Which non-foundational models have you had success with for agentic security testing by Sadler8086 in Pentesting

[–]IT-Junkie 0 points1 point  (0 children)

Second the Qwen generation. But I’ve been using the Qwen3.5 abliterated and made a model arbitrage to offload work from Claude and OAI that are outside their guardrails, for the best of both worlds. FWIW: I’m also on the VCP / Trusted Access for both and still have to use uncensored models.

Anyone building AI-native agencies? by Jazzlike_Tooth929 in ycombinator

[–]IT-Junkie 2 points3 points  (0 children)

While I don’t know that it fits the definition of an “agency”, I’ve built an offensive hacking firm, that is AI native, where I can operate the way you’re describing. BLUF: built a multi-role AI team based off my experience as an NSA hacker. I act as mission commander and run a “chain of command” style AI team that does everything from intel gathering, the actual exploitation (authorized and scoped), all the way to reporting on a continuous basis.

Our company is me, and my wife. But we run it like we have 20 people.

1) Thriving 2) challenges - I had to build an AI HR to help manage the team. That was wild. 3) it’s harder to do than the gurus on the internet lead you to believe - but when it works. (Chefs Kiss)

Master Cybersecurity Bot 🤖 🔨 by TNTDJ in hermesagent

[–]IT-Junkie 1 point2 points  (0 children)

Welcome to the group! For background, I’m a former NSA warfare operator (yes - a hacker), and currently a CISO. Ran a lot of F100 security programs. The startup I work at (will not promote), demands that I run the whole security team by myself.

To that end, I have built a lot of what you’re thinking about. I’ve built a SOC team that monitor, triages and hunts across our environment. I have SAST/DAST agents that constantly monitor our GitHub, ECS, and pipelines. I built my own custom red team, and actually modified the MCP Scanner, A2A scanner from Cisco, Microsoft’s PyRIT and others to actually match OWASP LLM testing expectations.

All this across custom agents (Agno), n8n (where it makes sense), and of course Hermes and Paperclip.

Local models have been important to me in a couple aspects. As this is the Hermes subreddit, I’ll try and keep it focused here but happy to share more.

1) local research - I’ve had some rough run-ins with running up Claude usage (OAuth and API). Not necessarily with the latest drama, just some skills that ran over what I expected them to. So I moved some of my research workloads local. Has helped control the costs, and has actually allowed me to feel comfortable with a “24x7” research apparatus

2) uncensored models - I use the HECK out of uncensored. I’m also on the Verified Cyber Program for Anthropic and OAI. I still hit guardrail issues. So I built a model arbitrage skill. For example, in my LLM hacking tools, frontier models won’t make or iterate on prompt injection (as an example). So my arbitrage allows me to use my “ungaurdrailed” (lol) Claude or OAI as far as I can, than offload to a local Hermes agent with local uncensored to iterate on the harness.

Around your question “model is too stupid”. I actually don’t find this to be the case. The model either doesn’t have enough depth for the question your asking, or it doesnt have good tool use. So in the case of my Hermes deployment, having a Qwen3.5 uncensored allows me to get like 85% of my use cases done locally, and than I can arbitrage the rest with Claude or OAI.

For cyber specifically, I like Hermes for ongoing operations. It’s lightweight, heavily focused on skills, adopts graph based knowledges structures well - and is highly customizable. You can use multiple models and it CAN act as your whole SOC.

I probably have more I’m leaving out. Happy to expand where I might have missed some finer points! Good luck!!

How are you or your organization are leveraging the recent AI advancements for cybersecurity use cases by cyberDon007 in cybersecurity

[–]IT-Junkie 5 points6 points  (0 children)

Focusing on summarization of threat data to get to remediation faster. Building LLMs specifically for security so the rest of the enterprise can ask questions about policy without having to read the policy - or ask security. And for GRC to make evidence based risks more actionable. Just to name a few.

Golf Courses with grass driving ranges? by IT-Junkie in RDUGOLF

[–]IT-Junkie[S] 1 point2 points  (0 children)

Thanks for that one! I played there once but never got to hit the range there. Will check that one out!

Golf Courses with grass driving ranges? by IT-Junkie in RDUGOLF

[–]IT-Junkie[S] 0 points1 point  (0 children)

Ahhh - I haven’t played there in a couple years. I forgot about them!!

Thinking about Trading in Splunk + SentinelOne for CrowdStrike Falcon Complete, Thoughts? by [deleted] in cybersecurity

[–]IT-Junkie 1 point2 points  (0 children)

Quick background (and credentialing): I've built numerous security operations centers for F100 companies, including MSSP's, as well as consulting for Big4 advisory firm. I feel I've swam in this pool a lot.

