Little teaser only...
About us
https://www.youtube.com/@hackidle
- Website
-
https://hackidle.com
External link for hackIDLE
- Industry
- Computer and Network Security
- Company size
- 1 employee
- Type
- Privately Held
Employees at hackIDLE
Updates
-
hackIDLE reposted this
The Roll Up #001: if you read nothing else, read this part: Value and learning live in the friction. When you dissolve that friction with AI and then take the AI away, the skill it was standing in for gets less practice. If you're using LLMs and coding agents to solve problems faster, you need to be reaching for higher-friction work somewhere else to keep growing. If you're just using AI to do the same things you already do, you may be trading away some of the practice that keeps those skills sharp. Use AI to extend yourself. Learn something new. Push into directions you wouldn't have gone
-
Purple Circuit Dream — audio-reactive ASCII music video Built this with Hermes Agent: a full 60s music video where every frame is procedurally generated ASCII art from my Suno track 🫨 Pipeline: - audio feature extraction (low / mid / high bands) - feature-to-visual mapping (motion, hue, glitch intensity) - procedural ASCII frame synthesis (Python + NumPy + Pillow) - encoding/muxing with ffmpeg Visual arc: nebula bloom → spiral tunnel → matrix rain → finale burst Stack: Hermes Agent, Python, NumPy, Pillow, ffmpeg, Suno Repo: https://lnkd.in/deQnQafs https://lnkd.in/ertp9kFD Nous Research is doing awesome things over there #HermesAgent #GenerativeArt #MusicTech #CreativeCoding #ASCII #Python #FFmpeg #Suno
-
If you enjoy myctrl.tools and grclanker.com, I think you'll want to stay in the loop for hackIDLE's new newsletter : https://www.hackidle.com/
-
-
hackIDLE reposted this
myctrl.tools update of the day: - connecting the API I made last year (https://lnkd.in/es4Gsa7q) to myctrl.tools so that the entire CMVP database is searchable and users will be able to add technologies and relevant crypto modules to their gap assessments - FIPsify your life #fips #cryptography #CMVP
-
-
hackIDLE reposted this
🧪 👽 hackIDLE-NIST-Coder v1.1 is now live! Based on the NIST dataset I put together 💻 Runs on YOUR laptop: • Only 4.4GB model size (Q4_K_M quantization) • Works great on 8GB+ RAM systems • No GPU required - runs on CPU • Perfect for M series Macs, Windows, Linux 🌟 What makes this unique: • Fine-tuned on Qwen2.5-Coder-7B specifically for technical cybersecurity content • Combines deep NIST knowledge with code generation capabilities • Can write Python/Terraform for AWS compliance automation • Understands GRC workflows, RMF, and CSF 2.0 🐦⬛ Real-world use cases: - Generate AWS security policies aligned with NIST controls - Automate compliance documentation - Explain complex security frameworks in plain language - Write scripts for continuous monitoring and audit automation 🆓 Fully open source (CC0 Public Domain): Available NOW on: • Ollama: ollama pull etgohome/hackidle-nist-coder:v1.1 • HuggingFace: MLX & GGUF formats • LM Studio: Search "hackidle-nist-coder" No cloud API costs. No data leaves your machine. Run it locally with confidence. Or fire up Wireshark to see if ET is phoning home 🤣 🔗 Model: https://lnkd.in/erQ8_v28 #Cybersecurity #NIST #OpenSource #AI #MachineLearning #GRC #InfoSec #CloudSecurity #ZeroTrust #AIforSecurity #LLM #LocalAI
-
-
hackIDLE reposted this
grclanker.com ...that's it, no wall of txt lol
-
-
hackIDLE reposted this
Just a quick video on the new AI gap assessment feature in myctrl.tools Definitely planning to add more features and more frameworks shortly Cool news is that there will (shortly as well) be a way to deploy and do gap assessments in your own environment Even though myctrl.tools doesn't have a server and I don't process your data (everything is held in your browser); I do know that some people might actually want to run gap assessments on their own infrastructure so it is coming soon 🫡 😎 🧪
-
hackIDLE reposted this
Memorizing National Institute of Standards and Technology (NIST) controls is not the skill you think it is. I've always believed that what makes someone good at security isn't knowing control numbers off the top of their head — it's knowing how to work through a problem. How to assess risk, how to think about what a control is actually trying to achieve, and how to apply it to a system that doesn't look like the textbook example. Compliance is problem-solving, not memorization. So I built a Claude Code plugin that holds the reference material so you don't have to. 11 NIST publications — SP 800-53, 800-171, CSF 2.0, FIPS, baselines, cross-reference mappings — all structured so Claude can pull the right context exactly when you need it. Load it on demand, just like an agent should (😎 my name is bond btw) Spend your brainpower on the hard part: understanding what you're actually securing and why. It'll be interesting to see how this context leads to better build decisions. claude plugin install ethanolivertroy/nist-cybersecurity-skills
-
-
hackIDLE reposted this
myctrl.tools has an AI assist feature now (the whole thing is still kinda early) Bring your own Anthropic API key 😎 It's better advice than your typical GRC Advisor (jk...no really) I might (probably) will add support for other LLMs soon