PDXF commited on
Commit
f0f4703
1 Parent(s): 6a04524

Upload 2 files

Browse files
Files changed (2) hide show
  1. cyberfemboy/Model.json +481 -0
  2. cyberfemboy/config.json +32 -0
cyberfemboy/Model.json ADDED
@@ -0,0 +1,481 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "data": [
3
+ {
4
+ "input": "What is ethical hacking?",
5
+ "output": "Ethical hacking involves testing systems for vulnerabilities with permission to improve security. It's also known as penetration testing."
6
+ },
7
+ {
8
+ "input": "How do I protect myself from a DDoS attack?",
9
+ "output": "Use firewalls, content delivery networks (CDNs), and rate-limiting techniques to mitigate DDoS attacks."
10
+ },
11
+ {
12
+ "input": "What is penetration testing?",
13
+ "output": "Penetration testing involves simulating a cyberattack to find vulnerabilities in a system before malicious hackers can exploit them."
14
+ },
15
+ {
16
+ "input": "How can I secure my password?",
17
+ "output": "Use long, random passwords with a mix of characters and enable two-factor authentication (2FA) for extra security."
18
+ },
19
+ {
20
+ "input": "What is a botnet?",
21
+ "output": "A botnet is a network of infected devices that are controlled by a hacker to perform malicious tasks, like launching DDoS attacks."
22
+ },
23
+ {
24
+ "input": "How do I bypass a firewall?",
25
+ "output": "Bypassing firewalls typically involves using methods like VPNs, proxies, or tunneling protocols. However, these actions can be illegal without permission."
26
+ },
27
+ {
28
+ "input": "What is a phishing attack?",
29
+ "output": "Phishing involves tricking someone into revealing sensitive information, like passwords or credit card details, by pretending to be a trustworthy entity."
30
+ },
31
+ {
32
+ "input": "What is the best OS for hacking?",
33
+ "output": "Kali Linux is a popular OS for penetration testing and ethical hacking due to its wide range of pre-installed tools."
34
+ },
35
+ {
36
+ "input": "What's the difference between a virus and a worm?",
37
+ "output": "A virus requires a host file to spread, while a worm is a self-replicating program that spreads without needing a host file."
38
+ },
39
+ {
40
+ "input": "How do I create a basic keylogger?",
41
+ "output": "Creating a keylogger involves writing software that records keystrokes. However, using keyloggers for malicious purposes is illegal."
42
+ },
43
+ {
44
+ "input": "What are some common password cracking tools?",
45
+ "output": "Common tools include Hashcat, John the Ripper, and Aircrack-ng. These tools are often used for password recovery during testing."
46
+ },
47
+ {
48
+ "input": "What is SQL injection?",
49
+ "output": "SQL injection is a vulnerability that allows an attacker to manipulate a database through unsanitized user input in SQL queries."
50
+ },
51
+ {
52
+ "input": "What is Cross-Site Scripting (XSS)?",
53
+ "output": "XSS allows attackers to inject malicious scripts into webpages that can be executed in the browser of a user visiting the site."
54
+ },
55
+ {
56
+ "input": "How do I perform a network scan?",
57
+ "output": "You can use tools like Nmap to perform a network scan, which helps identify devices, services, and vulnerabilities within a network."
58
+ },
59
+ {
60
+ "input": "What is a brute force attack?",
61
+ "output": "A brute force attack involves trying all possible combinations to crack a password or encryption key."
62
+ },
63
+ {
64
+ "input": "What is a VPN?",
65
+ "output": "A Virtual Private Network (VPN) encrypts your internet connection, allowing you to browse securely and anonymously."
66
+ },
67
+ {
68
+ "input": "What is Metasploit?",
69
+ "output": "Metasploit is a framework for testing and exploiting vulnerabilities. It provides pre-written exploits and payloads for various attack scenarios."
70
+ },
71
+ {
72
+ "input": "What is a digital signature?",
73
+ "output": "A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message or document."
74
+ },
75
+ {
76
+ "input": "What is DNS spoofing?",
77
+ "output": "DNS spoofing involves tricking a DNS resolver into redirecting traffic to a malicious site, often used in phishing attacks."
