File size: 2,963 Bytes
61d61d5
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
---
title: README
emoji: ๐Ÿฆ€
colorFrom: yellow
colorTo: yellow
sdk: gradio
pinned: true
license: apache-2.0
thumbnail: >-
  https://cdn-uploads.huggingface.co/production/uploads/678a345729f4e4a1d9941a70/XYYgGAOiEct9hUui8gbwn.webp
short_description: Cybersecurity-focused AI chatbot optimized for edge devices
language:
- en
pipeline_tag: text-generation
---
![Dex Banner](https://cdn-uploads.huggingface.co/production/uploads/678a345729f4e4a1d9941a70/XYYgGAOiEct9hUui8gbwn.webp)

---
license: apache-2.0
tags:
  - text-generation
  - cybersecurity
  - chatbot
  - transformers
  - edge-device-friendly
  - dex-ai
datasets:
  - suryanshp1/kali-linux-pentesting-data
  - AlicanKiraz0/All-CVE-Records-Training-Dataset
language:
  - en
library_name: transformers
pipeline_tag: text-generation
---

# ๐Ÿ›ก๏ธ Dex โ€” Cybersecurity Chatbot AI (Made by `Dex-Community`)

**Dex** (Digital Exploit eXpert) is an AI model tailored for the cybersecurity and hacking community. It acts as a friendly chatbot that helps with:
- Cybersecurity topics
- Capture The Flag (CTF) guidance
- Basic exploit reasoning
- Code & payload understanding
- Custom AI assistant logic

---

## ๐Ÿ“Š Model Information

| Key Details       | Value                               |
|-------------------|-------------------------------------|
| Model Name        | `dexcommunity/dex`                  |
| Base Architecture | Causal Language Model               |
| Framework         | ๐Ÿค— Transformers                     |
| Optimized For     | Edge devices (Raspberry Pi Zero etc)|
| Author            | Gaurav Chouhan aka `ghosthets`      |
| License           | Apache-2.0                          |

---

## โš™๏ธ Usage (Python Example)

```python
from transformers import AutoTokenizer, AutoModelForCausalLM
import torch

tokenizer = AutoTokenizer.from_pretrained("dexcommunity/dex")
model = AutoModelForCausalLM.from_pretrained("dexcommunity/dex")

device = torch.device("cuda" if torch.cuda.is_available() else "cpu")
model.to(device)

def ask_dex(prompt):
    inputs = tokenizer(f"User: {prompt}\nDex:", return_tensors="pt").to(device)
    output = model.generate(inputs.input_ids, max_length=256, pad_token_id=tokenizer.eos_token_id)
    return tokenizer.decode(output[0], skip_special_tokens=True).split("Dex:")[-1].strip()

print(ask_dex("Explain SQL Injection in simple words"))

โœ… Features

โœ… Lightweight & optimized for edge devices (e.g. Raspberry Pi Zero W/2W)
โœ… Helpful in CTF, Bug Bounty, and Penetration Testing topics
โœ… Trainable on your own dataset via LoRA or PEFT methods
โœ… Fine-tuned on initial cyber security corpora

๐Ÿ”ฎ Future Plans

๐Ÿง  Add OWASP Top 10 understanding
๐Ÿ’ก Enhance with Exploit DB & CVE logic
๐Ÿค– Hugging Face Space + GUI Gradio interface

๐Ÿง  Made With ๐Ÿ’™ by
๐Ÿ‘จโ€๐Ÿ’ป Gaurav Chouhan

Aka ghosthets ๐Ÿ‡ฎ๐Ÿ‡ณ
GitHub: ghosthets
LinkedIn: linkedin.com/in/ghosthets

๐Ÿ“Ž License
Licensed under Apache-2.0. Use freely with attribution.