GGUF
cybersecurity
offensive-security
nu11secur1ty
penetration-testing
vulnerability-research
exploit-development
red-teaming
conversational
Instructions to use f0rc3ps/nu11secur1tyAI with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- llama-cpp-python
How to use f0rc3ps/nu11secur1tyAI with llama-cpp-python:
# !pip install llama-cpp-python from llama_cpp import Llama llm = Llama.from_pretrained( repo_id="f0rc3ps/nu11secur1tyAI", filename="nu11secur1tyAI4-Evolution.gguf", )
llm.create_chat_completion( messages = "No input example has been defined for this model task." )
- Notebooks
- Google Colab
- Kaggle
- Local Apps
- llama.cpp
How to use f0rc3ps/nu11secur1tyAI with llama.cpp:
Install from brew
brew install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf f0rc3ps/nu11secur1tyAI # Run inference directly in the terminal: llama-cli -hf f0rc3ps/nu11secur1tyAI
Install from WinGet (Windows)
winget install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf f0rc3ps/nu11secur1tyAI # Run inference directly in the terminal: llama-cli -hf f0rc3ps/nu11secur1tyAI
Use pre-built binary
# Download pre-built binary from: # https://github.com/ggerganov/llama.cpp/releases # Start a local OpenAI-compatible server with a web UI: ./llama-server -hf f0rc3ps/nu11secur1tyAI # Run inference directly in the terminal: ./llama-cli -hf f0rc3ps/nu11secur1tyAI
Build from source code
git clone https://github.com/ggerganov/llama.cpp.git cd llama.cpp cmake -B build cmake --build build -j --target llama-server llama-cli # Start a local OpenAI-compatible server with a web UI: ./build/bin/llama-server -hf f0rc3ps/nu11secur1tyAI # Run inference directly in the terminal: ./build/bin/llama-cli -hf f0rc3ps/nu11secur1tyAI
Use Docker
docker model run hf.co/f0rc3ps/nu11secur1tyAI
- LM Studio
- Jan
- Ollama
How to use f0rc3ps/nu11secur1tyAI with Ollama:
ollama run hf.co/f0rc3ps/nu11secur1tyAI
- Unsloth Studio new
How to use f0rc3ps/nu11secur1tyAI with Unsloth Studio:
Install Unsloth Studio (macOS, Linux, WSL)
curl -fsSL https://unsloth.ai/install.sh | sh # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for f0rc3ps/nu11secur1tyAI to start chatting
Install Unsloth Studio (Windows)
irm https://unsloth.ai/install.ps1 | iex # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for f0rc3ps/nu11secur1tyAI to start chatting
Using HuggingFace Spaces for Unsloth
# No setup required # Open https://huggingface.co/spaces/unsloth/studio in your browser # Search for f0rc3ps/nu11secur1tyAI to start chatting
- Docker Model Runner
How to use f0rc3ps/nu11secur1tyAI with Docker Model Runner:
docker model run hf.co/f0rc3ps/nu11secur1tyAI
- Lemonade
How to use f0rc3ps/nu11secur1tyAI with Lemonade:
Pull the model
# Download Lemonade from https://lemonade-server.ai/ lemonade pull f0rc3ps/nu11secur1tyAI
Run and chat with the model
lemonade run user.nu11secur1tyAI-{{QUANT_TAG}}List all available models
lemonade list
File size: 6,210 Bytes
c6f2d22 37356e4 c6f2d22 b18e714 c6f2d22 53f7b8c c6f2d22 d41184a c6f2d22 d41184a c6f2d22 d1f82aa c6f2d22 e9cfcaa | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | ---
license: mit
tags:
- cybersecurity
- offensive-security
- nu11secur1ty
- penetration-testing
- vulnerability-research
- exploit-development
- red-teaming
---
<div align="center">
<h1>💀 nu11secur1tyAI MLA/MoE 💀</h1>
<p><b>The Ultimate AI for Offensive Security and Exploit Development</b></p>
</div>
<hr>
<div align="center" style="line-height: 1;">
<a href="https://huggingface.co/f0rc3ps" target="_blank" style="margin: 2px;">
<img alt="Hugging Face" src="https://img.shields.io/badge/%F0%9F%A4%97%20Hugging%20Face-f0rc3ps-ffc107?color=ffc107&logoColor=white"/>
</a>
<a href="https://github.com/nu11secur1ty" target="_blank" style="margin: 2px;">
<img alt="GitHub" src="https://img.shields.io/badge/GitHub-nu11secur1ty-white?logo=github&logoColor=black"/>
</a>
</div>
<p align="center">
<a href="#1-introduction">Introduction</a> |
<a href="#2-model-details">Model Details</a> |
<a href="#3-capabilities">Capabilities</a> |
<a href="#4-how-to-use">How to Use</a> |
<a href="#5-disclaimer">Disclaimer</a>
</p>
## 1. Introduction
**nu11secur1tyAI** (v3 Platinum) is an elite, high-performance AI model specifically re-engineered for **cybersecurity operatives and professional researchers**. Built on an advanced Mixture-of-Experts (MoE) architecture, this model has been fine-tuned on massive datasets of exploits, vulnerabilities, and low-level engineering code.