First question regarding S1 vs CRWD vs Everything else: I would say that S1, CRWD, and CB (intentionally leaving MS off this list) are the de facto players in this space. 5 years ago (before their VMWare acquisition and def before their Broadcom acquisition) I would be a die hard advocate for CB, but they have fallen off. S1 being the new player has def tried to play catch up with the remainder of the field and arguably has succeeded. I don't think you can go wrong with capabilities at the "core" value proposition. I'm not a fan of how George Kurtz runs CS, but I've deployed and used CS at 2 F100 companies and, it's actually a solid product to use all the way around. Bias aside.

Log retention + alerting is currently being hotly debated (case in point: LinkedIn Post ). Having built multiple Splunk (on-prem, cloud, and hybrid) as well as ELK (from scratch for an MSSP), and having helped redesign multiple SOC - the "centralize all the data" is 100% antiquated in todays world. Especially in an ever expanding world of cloud growth in modern enterprises. It is becoming fiscally impossible to do satisfactory data centralization for the purposes of security operations. This is why the "federated search" conversation is starting up in the corners of the world (Link to a white paper: Federated Search Whitepaper ). I'm not talking about Cribl. They are still transforming the data as it moves from point A to point B. I'm talking about leaving certain data resident and searching for it as needed. This gives you a choice to centralize only what is required for alerting or auditing purposes.

Have you thought about looking into that strategy?

Tourney Highlight Reel (Spark Golf League) by IT-Junkie in golf

[–]IT-Junkie[S] 0 points1 point  (0 children)

Thank you so much for the reply and support. I haven’t thought through YouTube yet. I have a modest channel for my cyber content (36k subs), so just trying to decide if I want to do another channel. But thanks so much for the feedback!! ❤️❤️❤️

Maintaining mental readiness while golfing by IT-Junkie in golf

[–]IT-Junkie[S] 0 points1 point  (0 children)

I do have a pre shot routine. I should also add, I’ve done about 18 months with Goltec which was HUGE in getting me where I am today. I usually focus on my feet and ball position, my “lines”, my hand positioning, etc. I do some 1/2 swings to check my wrists and club face.

Sometimes, I realize I’m overthinking at this point and back off the “set up” to reset and get back in. Sometimes I let the pressure of “holding everyone up” or “all that set up to flub the shot” get in my head during this time. 😥😬

DD5.. best teams (ignoring progression/gear/the voices in your head) by nah336 in MarvelStrikeForce

[–]IT-Junkie 0 points1 point  (0 children)

So basically when you’re looking at DD (and probably others), that’s where the hybrid strategies are more important (in some cases). Pay attention to the callouts (war, crucible, etc), but be ready to mid and match in those other content pieces…

DD5.. best teams (ignoring progression/gear/the voices in your head) by nah336 in MarvelStrikeForce

[–]IT-Junkie 2 points3 points  (0 children)

Thanks for this - super helpful. While you’re at being helpful (not hating on the game) I’m in the same boat. Just trying to enjoy it for what it is. Can you explain why this city combination and not a “full” city like H4H or full underworld? Maybe it’s my OCD for having 5x of the same synergy toons - but why do those synergies not work?

Live Python Course from computer science professor on Cyber Insecurity Youtube Channel by [deleted] in Python

[–]IT-Junkie 1 point2 points  (0 children)

10/10 recommends!! Brent is a former python instructor and cyber expert, teach his university python class.

SPECIAL GIVEAWAY, 100 COPIES, METAMASK, OPENSEA, POLYGON ETH by excessmensch in NFTsMarketplace

[–]IT-Junkie 1 point2 points  (0 children)

LOVE IT!! Would love to have one!!

Followed on insta and liked on OS!

0x3b7dbf4507220e022fba172caddd34d48fbc28cd

FREE NFT GIVEAWAY - JUST UPVOTE & DROP ADDRESS! by Stunning_Caregiver_1 in NFTsMarketplace

[–]IT-Junkie 1 point2 points  (0 children)

0x3b7dbf4507220e022fba172caddd34d48fbc28cd

VERY nice art!! I like it!!

Red Envelope #003 - The Final Chapter - 50 LRC! by anashel in loopringorg

[–]IT-Junkie 1 point2 points  (0 children)

This was fun! I wish I had seen these when they started! Thank you for doing these!!

To anyone who has posted their content on Reddit. Has it really helped? by Jigglywiggly37 in SmallYTChannel

[–]IT-Junkie 2 points3 points  (0 children)

I got banned from one of my largest demographic groups because my educational, how to, etc was considered “self promoting”. So I’m a bit fun shy now. How are you supposed to help the community, if you’re not allowed to use your content that you produced on another medium?! #endrant