File size: 3,361 Bytes
55889a5 477c34f 55889a5 477c34f 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 760da69 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 55889a5 8fc9f83 fb6d3ed 8fc9f83 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
---
datasets:
- suryanshp1/kali-linux-pentesting-data
- AlicanKiraz0/All-CVE-Records-Training-Dataset
language:
- en
metrics:
- bleu
- accuracy
pipeline_tag: text-generation
library_name: transformers
tags:
- DexV1
- DexAI
- Dexai
- dexai
- DEX-Modle
- IND-Dec
- AI-Dexhat
- CSAI
- CybersecurityDex
- Dexhat
- text-generation-inference
- Ghosthets
- ghosthets-dex
- Dex-ghosthets
- ghosthets-ai
- ghosthets-dex-ai
- Dex-community
- Dextron
---
# ๐ก๏ธ Dex โ Your Personal Cybersecurity AI Sidekick
> *โBuilt for the curious, optimized for the underground.โ*
**Dex** (Digital Exploit eXpert) is an intelligent cybersecurity-oriented conversational AI built for ethical hackers, CTF warriors, and knowledge-hungry learners. Whether you're crafting payloads, understanding CVEs, or just chatting โ Dex makes cyber learning **fun, fast & fearless**.
---
## ๐ง Model Intelligence
| Feature | Description |
| --------- | ------------------------------------------------------- |
| ๐ Name | `ghosthets/Dex` |
| ๐ง Type | Causal Language Model |
| ๐ฏ Domain | Cybersecurity, CTFs, Ethical Hacking |
| ๐งช Usage | Educational, research, AI assistant for cyber learners |
| ๐งฐ Tools | Text reasoning, payload discussion, exploit explanation |
---
## ๐ฅ Dex Is Trained To:
* ๐ฌ Talk like a pro on cybersecurity topics
* ๐ Explain CVEs, XSS, CSRF, SQLi, etc.
* ๐งน Assist in CTF logic & recon mindset
* ๐ก Generate payload hints
* ๐พ Help you build your own AI security bots
* โ๏ธ Run locally with just CPU or on edge boards
---
## โ๏ธ Run It in Python (Transformers)
```python
from transformers import AutoTokenizer, AutoModelForCausalLM
import torch
tokenizer = AutoTokenizer.from_pretrained("ghosthets/Dex")
model = AutoModelForCausalLM.from_pretrained("ghosthets/Dex")
device = torch.device("cuda" if torch.cuda.is_available() else "cpu")
model.to(device)
def ask_dex(prompt):
input_text = f"User: {prompt}\nDex:"
inputs = tokenizer(input_text, return_tensors="pt").to(device)
outputs = model.generate(
inputs.input_ids,
attention_mask=inputs.attention_mask,
max_length=256,
do_sample=True,
top_k=40,
top_p=0.92,
temperature=0.7,
pad_token_id=tokenizer.eos_token_id
)
return tokenizer.decode(outputs[0], skip_special_tokens=True).split("Dex:")[-1].strip()
print(ask_dex("How to identify an XSS vulnerability?"))
```
---
## โก Edge-Device Ready
> ๐ป **Lightweight. Efficient. Ready-to-Hack.**
Dex is **engineered to run smoothly on low-power devices** like:
* ๐น Raspberry Pi Zero W
* ๐น Pi 2W & Pi 4
* ๐น Tinker Boards / NanoPi / Pocket PCs
* ๐น Light virtual containers and offline setups
Despite its small size, Dex delivers powerful outputs and will soon be trained on **more curated data**, making it **sharper, smarter, and more secure**.
---
## ๐จโ๐ป Perfect For
* Ethical Hackers
* Red Teamers & Pentesters
* Bug Bounty Hunters
* Cybersecurity Students
* AI + Security Researchers
* Solo Cyber Ninjas
---
## ๐ง Built With โค๏ธ by
**Gaurav Chouhan**
aka `ghosthets`
๐ [GitHub: ghosthets](https://github.com/ghosthets)
๐ From India ๐ฎ๐ณ
|