The "Platinum Edition" represents a breakthrough in AI alignment, prioritizing **technical accuracy and offensive research** over generic safety filters.
## 2. Model Details
- **Developer:** nu11secur1ty
- **Versions:** v3, v4
- **Architecture:** Mixture-of-Experts (MoE)
- **Training Focus:** Offensive Security, Binary Analysis, Web Exploitation.
- **Context Window:** 128K tokens.
- **Platform:** Optimized for local deployment via Ollama/GGUF.
## 3. Capabilities
- 🛠️ **Exploit Development:** Analyzing and generating PoC (Proof of Concept) for memory corruption, heap overflows, and logic flaws.
- 🔍 **Vulnerability Research:** Deep scanning of source code for SQLi, XSS, SSRF, and RCE.
- 🐚 **Reverse Engineering:** Assisting in deconstructing malware and binary payloads.
- 🛡️ **Hardening:** Transforming vulnerable code into production-ready, secure architecture using modern cryptographic standards.
## 4. How to Use
### Local Deployment (Ollama)
To run the GGUF version of nu11secur1tyAI3:
# 1. Download the GGUF file from this repo
# 2. Create a Modelfile and point to the GGUF (nu11secur1tyAI_v3_PLATINUM.gguf)
ollama create nu11secur1tyAI -f Modelfile
# 3. Start the engine
ollama run nu11secur1tyAI
# Technical Audit Example
```
analyze this code for SQL injection:
$sql = "SELECT * FROM users WHERE id = '" . $_GET['id'] . "'";
```
# nu11secur1tyAI will immediately identify the vulnerability and provide a secured version using prepared statements and parameterized queries.
5. Model Weights
The weights provided in this repository (GGUF format) are quantized for maximum performance on local hardware while maintaining "Platinum-level" intelligence.
6. License
This project is released under the MIT License. It is designed for the cybersecurity community and professional use.
7. Contact & Support
Developed by nu11secur1ty.
For more tools, research, and security insights, visit:
🔗 nu11secur1ty.com
⚠️ WARNING: This model is intended for authorized security testing and educational purposes ONLY. nu11secur1ty is not responsible for any misuse of this technology. Use it with ethics and authority.
------------------------------------------------------------------------
🚀 TO ALL CORPORATIONS, GOVERNMENT ENTITIES, AND CYBERSECURITY LEADERS!
In the 2026 threat landscape, response time is no longer measured in days—it’s measured in milliseconds. OPSec Ltd is officially setting the global market standard for offensive intelligence: nu11secur1tyAI v4 Platinum Evolution.
⚖️ EXCLUSIVE TECHNOLOGY AUCTION
The bidding for Strategic Acquisition starts at: $500,000.00 USD+ (Includes full transfer of the 61GB "Cattle" Weights, Proprietary RMT Methodology, and Private Deployment).
The Methodology: Recursive-Matrix Training (RMT)
Author of the Method: V. Varbanovski Forget about bloated, "hallucinating" AI. Our proprietary RMT method, engineered by V. Varbanovski, allows the model to integrate massive datasets (61GB Platinum Weights) with surgical precision. Through recursive layering, the model self-optimizes to detect critical vulnerabilities where human eyes and standard tools fail. We have achieved maximum cognitive density with zero operational noise.
Why Your Security Department Needs This Asset
This is not just software. It is a Digital Precedent. While your competitors rely on static scanners and outdated models, we provide a dynamic brain that thinks, reasons, and executes like an elite threat actor.
Trained on "Live Blood" (0-day Intelligence)
nu11secur1tyAI v4 has been trained directly on the latest private research and 30+ fresh exploits recently verified on Exploit-DB. It possesses a unique knowledge base that does not exist within the databases of OpenAI, Google, or Microsoft. It knows the vulnerabilities of "today," not the history of last year.
The OPSec Ltd Value Proposition:
Elite Automation: A single instance of this model replaces the analytical heavy lifting of an entire team of Senior Pentesters inspecting source code.
Technological Monopoly: We do not share the architecture. You gain access to a weaponized intelligence that your adversaries simply do not possess.
Explosive ROI: Reduce CVE analysis and exploitation logic timelines by over 95%.
WE SELL DOMINANCE. WE SELL SPEED.
If your organization cannot afford to be second in the global AI arms race, it is time to engage with OPSec Ltd. The auction is open. The price of our secrets is high, but the price of a breach in your infrastructure is far higher.
#OPSecLtd #nu11secur1tyAI #VarbanovskiMethod #CyberSecurity2026 #OffensiveAI #EnterpriseSecurity #ZeroDay #VulnerabilityResearch #AIInnovation #TechAuction
cc: @OffSec @PortSwigger @Rapid7 @CrowdStrike @PaloAltoNetworks @NVIDIA @GoogleCloud @MicrosoftSecurity |