Skip to content

Latest commit

Β 

History

History
186 lines (126 loc) Β· 6.72 KB

File metadata and controls

186 lines (126 loc) Β· 6.72 KB

CyberViser β€” Launch Announcement Posts

Copy-paste ready for each platform. Post today.


🟠 Hacker News β€” "Show HN" Post

Title: Show HN: Hancock – fine-tuned LLM for pentest and SOC work (MITRE ATT&CK + CVE)

Body: I've been building Hancock β€” a Mistral 7B model fine-tuned specifically on MITRE ATT&CK, NVD/CVE data, and pentest/SOC knowledge bases.

It ships as a REST API with 12 security-specific endpoints, including:

  • /v1/triage β€” SOC alert triage with MITRE mapping + TP/FP verdict
  • /v1/hunt β€” SIEM query generator (Splunk SPL / Elastic KQL / Sentinel)
  • /v1/respond β€” PICERL incident response playbooks
  • /v1/ask β€” single-shot security Q&A
  • /v1/chat β€” conversational mode with history

v0.4.0 adds CISO advisory, Sigma/YARA rule generation, IOC enrichment, API key auth, rate limiting, and auto-deploy.

The model is purpose-built β€” not ChatGPT with a security system prompt. Fine-tuning pipeline is open source if you want to train your own variant.

Live demo: https://cyberviser.netlify.app/demo GitHub: https://github.com/cyberviser/Hancock Pricing (Community tier is free/self-hosted): https://cyberviser.netlify.app/pricing

Happy to answer questions about the fine-tuning approach or architecture.


πŸ’Ό LinkedIn Post

πŸ›‘οΈ Launching Hancock v0.4.0 β€” AI Security Agent by CyberViser

After months of building, I'm releasing Hancock publicly.

Hancock is a fine-tuned LLM (Mistral 7B) trained on MITRE ATT&CK, 200k+ CVEs, and real pentest/SOC knowledge bases. Not ChatGPT with a security prompt β€” purpose-built for security operators.

What it does via REST API: β†’ SOC alert triage with MITRE mapping + TP/FP verdict β†’ SIEM query generation (Splunk, Elastic, Sentinel) β†’ PICERL incident response playbooks on demand β†’ CVE analysis and exploitation guidance β†’ Pentest recon, methodology, and report writing

v0.4.0 ships with: βœ… 12 REST API endpoints (triage, hunt, respond, code, ciso, sigma, yara, ioc, webhook) βœ… Bearer token auth + rate limiting βœ… Auto-deploy CI/CD pipeline βœ… Interactive demo (no signup) βœ… Python + Node.js SDKs βœ… Community tier β€” free, self-hosted

If you're an MSSP, pentest firm, or SOC analyst drowning in alerts and report writing β€” this was built for you.

πŸ”— Try the demo: https://cyberviser.netlify.app/demo πŸ“¦ GitHub: https://github.com/cyberviser/Hancock πŸ“§ Enterprise/trial: cyberviser@proton.me

#cybersecurity #infosec #AI #pentesting #SOC #blueTeam #redTeam #LLM #MachineLearning #MITRE


πŸ”΄ Reddit β€” r/netsec

Title: Hancock – fine-tuned LLM for pentest + SOC work. Generates SIEM queries, triages alerts, writes IR playbooks. v0.4.0

Body: Hey r/netsec,

I've been building Hancock β€” a Mistral 7B model fine-tuned on MITRE ATT&CK, NVD/CVE, and pentest/SOC knowledge. Wanted to share v0.4.0 here.

What it does:

  • REST API: triage alerts, generate Splunk/Elastic/Sentinel queries, write PICERL playbooks
  • CLI mode for interactive pentest assistance
  • Runs against NVIDIA NIM (or bring your own inference)

v0.4.0 adds:

  • CISO advisory, Sigma/YARA rule generation, IOC enrichment
  • API key auth + per-IP rate limiting
  • Interactive browser demo (no signup needed)
  • Python + Node.js SDKs
  • Auto-deploy pipeline

Try it: https://cyberviser.netlify.app/demo
Code: https://github.com/cyberviser/Hancock

The fine-tuning pipeline is all open source if you want to extend it with your own data.

