Send from: cyberviser@proton.me
Subject: AI that writes your Splunk queries and triage reports — free trial
Hi [Name],
I'm reaching out because [Company] does exactly the kind of work Hancock was built for.
Hancock is an AI security agent (fine-tuned Mistral 7B on MITRE ATT&CK + NVD/CVE) that your team can hit with a single API call and get:
- Alert triage — severity, MITRE mapping, TP/FP verdict, containment steps
- SIEM queries — production-ready Splunk SPL / Elastic KQL / Sentinel KQL
- IR playbooks — full PICERL playbook for any incident type in seconds
- Pentest mode — recon, exploitation guidance, CVE analysis
It runs on your infra or ours. No data leaves your environment.
I'd love to set you up with a free trial. No pitch, no sales call required — just hit the API and see if it saves your analysts time.
→ https://0ai-cyberviser.github.io/0ai/
Worth 5 minutes?
— CyberViser cyberviser@proton.me
Hi [Name], I saw your work on [post/company/CTF] — impressive stuff.
I've been building Hancock, an AI agent fine-tuned specifically for pentest and SOC work. It generates SIEM queries, triages alerts, and writes PICERL playbooks via a simple REST API.
Just shipped v0.4.0. Would love to get your honest feedback — free access, no strings.
→ https://0ai-cyberviser.github.io/0ai/
Subject: Your analysts shouldn't be writing nmap one-liners from memory
Hi [Name],
Quick question: how much time does your team spend on report writing and CVE research per engagement?
Hancock is an AI built for pentest operators — it knows MITRE ATT&CK, 200k+ CVEs, and can write executive summaries, finding descriptions, and exploitation paths on command.
It's not ChatGPT with a security prompt. It's fine-tuned on real pentest data, deployed as a REST API you can wire into your existing workflow.
Free trial available. Takes 5 minutes to set up.
→ https://github.com/cyberviser/Hancock/tree/main/docs
— CyberViser | cyberviser@proton.me
Subject: Seed round — AI cybersecurity agent, $217B market
Hi [Name],
I'm building CyberViser — an AI-powered cybersecurity platform that automates the work of pentesters, SOC analysts, and CISOs through specialized LLMs.
Traction:
- Hancock v0.4.0 shipped — working REST API with 12 security-specific endpoints
- Fine-tuned Mistral 7B on MITRE ATT&CK, NVD/CVE, and pentest knowledge bases
- Live website + proprietary IP protection + Docker deployment
Ask: $500K seed to hire 2 ML engineers and scale NIM compute
The full business proposal: https://github.com/cyberviser/Hancock/blob/main/BUSINESS_PROPOSAL.md
Worth a 20-minute call?
— CyberViser | cyberviser@proton.me
Hey [handle],
I know you spend time in the terminal. Built something you might find useful:
Hancock — AI pentest assistant, fine-tuned on MITRE ATT&CK and CVE data. Ask it about recon, exploitation paths, CVEs, or have it write a Splunk hunt query.
Open source core: https://github.com/cyberviser/Hancock Portfolio hub: https://0ai-cyberviser.github.io/0ai/
Star it if it's useful. PRs welcome.
- MSSPs (search LinkedIn: "MSSP director" / "SOC manager")
- Pentest firms (Rapid7, Bishop Fox, NCC Group contractors)
- Bug bounty hunters (HackerOne, Bugcrowd top hunters)
- CISO communities (IANS, CISO Forum, LinkedIn CISO groups)
- Security conference speakers (DEF CON, Black Hat, BSides)
- Reddit: r/netsec, r/cybersecurity, r/AskNetsec
- Twitter/X: #infosec #pentesting #blueteam hashtags
- LinkedIn: Post the v0.1.0 announcement (template above)
- HackerNews: "Show HN: Hancock — fine-tuned LLM for pentest + SOC"
- DEF CON CFP: Submit a talk on AI-assisted offensive security