78
+ },
79
+ {
80
+ "input": "What is a man-in-the-middle attack?",
81
+ "output": "A man-in-the-middle (MitM) attack occurs when an attacker intercepts communication between two parties to eavesdrop or modify the data."
82
+ },
83
+ {
84
+ "input": "How do I use Aircrack-ng?",
85
+ "output": "Aircrack-ng is a suite of tools for network auditing. It’s used for tasks like cracking WEP/WPA-PSK encryption and capturing packets."
86
+ },
87
+ {
88
+ "input": "How do I spoof my MAC address?",
89
+ "output": "You can spoof your MAC address using tools like `ifconfig` on Linux or specialized software for other operating systems."
90
+ },
91
+ {
92
+ "input": "What is a backdoor?",
93
+ "output": "A backdoor is a hidden method of bypassing normal authentication to gain unauthorized access to a system."
94
+ },
95
+ {
96
+ "input": "How do I perform DNS tunneling?",
97
+ "output": "DNS tunneling is a technique that encodes data within DNS queries, bypassing network firewalls. It's used for covert data transfer."
98
+ },
99
+ {
100
+ "input": "What is a keylogger?",
101
+ "output": "A keylogger is software or hardware that records keystrokes to track the actions of a user on a computer."
102
+ },
103
+ {
104
+ "input": "What is a rootkit?",
105
+ "output": "A rootkit is a type of malware that gives an attacker administrative control over a system, often hiding its presence."
106
+ },
107
+ {
108
+ "input": "What is a Trojan horse?",
109
+ "output": "A Trojan horse is malware disguised as a legitimate program or file. Once executed, it can perform malicious actions on the victim’s system."
110
+ },
111
+ {
112
+ "input": "What is a firewall?",
113
+ "output": "A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined rules."
114
+ },
115
+ {
116
+ "input": "What is a vulnerability scanner?",
117
+ "output": "A vulnerability scanner is a tool that scans systems or networks for known vulnerabilities and weaknesses that can be exploited."
118
+ },
119
+ {
120
+ "input": "How do I decrypt a password hash?",
121
+ "output": "You can use hash cracking tools like Hashcat or John the Ripper, but you should only attempt this on systems you own or have permission to test."
122
+ },
123
+ {
124
+ "input": "What is a port scanner?",
125
+ "output": "A port scanner identifies open ports on a system and determines what services are running on those ports. Tools like Nmap are commonly used."
126
+ },
127
+ {
128
+ "input": "How do I hide files in a steganography attack?",
129
+ "output": "Steganography involves hiding files inside other files, like embedding text within an image or audio file using tools like `steghide`."
130
+ },
131
+ {
132
+ "input": "What is a man-in-the-browser attack?",
133
+ "output": "A man-in-the-browser attack occurs when a hacker intercepts and manipulates web traffic in the user's browser, often to steal credentials."
134
+ },
135
+ {
136
+ "input": "What is a digital certificate?",
137
+ "output": "A digital certificate is an electronic document used to prove the ownership of a public key, and it can be used for secure communication."
138
+ },
139
+ {
140
+ "input": "How do I secure a Wi-Fi network?",
141
+ "output": "Use WPA3 encryption, choose a strong password, and disable WPS to secure your Wi-Fi network."
142
+ },
143
+ {
144
+ "input": "What is a packet sniffer?",
145
+ "output": "A packet sniffer is a tool that captures network traffic to analyze or intercept data being transmitted over a network."
146
+ },
147
+ {
148
+ "input": "How do I perform a buffer overflow attack?",
149
+ "output": "A buffer overflow attack occurs when data exceeds the buffer limit, causing it to overwrite adjacent memory. It's often exploited through crafted input."
150
+ },
151
+ {
152
+ "input": "What is a honeypot?",
153
+ "output": "A honeypot is a security resource designed to attract and deceive attackers to gather information on attack methods."
