- Exploit Development
- Reverse Engineering
- Malware Analysis

"Those who shed light on others do not remain in darkness..."