Instructions to use frEEtom3/dolphin-cybersec with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Local Apps
- Unsloth Studio new
How to use frEEtom3/dolphin-cybersec with Unsloth Studio:
Install Unsloth Studio (macOS, Linux, WSL)
curl -fsSL https://unsloth.ai/install.sh | sh # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for frEEtom3/dolphin-cybersec to start chatting
Install Unsloth Studio (Windows)
irm https://unsloth.ai/install.ps1 | iex # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for frEEtom3/dolphin-cybersec to start chatting
Using HuggingFace Spaces for Unsloth
# No setup required # Open https://huggingface.co/spaces/unsloth/studio in your browser # Search for frEEtom3/dolphin-cybersec to start chatting
Load model with FastModel
pip install unsloth from unsloth import FastModel model, tokenizer = FastModel.from_pretrained( model_name="frEEtom3/dolphin-cybersec", max_seq_length=2048, )
Dolphin Cybersecurity Research Model
Fine-tuned Dolphin-Mistral-7B model for cybersecurity research and education.
Model Details
- Base Model: Dolphin 2.6 Mistral 7B
- Training Data: General Knowledge dataset (37,635 examples)
- Training Method: LoRA fine-tuning with Unsloth
- Use Case: Cybersecurity education, penetration testing methodology, security research
Usage
from transformers import AutoModelForCausalLM, AutoTokenizer
model = AutoModelForCausalLM.from_pretrained("YOUR_USERNAME/dolphin-cybersec")
tokenizer = AutoTokenizer.from_pretrained("YOUR_USERNAME/dolphin-cybersec")
prompt = """Below is an instruction that describes a task, paired with an input that provides further context. Write a response that appropriately completes the request.
### Instruction:
What is SQL injection?
### Input:
### Response:
"""
inputs = tokenizer(prompt, return_tensors="pt")
outputs = model.generate(**inputs, max_new_tokens=512)
print(tokenizer.decode(outputs[0]))
Training Details
- LoRA Rank: 16
- Learning Rate: 2e-4
- Training Steps: 1000
- Batch Size: 2 (gradient accumulation: 4)
Intended Use
Educational and research purposes only. For learning about cybersecurity concepts and methodologies.
- Downloads last month
- -
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support
Model tree for frEEtom3/dolphin-cybersec
Base model
dphn/dolphin-2.6-mistral-7b