Tags
- advisory 1
- agents 35
- ai 8
- ai injection 1
- aiml 58
- appsec 4
- ascii 1
- assurance 1
- attackgraph 1
- bard 1
- blog 1
- blue 21
- book 5
- books 3
- breaches 1
- bug bounty 1
- bugbounty 3
- c2 1
- chatbot 2
- chatgpt 19
- cicd 1
- cloud 4
- code 3
- coffeeshop 1
- conference 13
- cookies 5
- cookiesforall 1
- copilot 1
- credentials 1
- crypto 1
- cve 1
- data 1
- data exfiltration 1
- db 1
- devops 1
- documentation 1
- ebpf 8
- exfil 21
- flipper 1
- fun 1
- gcp 1
- gemini 1
- hardware 2
- homefield advantage 3
- huskyai 22
- kpi 1
- llm 75
- machine learning 86
- macos 1
- memories 1
- metrics 3
- mitigation 1
- mitre 1
- monte carlo 1
- month of ai bugs 31
- msrc 1
- passthecookie 2
- pentest 21
- pentesting 16
- philosophy 1
- phishing 4
- plugins 4
- post-exploitation 4
- presentations 1
- principles 2
- privacy 2
- program 2
- programming 1
- prompt injection 51
- purple 1
- rce 1
- red 99
- red team 1
- red teaming 1
- research 23
- ropci 1
- sdl 1
- story 1
- strategy 5
- supplychain 1
- testing 7
- threat modeling 1
- threats 46
- tool 7
- tools 8
- ttp 51
- video 10
- web 1
- webapp 2
- windows 1
- xss 1
- zombai 2
- 兵法 1