Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…2d ago
InTowards Data SciencebyKenneth LeungExposing Jailbreak Vulnerabilities in LLM Applications with ARTKITAutomated prompt-based testing to extract hidden passwords in the popular Gandalf challengeSep 254
lainkusanagiObfuscating Office Macros to Evade DefenderHello everyone today I will show a method to obfuscate vba macros to make office files for phishing that evade Microsoft Defender.4d ago4d ago
InTowards AIbyMohit Sewak, Ph.D.LLM Red Teaming for Dummies: A Beginner’s Guide to GenAI SecurityLearn the basics of LLM red teaming and how you can use it to secure your Generative AI systems, even with no prior experience.5h ago5h ago
InGenerative AIbySimone TedeschiLLMs: How Safe Are They?Red Teaming Large Language Models with ALERTMay 22May 22
Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…2d ago
InTowards Data SciencebyKenneth LeungExposing Jailbreak Vulnerabilities in LLM Applications with ARTKITAutomated prompt-based testing to extract hidden passwords in the popular Gandalf challengeSep 254
lainkusanagiObfuscating Office Macros to Evade DefenderHello everyone today I will show a method to obfuscate vba macros to make office files for phishing that evade Microsoft Defender.4d ago
InTowards AIbyMohit Sewak, Ph.D.LLM Red Teaming for Dummies: A Beginner’s Guide to GenAI SecurityLearn the basics of LLM red teaming and how you can use it to secure your Generative AI systems, even with no prior experience.5h ago
InGenerative AIbySimone TedeschiLLMs: How Safe Are They?Red Teaming Large Language Models with ALERTMay 22
lainkusanagiObfuscating a Mimikatz Downloader to Evade Defender (2024)Hello everyone, today I will show how to obfuscate a Mimikatz downloader to bypass Defender detection.Oct 133
Nipurna ShresthaBreaking RSA | A complete walkthroughBack again with another TryHackme CTF. Today we gone solve Breaking RSA challenge. This is a cryptographic challenge where we are break…3d ago
InInfoSec Write-upsbyIlias MavropoulosUltimate Guide to eWPT Certification: Training, Exam, Study Tips, Resources and Career ImpactA comprehensive review of the eWPT certification: detailed exam structure, training resources, and practical insights.Sep 11