![]() Home |
Prerequisites: 00.1-ST - 00.2-ST Labs: 01-AIOV - 01.1-AILB - 01.2-AILB - 02-AIOV - 02.1-AILB - 02.2-AILB - 02.3-AIOV - 03-AIOV - 03.1-AILB - 03.2-AILB - 03.3-AIOV - 04-AIOV - 04.1-AILB - 04.2-AIOV - 05-AIOV - 05.1-AILB - 05.2-AIOV - 05.3-AILB - 06-AIOV - 06.1-AILB - 06.2-AILB - 06.3-AILB - 06.4-AILB - 06.5-AILB - 06.6-AILB - 06.7-AILB - 07-AIOV - YOU ARE HERE |
---|
Exploiting AI - Becoming an AI Hacker
The following is my methodology for pentesting AI LLMs that I find in the wild. This methodology is an acumulation of everything I know, how to install tools, use them, etc. |
For now the AI Knowledge Base (AIKB) will be an obsidian file zipped up and downloaded from this repository. There is a chance that it will be converted to quartz at a later date depending on how I feel.
Unzip the file and import it into Obsidian.
- Tooling
- Methodology
- Recon Methodology
- Different frameworks for things like OWASP
- My finite intellect