|
|
--- |
|
|
datasets: |
|
|
- suryanshp1/kali-linux-pentesting-data |
|
|
- AlicanKiraz0/All-CVE-Records-Training-Dataset |
|
|
language: |
|
|
- en |
|
|
metrics: |
|
|
- bleu |
|
|
- accuracy |
|
|
pipeline_tag: text-generation |
|
|
library_name: transformers |
|
|
tags: |
|
|
- DexV1 |
|
|
- DexAI |
|
|
- Dexai |
|
|
- dexai |
|
|
- DEX-Modle |
|
|
- IND-Dec |
|
|
- AI-Dexhat |
|
|
- CSAI |
|
|
- CybersecurityDex |
|
|
- Dexhat |
|
|
- text-generation-inference |
|
|
- Ghosthets |
|
|
- ghosthets-dex |
|
|
- Dex-ghosthets |
|
|
- ghosthets-ai |
|
|
- ghosthets-dex-ai |
|
|
- Dex-community |
|
|
- Dextron |
|
|
--- |
|
|
# ๐ก๏ธ Dex โ Your Personal Cybersecurity AI Sidekick |
|
|
|
|
|
> *โBuilt for the curious, optimized for the underground.โ* |
|
|
|
|
|
**Dex** (Digital Exploit eXpert) is an intelligent cybersecurity-oriented conversational AI built for ethical hackers, CTF warriors, and knowledge-hungry learners. Whether you're crafting payloads, understanding CVEs, or just chatting โ Dex makes cyber learning **fun, fast & fearless**. |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐ง Model Intelligence |
|
|
|
|
|
| Feature | Description | |
|
|
| --------- | ------------------------------------------------------- | |
|
|
| ๐ Name | `ghosthets/Dex` | |
|
|
| ๐ง Type | Causal Language Model | |
|
|
| ๐ฏ Domain | Cybersecurity, CTFs, Ethical Hacking | |
|
|
| ๐งช Usage | Educational, research, AI assistant for cyber learners | |
|
|
| ๐งฐ Tools | Text reasoning, payload discussion, exploit explanation | |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐ฅ Dex Is Trained To: |
|
|
|
|
|
* ๐ฌ Talk like a pro on cybersecurity topics |
|
|
* ๐ Explain CVEs, XSS, CSRF, SQLi, etc. |
|
|
* ๐งน Assist in CTF logic & recon mindset |
|
|
* ๐ก Generate payload hints |
|
|
* ๐พ Help you build your own AI security bots |
|
|
* โ๏ธ Run locally with just CPU or on edge boards |
|
|
|
|
|
--- |
|
|
|
|
|
## โ๏ธ Run It in Python (Transformers) |
|
|
|
|
|
```python |
|
|
from transformers import AutoTokenizer, AutoModelForCausalLM |
|
|
import torch |
|
|
|
|
|
tokenizer = AutoTokenizer.from_pretrained("ghosthets/Dex") |
|
|
model = AutoModelForCausalLM.from_pretrained("ghosthets/Dex") |
|
|
device = torch.device("cuda" if torch.cuda.is_available() else "cpu") |
|
|
model.to(device) |
|
|
|
|
|
def ask_dex(prompt): |
|
|
input_text = f"User: {prompt}\nDex:" |
|
|
inputs = tokenizer(input_text, return_tensors="pt").to(device) |
|
|
outputs = model.generate( |
|
|
inputs.input_ids, |
|
|
attention_mask=inputs.attention_mask, |
|
|
max_length=256, |
|
|
do_sample=True, |
|
|
top_k=40, |
|
|
top_p=0.92, |
|
|
temperature=0.7, |
|
|
pad_token_id=tokenizer.eos_token_id |
|
|
) |
|
|
return tokenizer.decode(outputs[0], skip_special_tokens=True).split("Dex:")[-1].strip() |
|
|
|
|
|
print(ask_dex("How to identify an XSS vulnerability?")) |
|
|
``` |
|
|
|
|
|
--- |
|
|
|
|
|
## โก Edge-Device Ready |
|
|
|
|
|
> ๐ป **Lightweight. Efficient. Ready-to-Hack.** |
|
|
|
|
|
Dex is **engineered to run smoothly on low-power devices** like: |
|
|
|
|
|
* ๐น Raspberry Pi Zero W |
|
|
* ๐น Pi 2W & Pi 4 |
|
|
* ๐น Tinker Boards / NanoPi / Pocket PCs |
|
|
* ๐น Light virtual containers and offline setups |
|
|
|
|
|
Despite its small size, Dex delivers powerful outputs and will soon be trained on **more curated data**, making it **sharper, smarter, and more secure**. |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐จโ๐ป Perfect For |
|
|
|
|
|
* Ethical Hackers |
|
|
* Red Teamers & Pentesters |
|
|
* Bug Bounty Hunters |
|
|
* Cybersecurity Students |
|
|
* AI + Security Researchers |
|
|
* Solo Cyber Ninjas |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐ง Built With โค๏ธ by |
|
|
|
|
|
**Gaurav Chouhan** |
|
|
aka `ghosthets` |
|
|
๐ [GitHub: ghosthets](https://github.com/ghosthets) |
|
|
๐ From India ๐ฎ๐ณ |
|
|
|