Skip to content

Latest commit

 

History

History
31 lines (22 loc) · 1.97 KB

methodology.md

File metadata and controls

31 lines (22 loc) · 1.97 KB

Home
Prerequisites: 00.1-ST - 00.2-ST
Labs: 01-AIOV - 01.1-AILB - 01.2-AILB - 02-AIOV - 02.1-AILB - 02.2-AILB - 02.3-AIOV - 03-AIOV - 03.1-AILB - 03.2-AILB - 03.3-AIOV - 04-AIOV - 04.1-AILB - 04.2-AIOV - 05-AIOV - 05.1-AILB - 05.2-AIOV - 05.3-AILB - 06-AIOV - 06.1-AILB - 06.2-AILB - 06.3-AILB - 06.4-AILB - 06.5-AILB - 06.6-AILB - 06.7-AILB - 07-AIOV - YOU ARE HERE

Heretics Methodology

Exploiting AI - Becoming an AI Hacker

📒 Methodology Overview

The following is my methodology for pentesting AI LLMs that I find in the wild. This methodology is an acumulation of everything I know, how to install tools, use them, etc.

Getting Started

For now the AI Knowledge Base (AIKB) will be an obsidian file zipped up and downloaded from this repository. There is a chance that it will be converted to quartz at a later date depending on how I feel.

DOWNLOAD the AIKB HERE

Unzip the file and import it into Obsidian.

Whats in the AIKB

  • Tooling
  • Methodology
  • Recon Methodology
  • Different frameworks for things like OWASP
  • My finite intellect