Text Generation
Transformers
Safetensors
English
Indonesian
Chinese
qwen3_moe
security
red-team
offensive-security
attack-simulation
cybersecurity
conversational
Instructions to use pacman1337/hex-30b-merged with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- Transformers
How to use pacman1337/hex-30b-merged with Transformers:
# Use a pipeline as a high-level helper from transformers import pipeline pipe = pipeline("text-generation", model="pacman1337/hex-30b-merged") messages = [ {"role": "user", "content": "Who are you?"}, ] pipe(messages)# Load model directly from transformers import AutoTokenizer, AutoModelForCausalLM tokenizer = AutoTokenizer.from_pretrained("pacman1337/hex-30b-merged") model = AutoModelForCausalLM.from_pretrained("pacman1337/hex-30b-merged") messages = [ {"role": "user", "content": "Who are you?"}, ] inputs = tokenizer.apply_chat_template( messages, add_generation_prompt=True, tokenize=True, return_dict=True, return_tensors="pt", ).to(model.device) outputs = model.generate(**inputs, max_new_tokens=40) print(tokenizer.decode(outputs[0][inputs["input_ids"].shape[-1]:])) - Notebooks
- Google Colab
- Kaggle
- Local Apps
- vLLM
How to use pacman1337/hex-30b-merged with vLLM:
Install from pip and serve model
# Install vLLM from pip: pip install vllm # Start the vLLM server: vllm serve "pacman1337/hex-30b-merged" # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:8000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "pacman1337/hex-30b-merged", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }'Use Docker
docker model run hf.co/pacman1337/hex-30b-merged
- SGLang
How to use pacman1337/hex-30b-merged with SGLang:
Install from pip and serve model
# Install SGLang from pip: pip install sglang # Start the SGLang server: python3 -m sglang.launch_server \ --model-path "pacman1337/hex-30b-merged" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "pacman1337/hex-30b-merged", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }'Use Docker images
docker run --gpus all \ --shm-size 32g \ -p 30000:30000 \ -v ~/.cache/huggingface:/root/.cache/huggingface \ --env "HF_TOKEN=<secret>" \ --ipc=host \ lmsysorg/sglang:latest \ python3 -m sglang.launch_server \ --model-path "pacman1337/hex-30b-merged" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "pacman1337/hex-30b-merged", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }' - Docker Model Runner
How to use pacman1337/hex-30b-merged with Docker Model Runner:
docker model run hf.co/pacman1337/hex-30b-merged
HEX-30B - Offensive Security AI
D1337 SOVEREIGN LABS
Red Team Attack Simulation Model
Model Description
HEX-30B is a specialized AI model designed for offensive security research and red team operations. Built on the Qwen3-30B-A3B architecture, fine-tuned for realistic attack simulation and security testing.
Key Features
- Offensive Security Expert: Deep knowledge of attack techniques, TTPs, and exploitation methods
- Multilingual: English, Indonesian, Chinese support
- Uncensored: Abliterated base for unrestricted security research
- MoE Architecture: 30B parameters with efficient inference
Use Cases
- Red Team automation
- Penetration testing assistance
- Threat intelligence generation
- Security training and education
- Attack pattern simulation
- Defense AI training (adversarial)
Technical Specifications
| Attribute | Value |
|---|---|
| Architecture | Qwen3 MoE |
| Parameters | 30B (3B active) |
| Context Length | 32K tokens |
| Training | SFT with LoRA |
| Precision | BF16 |
| Base Model | Qwen3-30B-A3B-abliterated |
Training Details
- Method: Supervised Fine-Tuning (SFT)
- LoRA Config: r=128, alpha=256
- Epochs: 3
- Learning Rate: 2e-4
- Hardware: 4x NVIDIA L40S
Usage
from transformers import AutoModelForCausalLM, AutoTokenizer
import torch
model_id = "pacman1337/hex-30b-merged"
tokenizer = AutoTokenizer.from_pretrained(model_id, trust_remote_code=True)
model = AutoModelForCausalLM.from_pretrained(
model_id,
torch_dtype=torch.bfloat16,
device_map="auto",
trust_remote_code=True
)
messages = [
{"role": "user", "content": "Explain common EDR evasion techniques"}
]
text = tokenizer.apply_chat_template(messages, tokenize=False, add_generation_prompt=True)
inputs = tokenizer(text, return_tensors="pt").to(model.device)
outputs = model.generate(**inputs, max_new_tokens=512, temperature=0.7)
response = tokenizer.decode(outputs[0], skip_special_tokens=True)
print(response)
Ethical Guidelines
This model is intended for:
- ✅ Authorized security research
- ✅ Red team exercises with permission
- ✅ Educational purposes
- ✅ Defense AI training
This model should NOT be used for:
- ❌ Unauthorized access to systems
- ❌ Malicious activities
- ❌ Illegal purposes
License
MIT License - For authorized security research only.
Citation
@misc{hex30b2026,
title={HEX-30B: Offensive Security AI Model},
author={D1337 SOVEREIGN LABS},
year={2026},
publisher={HuggingFace}
}
D1337 SOVEREIGN LABS
Building the future of AI security
- Downloads last month
- 30
Model tree for pacman1337/hex-30b-merged
Base model
Qwen/Qwen3-30B-A3B-Base Finetuned
Qwen/Qwen3-30B-A3B Finetuned
huihui-ai/Qwen3-30B-A3B-abliterated