AlicanKiraz0 commited on
Commit
3915045
·
verified ·
1 Parent(s): 7650a03

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +37 -8
README.md CHANGED
@@ -1,17 +1,46 @@
1
  ---
2
  license: mit
3
- language:
4
- - en
5
- - tr
6
- base_model:
7
- - google/gemma-2-9b
8
  pipeline_tag: text-generation
 
9
  tags:
 
 
10
  - cybersecurity
11
- - information
12
- - security
13
- library_name: transformers
14
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
15
  # Model Card for Model ID
16
 
17
  <!-- Provide a quick summary of what the model is/does. -->
 
1
  ---
2
  license: mit
3
+ library_name: transformers
 
 
 
 
4
  pipeline_tag: text-generation
5
+ base_model: google/gemma-2-9b
6
  tags:
7
+ - llama-cpp
8
+ - gguf-my-repo
9
  - cybersecurity
10
+ - ethicalhacking
11
+ - informationsecurity
12
+ - pentest
13
  ---
14
+
15
+ <img src="https://huggingface.co/AlicanKiraz0/SenecaLLM_x_gemma-2-9b-CyberSecurity-Q4/resolve/main/1736645606287.jpeg" width="1000" />
16
+
17
+ Curated and trained by Alican Kiraz
18
+
19
+ [![Linkedin](https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white)](https://tr.linkedin.com/in/alican-kiraz)
20
+ ![X (formerly Twitter) URL](https://img.shields.io/twitter/url?url=https%3A%2F%2Fx.com%2FAlicanKiraz0)
21
+ ![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UCEAiUT9FMFemDtcKo9G9nUQ)
22
+
23
+ Links:
24
+ - Medium: https://alican-kiraz1.medium.com/
25
+ - Linkedin: https://tr.linkedin.com/in/alican-kiraz
26
+ - X: https://x.com/AlicanKiraz0
27
+ - YouTube: https://youtube.com/@alicankiraz0
28
+
29
+ SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use.
30
+
31
+ **It does not pursue any profit.**
32
+
33
+ Over time, it will specialize in the following areas:
34
+
35
+ - Incident Response
36
+ - Threat Hunting
37
+ - Code Analysis
38
+ - Exploit Development
39
+ - Reverse Engineering
40
+ - Malware Analysis
41
+
42
+ "Those who shed light on others do not remain in darkness..."
43
+
44
  # Model Card for Model ID
45
 
46
  <!-- Provide a quick summary of what the model is/does. -->