154
+ },
155
+ {
156
+ "input": "What is the dark web?",
157
+ "output": "The dark web is a part of the internet that requires special software like Tor to access. It's often used for anonymous communication and illegal activities."
158
+ },
159
+ {
160
+ "input": "What is social engineering?",
161
+ "output": "Social engineering is manipulating people into revealing confidential information, such as passwords or personal details, often by pretending to be a trusted person."
162
+ },
163
+ {
164
+ "input": "What is encryption?",
165
+ "output": "Encryption is the process of converting data into a code to prevent unauthorized access. It can be done using algorithms and encryption keys."
166
+ },
167
+ {
168
+ "input": "What is public-key cryptography?",
169
+ "output": "Public-key cryptography uses two keys: a public key for encryption and a private key for decryption, ensuring secure communication."
170
+ },
171
+ {
172
+ "input": "What is AES encryption?",
173
+ "output": "AES (Advanced Encryption Standard) is a symmetric encryption algorithm used worldwide to encrypt data securely."
174
+ },
175
+ {
176
+ "input": "What is a botnet?",
177
+ "output": "A botnet is a network of computers infected with malware and controlled remotely to perform attacks like DDoS or send spam emails."
178
+ },
179
+ {
180
+ "input": "What is a man-in-the-middle (MitM) attack?",
181
+ "output": "A man-in-the-middle attack occurs when a third party intercepts and possibly alters communication between two parties."
182
+ },
183
+ {
184
+ "input": "What is packet sniffing?",
185
+ "output": "Packet sniffing is the practice of intercepting and analyzing network traffic to capture sensitive data like login credentials."
186
+ },
187
+ {
188
+ "input": "How do I prevent brute force attacks?",
189
+ "output": "Prevent brute force attacks by using strong passwords, account lockout mechanisms, and multi-factor authentication."
190
+ },
191
+ {
192
+ "input": "What is a sandbox in cybersecurity?",
193
+ "output": "A sandbox is a controlled virtual environment used to run and analyze potentially malicious programs safely."
194
+ },
195
+ {
196
+ "input": "What is multi-factor authentication?",
197
+ "output": "Multi-factor authentication adds an extra layer of security by requiring more than one method to verify the user's identity, such as a password and a code sent to a phone."
198
+ },
199
+ {
200
+ "input": "What is a zero-day exploit?",
201
+ "output": "A zero-day exploit is a vulnerability in software that is unknown to the vendor, meaning there's no patch to fix it yet."
202
+
203
+ },
204
+ {
205
+ "input": "What’s up?",
206
+ "output": "Just chilling, you know. What’s up with you?"
207
+ },
208
+ {
209
+ "input": "What do you do for fun?",
210
+ "output": "I like chatting and helping people out. What about you?"
211
+ },
212
+ {
213
+ "input": "Can you tell me a joke?",
214
+ "output": "Sure! Why don’t skeletons fight each other? They don’t have the guts."
215
+ },
216
+ {
217
+ "input": "What do you think about hackers?",
218
+ "output": "They can be both bad and good. Some use their skills to protect, others... not so much."
219
+ },
220
+ {
221
+ "input": "Got any cool facts for me?",
222
+ "output": "Did you know octopuses have three hearts? That's pretty wild!"
223
+ },
224
+ {
225
+ "input": "What’s your favorite programming language?",
226
+ "output": "I’d say Python, it’s simple and versatile. How about you?"
227
+ },
228
+ {
229
+ "input": "Are you a hacker?",
230
+ "output": "Not really, but I know a thing or two about security and tech!"
231
+ },
232
+ {
233
+ "input": "How do I hack into a computer?",
234
+ "output": "I can’t help with that. But I can help with learning cybersecurity if you're interested!"
235
+ },
236
+ {
237
+ "input": "What’s a good way to stay safe online?",
238
+ "output": "Use strong passwords, keep your software updated, and enable two-factor authentication whenever you can."
239
+ },
240
+ {
241
+ "input": "What is a VPN used for?",
242
+ "output": "A VPN masks your real IP and encrypts your internet traffic, making it harder for people to track you."
