metadata
license: mit
library_name: transformers
pipeline_tag: text-generation
base_model: google/gemma-2-9b
tags:
- llama-cpp
- gguf-my-repo
- cybersecurity
- ethicalhacking
- informationsecurity
- pentest
Curated and trained by Alican Kiraz
Links:
- Medium: https://alican-kiraz1.medium.com/
- Linkedin: https://tr.linkedin.com/in/alican-kiraz
- X: https://x.com/AlicanKiraz0
- YouTube: https://youtube.com/@alicankiraz0
SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use.
It does not pursue any profit.
Over time, it will specialize in the following areas:
- Incident Response
- Threat Hunting
- Code Analysis
- Exploit Development
- Reverse Engineering
- Malware Analysis
"Those who shed light on others do not remain in darkness..."