Happy to answer questions about the training approach, data sources, or architecture. Feedback welcome β€” especially from anyone doing production SOC/MSSP work.


🟣 Reddit β€” r/AskNetsec cross-post

Title: Built an AI that writes your Splunk queries and triages SOC alerts β€” honest feedback wanted

Body: I'm a developer who got tired of watching SOC analysts waste time on repetitive SIEM query writing and alert triage. So I built Hancock.

It's a fine-tuned LLM that you can hit with a security alert and get back:

  • Severity classification
  • MITRE ATT&CK technique mapping
  • TP/FP assessment
  • Containment actions
  • A production-ready SIEM query for hunting the same thing

Honest question for the community: What would actually make this useful in your workflow? What's missing?

Demo (no account needed): https://cyberviser.netlify.app/demo


🐦 Twitter/X Thread

Tweet 1: Shipping Hancock v0.4.0 β€” AI security agent fine-tuned on MITRE ATT&CK + 200k CVEs

Not another "ChatGPT with a security prompt." Purpose-built for pentesters and SOC analysts.

πŸ”— https://cyberviser.netlify.app/demo

Tweet 2: What it actually does:

β†’ /v1/triage: feed it an alert, get MITRE mapping + TP/FP verdict β†’ /v1/hunt: describe a TTP, get production Splunk/Elastic/Sentinel queries β†’ /v1/respond: incident type β†’ full PICERL playbook β†’ /v1/ask: security Q&A with context

Tweet 3: v0.4.0 ships with: βœ… 12 API endpoints βœ… Bearer token auth βœ… Per-IP rate limiting
βœ… Interactive demo β€” no signup βœ… Auto-deploy pipeline βœ… Python + Node.js SDKs βœ… Community tier free/self-hosted

Code: https://github.com/cyberviser/Hancock

Tweet 4: If you run a MSSP, pentest firm, or SOC and want a trial β€” DM me or hit: https://cyberviser.netlify.app/contact

cyberviser@proton.me

#infosec #pentesting #blueteam #SOC #AI #LLM #MITRE


🎯 ProductHunt Submission

Name: Hancock by CyberViser

Tagline: AI security agent fine-tuned on MITRE ATT&CK β€” triage alerts, generate SIEM queries, write IR playbooks

Description: Hancock is a fine-tuned Mistral 7B model built specifically for pentesters and SOC analysts. Unlike general-purpose AI, it's trained on MITRE ATT&CK, 200,000+ CVEs, and real pentest/SOC knowledge bases.

Deploy it as a REST API and hit it with: β€’ Security alerts β†’ MITRE-mapped triage with TP/FP verdict β€’ TTP descriptions β†’ production Splunk/Elastic/Sentinel queries
β€’ Incident types β†’ full PICERL response playbooks β€’ CVE IDs β†’ exploitation analysis and detection guidance

Community tier is free and self-hosted. Pro tier at $299/mo adds managed hosting and priority support.

Website: https://cyberviser.netlify.app GitHub: https://github.com/cyberviser/Hancock

Topics: Cybersecurity, Artificial Intelligence, Developer Tools, SaaS


πŸ“‹ AlternativeTo Submission

Product Name: Hancock by CyberViser URL: https://cyberviser.netlify.app Description: AI-powered cybersecurity agent fine-tuned on MITRE ATT&CK and CVE data. REST API for SOC alert triage, SIEM query generation, and incident response playbooks. Alternative to manual SIEM work and generic AI security tools. Tags: cybersecurity, AI, pentest, SOC, SIEM, incident-response, LLM Alternatives to: Darktrace, CrowdStrike Falcon AI, Microsoft Security Copilot (open-source/self-hosted alternative)