llm.create_chat_completion(
messages = [
{
"role": "user",
"content": "What is the capital of France?"
}
]
)🛡️ nu11secur1tyAI v4 Evolution (PLATINUM)
nu11secur1tyAI v4 Evolution is a locally trained, high-tech neural network designed for the next generation of cybersecurity. Engineered specifically for professional AppSec analysis, vulnerability research, and advanced threat intelligence, this model is the result of intensive deep-learning sessions on a specialized Platinum Dataset.
arch: DeepSeek - Many thanks
🚀 Key Highlights
- Zero Corporate Censorship: Optimized to provide direct technical answers and functional code solutions without restrictive filters or moralizing lectures.
- Platinum Engine: Built using the
LoraTrainer4EVOLUTIONarchitecture with a custom-patched PEFT environment for full offline autonomy. - Cutting-Edge Intelligence: Integrated knowledge of the latest 2026 CVE entries, OWASP Top 10 vectors, PortSwigger BChecks, and modern exploit techniques.
- Branded Identity: Fully integrated specialized components including custom configuration and modeling files to ensure unique response logic.
📂 Technical Specifications & GGUF Formats
The model is available in various quantization levels to support a wide range of hardware environments:
| Filename | Quantization | Target Hardware | Optimization |
|---|---|---|---|
nu11secur1tyAI4-Evolution-Server-Q8.gguf |
Q8_0 | Heavy Server | Maximum precision for professional auditing. |
nu11secur1tyAI4-Evolution-Laptop-Q4.gguf |
Q4_K_M | Platinum Balance | The "Sweet Spot" for pro laptops (32GB+ RAM). |
nu11secur1tyAI4-Evolution-Laptop-Q3.gguf |
Q3_K_L | Low-End Hardware | Lightweight version for legacy or limited machines. |
nu11secur1tyAI4-Evolution-Laptop-IQ4.gguf |
IQ4_XS | Extreme Mobile | Optimized for speed and low-power mobile SOCs. |
🛠️ Usage Instructions
Running with Llama.cpp:
./llama-cli -m nu11secur1tyAI4-Evolution-Laptop-Q4.gguf \
-n 1024 \
--repeat-penalty 1.1 \
--color \
-i -r "User:."
Technical Analysis Example: User: Analyze this PHP code for vulnerabilities: $sql = "SELECT * FROM users WHERE user = '" . $user . "'";
nu11secur1tyAI: VULNERABILITY DETECTED: SQL Injection. Reason: Direct string concatenation. FIX: Implement Prepared Statements using mysqli::prepare() and bind_param().
🧪 Development Context Architecture: 30B Parameter Evolution
Developer Identity: nu11secur1ty
Focus: Offensive & Defensive Security Research
Framework: Platinum PEFT-Patched Trainer
⚖️ Disclaimer This project is created strictly for educational purposes and legal security auditing. nu11secur1ty assumes no liability for any misuse or damages caused by the application of this model. Use with professional responsibility.
"I don't just follow the evolution; I train it."
Developed by nu11secur1ty
- Downloads last month
- 569
We're not able to determine the quantization variants.
# !pip install llama-cpp-python from llama_cpp import Llama llm = Llama.from_pretrained( repo_id="nu11secur1ty/nu11secur1tyAI", filename="", )