Update README.md
Browse files
README.md
CHANGED
@@ -1,5 +1,19 @@
|
|
1 |
---
|
|
|
2 |
license: apache-2.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3 |
---
|
4 |
# ZySec-7B-v1
|
5 |
|
@@ -26,25 +40,6 @@ This repo contains GGUF format model files for ZySec-7B-v1.
|
|
26 |
|
27 |
# Original Model Card
|
28 |
|
29 |
-
---
|
30 |
-
library_name: transformers
|
31 |
-
license: apache-2.0
|
32 |
-
tags:
|
33 |
-
- security
|
34 |
-
- cybersecwithai
|
35 |
-
- threat
|
36 |
-
- vulnerability
|
37 |
-
- infosec
|
38 |
-
- attackio
|
39 |
-
- cyber security
|
40 |
-
- ai4security
|
41 |
-
- llmsecurity
|
42 |
-
- cyber
|
43 |
-
- cybersec
|
44 |
-
- cybersecurity
|
45 |
-
---
|
46 |
-
|
47 |
-
|
48 |
# ZySec-v1-7B
|
49 |
|
50 |
ZySec-v1-7B, stands as a pivotal innovation for security professionals, leveraging the advanced capabilities of HuggingFace's Zephyr language model series. This AI model is crafted to be an omnipresent cybersecurity ally, offering on-demand, expert guidance in cybersecurity issues. Picture ZySec-7B as an ever-present digital teammate, adept at navigating the complexities of security challenges.
|
|
|
1 |
---
|
2 |
+
library_name: transformers
|
3 |
license: apache-2.0
|
4 |
+
tags:
|
5 |
+
- security
|
6 |
+
- cybersecwithai
|
7 |
+
- threat
|
8 |
+
- vulnerability
|
9 |
+
- infosec
|
10 |
+
- attackio
|
11 |
+
- cyber security
|
12 |
+
- ai4security
|
13 |
+
- llmsecurity
|
14 |
+
- cyber
|
15 |
+
- cybersec
|
16 |
+
- cybersecurity
|
17 |
---
|
18 |
# ZySec-7B-v1
|
19 |
|
|
|
40 |
|
41 |
# Original Model Card
|
42 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
43 |
# ZySec-v1-7B
|
44 |
|
45 |
ZySec-v1-7B, stands as a pivotal innovation for security professionals, leveraging the advanced capabilities of HuggingFace's Zephyr language model series. This AI model is crafted to be an omnipresent cybersecurity ally, offering on-demand, expert guidance in cybersecurity issues. Picture ZySec-7B as an ever-present digital teammate, adept at navigating the complexities of security challenges.
|