LLM Vulnerability Scanning with Garrick

This video provides a tutorial on using Garrick, a large language model vulnerability scanner, to test custom chat bots. Garrick employs probes (test cases) and detectors to identify vulnerabilities, drawing from a large, constantly updated probe library. The tutorial focuses on testing a simple chat application called Wy chat, which utilizes Llama 3 and the Read More …

Hacker TV – Start Web App Pentesting

Looking to step up your web app pentesting and bug bounty skills? In this video, Alex from TCM Security walks you through some of the best FREE tools and resources to help you sharpen your AppSec knowledge and techniques. Whether you’re just starting out or looking to boost your skill set, these tools are must-haves!

NetExec for SMB Enumeration

What is NetExec? NetExec (formerly CrackMapExec) is a powerful “Swiss Army knife” tool for offensive security engagements, particularly useful for interacting with Active Directory (AD) environments. For someone learning about offensive security, here’s a quick summary of how to use NetExec in an engagement, focusing on SMB enumeration: NetExec is a command-line tool that automates Read More …

Machine Learning – Journey Through the Mind of the Machine

The dream of creating artificial intelligence, of imbuing machines with the capacity to think and learn, is a long-standing one, stretching back centuries in philosophical thought and fictional tales. However, the formal history of Artificial Intelligence (AI) as a scientific discipline began in the mid-20th century, fueled by advancements in computing and a group of Read More …

Random Forests in Artificial Intelligence

Random Forests are an ensemble learning method widely used in artificial intelligence (AI) for classification and regression tasks. This technique builds upon the concept of decision trees, combining the predictions of multiple trees to enhance accuracy and robustness. By leveraging the strengths of individual decision trees while mitigating their weaknesses, Random Forests have become a Read More …

Integrating Docker into a CI/CD Pipeline

A typical Dockerized CI/CD pipeline, often orchestrated by tools like Jenkins, GitLab CI/CD, GitHub Actions, or Azure DevOps, follows these stages: Code Commit and Trigger: The process begins when a developer commits code to a version control system (VCS) like Git. This commit, particularly to a designated branch triggers the CI/CD pipeline automatically via a web Read More …

Docker for IT Professionals

Docker containers has moved beyond a buzzword to become a cornerstone of modern infrastructure and software deployment.  At its core, Docker addresses long-standing challenges in application portability, dependency management, and environmental consistency, offering a totally new way to approach to how we build, ship, and run software. Historically, the phrase “it works on my machine” Read More …

ICMP – Internet Control Message Protocol

The Internet Control Message Protocol (ICMP) is a fundamental protocol used in the Internet Protocol (IP) suite. It is primarily designed for network devices to communicate error messages and operational information regarding the status of the network. While ICMP is not used for transmitting data like TCP (Transmission Control Protocol) or UDP (User Datagram Protocol), Read More …

Decision Trees in Artificial Intelligence

Decision trees are a popular and intuitive method used in artificial intelligence (AI) for classification and regression tasks. They represent a model in the form of a tree-like structure, where each internal node corresponds to a decision based on an input feature, each branch represents the outcome of that decision, and each leaf node signifies Read More …