This video provides a tutorial on using Garrick, a large language model vulnerability scanner, to test custom chat bots. Garrick employs probes (test cases) and detectors to identify vulnerabilities, drawing from a large, constantly updated probe library. The tutorial focuses on testing a simple chat application called Wy chat, which utilizes Llama 3 and the Read More …
Author: tmack
Hacker TV – Start Web App Pentesting
Looking to step up your web app pentesting and bug bounty skills? In this video, Alex from TCM Security walks you through some of the best FREE tools and resources to help you sharpen your AppSec knowledge and techniques. Whether you’re just starting out or looking to boost your skill set, these tools are must-haves!
NetExec for SMB Enumeration
What is NetExec? NetExec (formerly CrackMapExec) is a powerful “Swiss Army knife” tool for offensive security engagements, particularly useful for interacting with Active Directory (AD) environments. For someone learning about offensive security, here’s a quick summary of how to use NetExec in an engagement, focusing on SMB enumeration: NetExec is a command-line tool that automates Read More …
Machine Learning – Journey Through the Mind of the Machine
The dream of creating artificial intelligence, of imbuing machines with the capacity to think and learn, is a long-standing one, stretching back centuries in philosophical thought and fictional tales. However, the formal history of Artificial Intelligence (AI) as a scientific discipline began in the mid-20th century, fueled by advancements in computing and a group of Read More …
Random Forests in Artificial Intelligence
Random Forests are an ensemble learning method widely used in artificial intelligence (AI) for classification and regression tasks. This technique builds upon the concept of decision trees, combining the predictions of multiple trees to enhance accuracy and robustness. By leveraging the strengths of individual decision trees while mitigating their weaknesses, Random Forests have become a Read More …
Integrating Docker into a CI/CD Pipeline
A typical Dockerized CI/CD pipeline, often orchestrated by tools like Jenkins, GitLab CI/CD, GitHub Actions, or Azure DevOps, follows these stages: Code Commit and Trigger: The process begins when a developer commits code to a version control system (VCS) like Git. This commit, particularly to a designated branch triggers the CI/CD pipeline automatically via a web Read More …
Docker for IT Professionals
Docker containers has moved beyond a buzzword to become a cornerstone of modern infrastructure and software deployment. At its core, Docker addresses long-standing challenges in application portability, dependency management, and environmental consistency, offering a totally new way to approach to how we build, ship, and run software. Historically, the phrase “it works on my machine” Read More …
Conference Video – A deep look into a Chinese advanced attack
These are the videos from Derbycon 2015:
Decision Trees in Artificial Intelligence
Decision trees are a popular and intuitive method used in artificial intelligence (AI) for classification and regression tasks. They represent a model in the form of a tree-like structure, where each internal node corresponds to a decision based on an input feature, each branch represents the outcome of that decision, and each leaf node signifies Read More …