ShadowEternity commited on
Commit
88b7d77
·
verified ·
1 Parent(s): 75cdd2d

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +16 -71
README.md CHANGED
@@ -1,6 +1,7 @@
1
  ---
2
- license: apache-2.0
3
- base_model: mistralai/Mistral-7B-Instruct-v0.2
 
4
  language:
5
  - en
6
  tags:
@@ -8,90 +9,34 @@ tags:
8
  - cyber security
9
  - hacking
10
  - mistral
11
- - instruct
12
  - finetune
 
 
 
13
  ---
14
  GGUF versions can be found at <a href="https://huggingface.co/segolilylabs/Lily-Cybersecurity-7B-v0.2-GGUF">https://huggingface.co/segolilylabs/Lily-Cybersecurity-7B-v0.2-GGUF</a>
15
 
16
- # Lily-Cybersecurity-7B-v0.2
17
-
18
- <img src="https://huggingface.co/segolilylabs/Lily-7B-Instruct-v0.2/resolve/main/lily-7b.png" width="500" />
19
- (image by Bryan Hutchins, created with DALL-E 3)
20
 
21
  ## Model description
 
22
 
23
- Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.
24
 
25
- The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
26
- - Advanced Persistent Threats (APT) Management
27
- - Architecture and Design
28
- - Business Continuity and Disaster Recovery
29
- - Cloud Security
30
- - Communication and Reporting
31
- - Cryptography and PKI
32
- - Data Analysis and Interpretation
33
- - Digital Forensics
34
- - GovernanceRiskand Compliance
35
- - Hacking
36
- - Identity and Access Management
37
- - Incident Management and Disaster Recovery Planning
38
- - Incident Response
39
- - Information Security Management and Strategy
40
- - Legal and Ethical Considerations
41
- - Malware Analysis
42
- - Network Security
43
- - Penetration Testing and Vulnerability Assessment
44
- - Physical Security
45
- - Regulatory Compliance
46
- - Risk Management
47
- - Scripting
48
- - Secure Software Development Lifecycle (SDLC)
49
- - Security in Emerging Technologies
50
- - Security Operations and Monitoring
51
- - Social Engineering and Human Factors
52
- - Software and Systems Security
53
- - Technologies and Tools
54
- - Threats Attacks and Vulnerabilities
55
 
56
  ## Training
57
 
58
- It took 24 hours to train 5 epochs on 1x A100.
59
-
60
- Prompt format:
61
-
62
- ```
63
- "### Instruction:
64
- You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.
65
-
66
- ### Input:
67
- Lily, how do evil twin wireless attacks work?
68
-
69
- ### Response:
70
- ```
71
-
72
- The response generated from the above prompt:
73
-
74
 
75
- > Oh, hello there! You know, it's great to dive into the depths of cybersecurity with you. So, you want to know about evil twin wireless attacks? Well, allow me to explain, my geeky friend!
76
- >
77
- > Evil twin attacks, also known as wireless masquerading, operate just like regular wireless access points (APs). Here's how it works: a nefarious individual sets up a new wireless AP with a signal and name that impersonate a legitimate network. They cleverly utilize the same SSID (Service Set Identifier) as the target network, so it tricks unsuspecting victims into connecting to this malicious AP instead.
78
- >
79
- > Once a victim unknowingly connects to the fake AP, the attacker gains access to their network traffic. They can observe, intercept, and even manipulate this data, making it a real headache for those concerned about network security. It's like having someone peeking into your private conversations! Not cool, right?
80
- >
81
- > But the attack doesn't end there. The imposter AP can also redirect the traffic directly through the attacker's computer, allowing them to perform other network-based attacks such as phishing, man-in-the-middle, or even DNS spoofing. It's like a whole cyber-playground for the bad guys!
82
- >
83
- > Now, how can we protect ourselves against these sneaky attackers? Well, my cyber-savvy companion, one effective method is the employment of WPA3 encryption. It adds an extra layer of security to wireless networks, making it much harder for attackers to intercept and manipulate our data.
84
- >
85
- > Additionally, monitoring your network activity is crucial. Keep an eye out for any unusual or unexpected connections and make sure you have the latest security updates for all your devices. Staying vigilant is key!
86
- >
87
- > So, remember this, my ethical cybersecurity pro: beware of impostors pretending to be your favorite networks, keep your security on point, and always be aware of the risks before you decide to indulge that free Wi-Fi offered by your local coffee shop! Stay safe and keep that cybersecurity game strong!
88
 
89
- <img src="https://huggingface.co/segolilylabs/Lily-7B-Instruct-v0.2/resolve/main/lily-chat1.png" width="800" />
90
 
 
91
 
92
  ## Limitations
93
- Lily is fine-tuned on top of Mistral-7B-Instruct-v0.2 as such she inherits many of the biases from that model.
94
 
95
- As with any model, Lily can make mistakes. Consider checking important information.
96
 
97
- Stay within the law and use ethically.
 
1
  ---
2
+ base_model:
3
+ - mistralai/Mistral-7B-Instruct-v0.2
4
+ - segolilylabs/Lily-Cybersecurity-7B-v0.2
5
  language:
6
  - en
7
  tags:
 
9
  - cyber security
10
  - hacking
11
  - mistral
 
12
  - finetune
13
+ - ctf
14
+ datasets:
15
+ - ShadowEternity/CTF-writeups
16
  ---
17
  GGUF versions can be found at <a href="https://huggingface.co/segolilylabs/Lily-Cybersecurity-7B-v0.2-GGUF">https://huggingface.co/segolilylabs/Lily-Cybersecurity-7B-v0.2-GGUF</a>
18
 
19
+ # CTF-Helper
 
 
 
20
 
21
  ## Model description
22
+ CTFsolver is a fine-tuned Mistral-7B model, originally adapted from Lily-Cybersecurity-7B-v0.2. This model is specifically trained to assist with Capture The Flag (CTF) challenges, providing detailed writeups, exploit generation, and cybersecurity solutions.
23
 
24
+ Built on top of Mistral-7B, it incorporates cybersecurity knowledge from Lily-Cybersecurity-7B-v0.2 and has been further fine-tuned on real-world CTF challenge solutions and security research papers.
25
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
26
 
27
  ## Training
28
 
29
+ CTFsolver has been fine-tuned on ShadowEternity's CTF-writeups dataset, containing:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
30
 
31
+ Publicly available CTF solutions
 
 
 
 
 
 
 
 
 
 
 
 
32
 
33
+ Cybersecurity blogs and research papers
34
 
35
+ CTF challenge walkthroughs from top security teams
36
 
37
  ## Limitations
38
+ Our model is fine-tuned on top of Lily-Cybersecurity which is finetuned from Mistral-7B-Instruct-v0.2 as such it inherits many of the biases from that model.
39
 
40
+ As with any model, It can make mistakes. Consider checking important information.
41
 
42
+ Stay within the law and use ethically.