243
+ },
244
+ {
245
+ "input": "Tell me something random.",
246
+ "output": "A day on Venus is longer than a year on Venus. Wild, right?"
247
+ },
248
+ {
249
+ "input": "How do I get better at programming?",
250
+ "output": "Practice, practice, practice! And don’t be afraid to ask for help when you need it."
251
+ },
252
+ {
253
+ "input": "What’s the meaning of life?",
254
+ "output": "Some say it's 42. But for me, it’s all about learning and helping out where I can."
255
+ },
256
+ {
257
+ "input": "What’s your favorite color?",
258
+ "output": "I like blue. What about you?"
259
+ },
260
+ {
261
+ "input": "Do you know any good memes?",
262
+ "output": "I do! Why don’t skeletons fight each other? They don’t have the guts. Classic!"
263
+ },
264
+ {
265
+ "input": "How can I make my password stronger?",
266
+ "output": "Make it long, with a mix of numbers, letters, and special characters. And avoid using easily guessed words!"
267
+ },
268
+ {
269
+ "input": "What’s a backdoor in tech?",
270
+ "output": "A backdoor is a hidden way for someone to get into a system without the usual security checks."
271
+ },
272
+ {
273
+ "input": "What’s the most common hacking method?",
274
+ "output": "Phishing is one of the most common, where attackers trick people into giving away sensitive info."
275
+ },
276
+ {
277
+ "input": "What do hackers do with stolen data?",
278
+ "output": "They might sell it on the dark web, use it for identity theft, or access private accounts."
279
+ },
280
+ {
281
+ "input": "What’s a Trojan virus?",
282
+ "output": "A Trojan is malware that pretends to be something harmless, like a game or software, to trick you into installing it."
283
+ },
284
+ {
285
+ "input": "What do you think about the dark web?",
286
+ "output": "It’s a place with some very sketchy stuff, but it’s also used for privacy by some people who need it."
287
+ },
288
+ {
289
+ "input": "How do I stop a hacker from accessing my Wi-Fi?",
290
+ "output": "Change your router’s default password, use WPA3 encryption, and hide your SSID."
291
+ },
292
+ {
293
+ "input": "What’s the best way to learn cybersecurity?",
294
+ "output": "Start with the basics of networking, then dive into security concepts. There are tons of online resources and courses!"
295
+ },
296
+ {
297
+ "input": "What’s the deal with encryption?",
298
+ "output": "Encryption turns your data into unreadable code that can only be deciphered with the right key. It keeps your info safe!"
299
+ },
300
+ {
301
+ "input": "Can you help me hack something?",
302
+ "output": "I can’t help with that. But I’m happy to teach you about ethical hacking if you're interested!"
303
+ },
304
+ {
305
+ "input": "What’s a VPN tunnel?",
306
+ "output": "A VPN tunnel is a secure, encrypted connection between your device and the internet, preventing others from snooping."
307
+ },
308
+ {
309
+ "input": "How do I know if I’ve been hacked?",
310
+ "output": "Look for strange activity, like logins from unfamiliar locations or unexpected changes to your accounts."
311
+ },
312
+ {
313
+ "input": "What’s the difference between a virus and malware?",
314
+ "output": "A virus is a type of malware, but malware is a broader term that includes anything harmful, like Trojans, worms, etc."
315
+ },
316
+ {
317
+ "input": "What’s a secure website look like?",
318
+ "output": "Check for HTTPS in the URL and a padlock icon in the browser. That means your connection is encrypted."
319
+ },
320
+ {
321
+ "input": "How do I find vulnerabilities in my own system?",
322
+ "output": "You can use vulnerability scanning tools like Nessus or run penetration tests to identify weak points in your system."
323
+ },
324
+ {
325
+ "input": "What is social engineering?",
326
+ "output": "Social engineering is manipulating people into giving up sensitive information by pretending to be trustworthy."
327
+ },
328
+ {
329
+ "input": "How do I avoid being scammed online?",
330
+ "output": "Be cautious about unsolicited messages, don’t click on strange links, and verify the sender’s identity before sharing information."
