John NathanIs Purple Teaming the Answer to Evolving Cyber Threats?Cyber threats are evolving at an unprecedented rate, making it increasingly difficult for organizations to defend against them using…1d ago
InTowards Data SciencebyKenneth LeungExposing Jailbreak Vulnerabilities in LLM Applications with ARTKITAutomated prompt-based testing to extract hidden passwords in the popular Gandalf challengeSep 254
Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…Dec 5Dec 5
InTowards AIbyMohit Sewak, Ph.D.LLM Red Teaming for Dummies: A Beginner’s Guide to GenAI SecurityLearn the basics of LLM red teaming and how you can use it to secure your Generative AI systems, even with no prior experience.6d ago16d ago1
InGenerative AIbySimone TedeschiLLMs: How Safe Are They?Red Teaming Large Language Models with ALERTMay 22May 22
John NathanIs Purple Teaming the Answer to Evolving Cyber Threats?Cyber threats are evolving at an unprecedented rate, making it increasingly difficult for organizations to defend against them using…1d ago
InTowards Data SciencebyKenneth LeungExposing Jailbreak Vulnerabilities in LLM Applications with ARTKITAutomated prompt-based testing to extract hidden passwords in the popular Gandalf challengeSep 254
Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…Dec 5
InTowards AIbyMohit Sewak, Ph.D.LLM Red Teaming for Dummies: A Beginner’s Guide to GenAI SecurityLearn the basics of LLM red teaming and how you can use it to secure your Generative AI systems, even with no prior experience.6d ago1
InGenerative AIbySimone TedeschiLLMs: How Safe Are They?Red Teaming Large Language Models with ALERTMay 22
lainkusanagiObfuscating a Mimikatz Downloader to Evade Defender (2024)Hello everyone, today I will show how to obfuscate a Mimikatz downloader to bypass Defender detection.Oct 133
lainkusanagiObfuscating Office Macros to Evade DefenderHello everyone today I will show a method to obfuscate vba macros to make office files for phishing that evade Microsoft Defender.Dec 3
lainkusanagiMaking a Powershell Shellcode Downloader that Evades Defender (Without Amsi Bypass)Hello everyone, today i’m going to show how to modify a powershell shellcode runner to download shellcode and run it while also evading…Nov 19