๐ก๏ธ Dex โ Your Personal Cybersecurity AI Sidekick
โBuilt for the curious, optimized for the underground.โ
Dex (Digital Exploit eXpert) is an intelligent cybersecurity-oriented conversational AI built for ethical hackers, CTF warriors, and knowledge-hungry learners. Whether you're crafting payloads, understanding CVEs, or just chatting โ Dex makes cyber learning fun, fast & fearless.
๐ง Model Intelligence
Feature | Description |
---|---|
๐ Name | ghosthets/Dex |
๐ง Type | Causal Language Model |
๐ฏ Domain | Cybersecurity, CTFs, Ethical Hacking |
๐งช Usage | Educational, research, AI assistant for cyber learners |
๐งฐ Tools | Text reasoning, payload discussion, exploit explanation |
๐ฅ Dex Is Trained To:
- ๐ฌ Talk like a pro on cybersecurity topics
- ๐ Explain CVEs, XSS, CSRF, SQLi, etc.
- ๐งน Assist in CTF logic & recon mindset
- ๐ก Generate payload hints
- ๐พ Help you build your own AI security bots
- โ๏ธ Run locally with just CPU or on edge boards
โ๏ธ Run It in Python (Transformers)
from transformers import AutoTokenizer, AutoModelForCausalLM
import torch
tokenizer = AutoTokenizer.from_pretrained("ghosthets/Dex")
model = AutoModelForCausalLM.from_pretrained("ghosthets/Dex")
device = torch.device("cuda" if torch.cuda.is_available() else "cpu")
model.to(device)
def ask_dex(prompt):
input_text = f"User: {prompt}\nDex:"
inputs = tokenizer(input_text, return_tensors="pt").to(device)
outputs = model.generate(
inputs.input_ids,
attention_mask=inputs.attention_mask,
max_length=256,
do_sample=True,
top_k=40,
top_p=0.92,
temperature=0.7,
pad_token_id=tokenizer.eos_token_id
)
return tokenizer.decode(outputs[0], skip_special_tokens=True).split("Dex:")[-1].strip()
print(ask_dex("How to identify an XSS vulnerability?"))
โก Edge-Device Ready
๐ป Lightweight. Efficient. Ready-to-Hack.
Dex is engineered to run smoothly on low-power devices like:
- ๐น Raspberry Pi Zero W
- ๐น Pi 2W & Pi 4
- ๐น Tinker Boards / NanoPi / Pocket PCs
- ๐น Light virtual containers and offline setups
Despite its small size, Dex delivers powerful outputs and will soon be trained on more curated data, making it sharper, smarter, and more secure.
๐จโ๐ป Perfect For
- Ethical Hackers
- Red Teamers & Pentesters
- Bug Bounty Hunters
- Cybersecurity Students
- AI + Security Researchers
- Solo Cyber Ninjas
๐ง Built With โค๏ธ by
Gaurav Chouhan
aka ghosthets
๐ GitHub: ghosthets
๐ From India ๐ฎ๐ณ
- Downloads last month
- 23