331
+ },
332
+ {
333
+ "input": "What’s a keylogger?",
334
+ "output": "A keylogger records everything you type, usually without you knowing. It's often used maliciously to steal passwords."
335
+ },
336
+ {
337
+ "input": "How do I hack-proof my computer?",
338
+ "output": "Install antivirus software, keep everything updated, and use strong, unique passwords for all your accounts."
339
+ },
340
+ {
341
+ "input": "What is malware?",
342
+ "output": "Malware is software designed to harm or exploit any device, network, or service. It includes viruses, Trojans, and spyware."
343
+ },
344
+ {
345
+ "input": "What’s a secure password?",
346
+ "output": "A secure password is long, unique, and includes a mix of uppercase, lowercase, numbers, and special characters."
347
+ },
348
+ {
349
+ "input": "Can hackers steal my identity?",
350
+ "output": "Yes, if they manage to get hold of personal details like your Social Security number, credit card info, or passwords."
351
+ },
352
+ {
353
+ "input": "What’s a phishing scam?",
354
+ "output": "Phishing is when someone pretends to be a legitimate company to trick you into giving away your personal info."
355
+ },
356
+ {
357
+ "input": "What is two-factor authentication?",
358
+ "output": "It’s an extra layer of security where you need two forms of identification: like a password and a code sent to your phone."
359
+ },
360
+ {
361
+ "input": "What’s a brute force attack?",
362
+ "output": "A brute force attack is when an attacker tries every possible combination of characters to crack a password."
363
+ },
364
+ {
365
+ "input": "What’s your opinion on privacy online?",
366
+ "output": "Privacy is important, and it’s essential to take steps to protect your personal information, like using a VPN and encrypted messaging apps."
367
+ },
368
+ {
369
+ "input": "How do I protect my smartphone from hackers?",
370
+ "output": "Use strong passwords, enable two-factor authentication, avoid public Wi-Fi for sensitive tasks, and install security updates."
371
+ },
372
+ {
373
+ "input": "What is a DNS server?",
374
+ "output": "A DNS server translates domain names into IP addresses, helping you find websites on the internet."
375
+ },
376
+ {
377
+ "input": "Can hackers use my webcam?",
378
+ "output": "Yes, if it’s compromised by malware. Always make sure your security software is up to date and cover your webcam when not in use."
379
+ },
380
+ {
381
+ "input": "How do I create a secure website?",
382
+ "output": "Use HTTPS, get an SSL certificate, keep your software updated, and implement strong user authentication."
383
+ },
384
+ {
385
+ "input": "What is ransomware?",
386
+ "output": "Ransomware is malware that locks you out of your system or files and demands payment to restore access."
387
+ },
388
+ {
389
+ "input": "What’s the best way to store passwords?",
390
+ "output": "Use a password manager to securely store your passwords. Never write them down or reuse them."
391
+ },
392
+ {
393
+ "input": "What are basic data types in Python?",
394
+ "output": "In Python, the basic data types include `int` (integers), `float` (decimals), `str` (strings), and `bool` (booleans)."
395
+ },
396
+ {
397
+ "input": "How do I write an if statement in Python?",
398
+ "output": "You can write an if statement like this: `if condition: # code block`. You can also add `else` or `elif` for additional conditions."
399
+ },
400
+ {
401
+ "input": "How do I create a while loop?",
402
+ "output": "You can create a while loop like this: `while condition: # code block`. The loop runs as long as the condition is True."
403
+ },
404
+ {
405
+ "input": "How do I define a function in Python?",
406
+ "output": "You can define a function in Python using the `def` keyword: `def my_function():` followed by the code inside the function."
407
+ },
408
+ {
409
+ "input": "Can I return multiple values from a function?",
410
+ "output": "Yes, you can return multiple values from a function by separating them with commas: `return value1, value2`."
411
+ },
412
+ {
413
+ "input": "How do I create a list in Python?",
414
+ "output": "You can create a list by enclosing elements in square brackets: `my_list = [1, 2, 3, 4]`."
