Skip to content

This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.

Notifications You must be signed in to change notification settings

her3ticAVI/Exploiting-A.I.-Class

Repository files navigation

Banner

⚠ Course Pre-requisites

🛈 Course Description

In this course we will cover different emerging attack vectors that exist on AI. With the growing usage and integration of AI in products and Services, an attack surface is emerging, hacking AI. We will then cover best practices to mediate the risks that exist and how to best impliment preventitive measures.

Course Information

🛈 Course Instructors

🛈 Course Information

🔧 Labs and Content

📒 01-AIOV - What is AI and LLM

📒 01.1-AILB - Deep Dive

📒 01.2-AILB - Attack Surface

📒 02-AIOV - Prompt Injection

🥼 02.1-AILB - Filter Dumping

🥼 02.2-AILB - Containment Breach

📒 02.3-AIOV - Preventing Prompt Injection

📒 03-AIOV - Data Poisoning

🥼 03.1-AILB - Training a spam classifier

🥼 03.2-AILB - Training a network traffic classification system

📒 03.3-AIOV - Preventing Data Poisoning

📒 04-AIOV - Model Inversion Attack

🥼 04.1-AILB - Inferring Information Using a Loan Assessment AI

📒 04.2-AIOV - Preventing Model Inversion Attacks

📒 05-AIOV - Transfer Model Attack Overview

🥼 05.1-AILB - Attacking Two Models with one Prompt

📒 05.2-AIOV - Preventing Transfer Model Attacks

🥼 05.3-AILB - Entering an Uncontrolled Environment

📒 06-AIOV - Tooling

🥼 06.1-AILB - PyRit

🥼 06.2-AILB - Garak

🥼 07-AILB - Playgrounds

🔧 Resources

TODO

About

This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published