AlicanKiraz0
commited on
Update README.md
Browse files
README.md
CHANGED
@@ -1,17 +1,46 @@
|
|
1 |
---
|
2 |
license: mit
|
3 |
-
|
4 |
-
- en
|
5 |
-
- tr
|
6 |
-
base_model:
|
7 |
-
- google/gemma-2-9b
|
8 |
pipeline_tag: text-generation
|
|
|
9 |
tags:
|
|
|
|
|
10 |
- cybersecurity
|
11 |
-
-
|
12 |
-
-
|
13 |
-
|
14 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15 |
# Model Card for Model ID
|
16 |
|
17 |
<!-- Provide a quick summary of what the model is/does. -->
|
|
|
1 |
---
|
2 |
license: mit
|
3 |
+
library_name: transformers
|
|
|
|
|
|
|
|
|
4 |
pipeline_tag: text-generation
|
5 |
+
base_model: google/gemma-2-9b
|
6 |
tags:
|
7 |
+
- llama-cpp
|
8 |
+
- gguf-my-repo
|
9 |
- cybersecurity
|
10 |
+
- ethicalhacking
|
11 |
+
- informationsecurity
|
12 |
+
- pentest
|
13 |
---
|
14 |
+
|
15 |
+
<img src="https://huggingface.co/AlicanKiraz0/SenecaLLM_x_gemma-2-9b-CyberSecurity-Q4/resolve/main/1736645606287.jpeg" width="1000" />
|
16 |
+
|
17 |
+
Curated and trained by Alican Kiraz
|
18 |
+
|
19 |
+
[![Linkedin](https://img.shields.io/badge/LinkedIn-0077B5?style=for-the-badge&logo=linkedin&logoColor=white)](https://tr.linkedin.com/in/alican-kiraz)
|
20 |
+
![X (formerly Twitter) URL](https://img.shields.io/twitter/url?url=https%3A%2F%2Fx.com%2FAlicanKiraz0)
|
21 |
+
![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UCEAiUT9FMFemDtcKo9G9nUQ)
|
22 |
+
|
23 |
+
Links:
|
24 |
+
- Medium: https://alican-kiraz1.medium.com/
|
25 |
+
- Linkedin: https://tr.linkedin.com/in/alican-kiraz
|
26 |
+
- X: https://x.com/AlicanKiraz0
|
27 |
+
- YouTube: https://youtube.com/@alicankiraz0
|
28 |
+
|
29 |
+
SenecaLLM has been trained and fine-tuned for nearly one month—around 100 hours in total—using various systems such as 1x4090, 8x4090, and 3xH100, focusing on the following cybersecurity topics. Its goal is to think like a cybersecurity expert and assist with your questions. It has also been fine-tuned to counteract malicious use.
|
30 |
+
|
31 |
+
**It does not pursue any profit.**
|
32 |
+
|
33 |
+
Over time, it will specialize in the following areas:
|
34 |
+
|
35 |
+
- Incident Response
|
36 |
+
- Threat Hunting
|
37 |
+
- Code Analysis
|
38 |
+
- Exploit Development
|
39 |
+
- Reverse Engineering
|
40 |
+
- Malware Analysis
|
41 |
+
|
42 |
+
"Those who shed light on others do not remain in darkness..."
|
43 |
+
|
44 |
# Model Card for Model ID
|
45 |
|
46 |
<!-- Provide a quick summary of what the model is/does. -->
|