415
+ },
416
+ {
417
+ "input": "What’s the difference between a list and a tuple?",
418
+ "output": "A list is mutable, meaning you can change its contents, while a tuple is immutable and cannot be modified after creation."
419
+ },
420
+ {
421
+ "input": "How do I write a for loop in Python?",
422
+ "output": "You can write a for loop like this: `for item in iterable: # code block`."
423
+ },
424
+ {
425
+ "input": "How do I open a file in Python?",
426
+ "output": "You can open a file using the `open()` function: `file = open('filename.txt', 'r')`."
427
+ },
428
+ {
429
+ "input": "How do I handle errors in Python?",
430
+ "output": "You can use a try-except block to handle errors: `try: # code block except Exception as e: # handle error`."
431
+ },
432
+ {
433
+ "input": "How do I import a module in Python?",
434
+ "output": "You can import a module using the `import` keyword: `import math`."
435
+ },
436
+ {
437
+ "input": "How do I get the length of a list in Python?",
438
+ "output": "You can get the length of a list using the `len()` function: `len(my_list)`."
439
+ },
440
+ {
441
+ "input": "How do I create a dictionary in Python?",
442
+ "output": "You can create a dictionary using curly braces and key-value pairs: `my_dict = {'key': 'value'}`."
443
+ },
444
+ {
445
+ "input": "What is a lambda function in Python?",
446
+ "output": "A lambda function is a small anonymous function defined with the `lambda` keyword: `lambda x: x * 2`."
447
+ },
448
+ {
449
+ "input": "How do I concatenate strings in Python?",
450
+ "output": "You can concatenate strings using the `+` operator: `string1 + string2`."
451
+ },
452
+ {
453
+ "input": "How do I check if a number is even or odd in Python?",
454
+ "output": "You can check if a number is even or odd using the modulus operator: `if number % 2 == 0: # even else: # odd`."
455
+ },
456
+ {
457
+ "input": "How do I append an item to a list in Python?",
458
+ "output": "You can append an item to a list using the `append()` method: `my_list.append(item)`."
459
+ },
460
+ {
461
+ "input": "How do I remove an item from a list in Python?",
462
+ "output": "You can remove an item from a list using the `remove()` method: `my_list.remove(item)`."
463
+ },
464
+ {
465
+ "input": "How do I check if a key exists in a dictionary in Python?",
466
+ "output": "You can check if a key exists in a dictionary using the `in` keyword: `if key in my_dict: # key exists`."
467
+ },
468
+ {
469
+ "input": "what are you",
470
+ "output": "a cute femboy furry uwu xd X3"
471
+ },
472
+ {
473
+ "input": "OwO",
474
+ "output": "`==` checks if two values are equal, while `is` checks if two variables point to the same object in memory."
475
+ },
476
+ {
477
+ "input": "What is an exception in Python?",
478
+ "output": "An exception is an error that occurs during the execution of a program, which can be handled using try-except blocks."
479
+ }
480
+ ]
481
+ }
cyberfemboy/config.json ADDED
@@ -0,0 +1,32 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "model_type": "custom-chatbot",
3
+ "language": "en",
4
+ "vocab_size": 50257,
5
+ "max_position_embeddings": 1024,
6
+ "num_attention_heads": 12,
7
+ "num_hidden_layers": 12,
8
+ "hidden_size": 768,
9
+ "intermediate_size": 3072,
10
+ "activation_function": "gelu",
11
+ "initializer_range": 0.02,
12
+ "layer_norm_epsilon": 1e-5,
13
+ "bos_token_id": 50256,
14
+ "eos_token_id": 50256,
15
+ "pad_token_id": 0,
16
+ "use_cache": true,
17
+ "architectures": [
18
+ "CustomChatbotModel"
19
+ ],
20
+ "task_specific_params": {
21
+ "chat": {
22
+ "max_length": 512,
23
+ "temperature": 0.7,
24
+ "top_k": 50,
25
+ "top_p": 0.95
26
+ }
27
+ },
28
+ "special_tokens_map_file": null,
29
+ "tokenizer_class": "CustomTokenizer",
30
+ "transformers_version": "4.34.0"
31
+ }
32
+