Skip to main content

Posts

Showing posts from May, 2024

PyTorch vs TensorFlow for Your Python Deep Learning Project

In this tutorial , you’ll learn: What the differences are between PyTorch and TensorFlow What tools and resources are available for each How to choose the best option for your specific use case You’ll start by taking a close look at both platforms, beginning with the slightly older TensorFlow. Then, you’ll explore PyTorch and some considerations to help you determine which choice is best for your project. Let’s get started!

Red Teaming Toolkit.

  This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.

LLM pentest: Leveraging agent integration for RCE.

This blog post delves into the class of vulnerability known as “Prompt Leaking” and its subsequent exploitation through “Prompt Injection,” which, during an LLM pentest engagement, allowed the unauthorized execution of system commands via Python code injection. In a detailed case study, we will explore the mechanics of these vulnerabilities, their implications, and the methodology used to exploit them.

Getting started with eBPF.

    eBPF is the new standard to program Linux kernel capabilities in a safe and efficient manner without requiring to change kernel source code or loading kernel modules. It has enabled a new generation of high performance tooling to be developed covering networking, security, and observability use cases. The best way to learn about eBPF is to read the book “What is eBPF” by Liz Rice . And the best way to have your first experience with eBPF programming is to walk through this lab, which takes the opensnoop example out of the book and teaches you to handle an eBPF tool, watch it loading its components and even add your own tracing into the source eBPF code. visit this site and get your hands dirty  ;)

Volatile Data Acquisition from Live Linux Systems: Part I.

 In the domain of digital forensics, volatile data assumes a paramount role, characterized by its ephemeral nature. Analogous to fleeting whispers in a bustling city, volatile data in Linux systems resides transiently within the Random Access Memory (RAM), encapsulating critical system configurations, active network connections, running processes, and traces of user activities. Once a Linux machine powers down, this ephemeral reservoir of information dissipates swiftly, rendering it irretrievable. read more....

Google’s AlphaFold 3 AI predicts the very building blocks of life.

Google DeepMind and Isomorphic Labs today unveiled AlphaFold 3 , a new artificial intelligence model that could greatly accelerate the development of new drugs and treatments. The research published today in Nature reveals AlphaFold 3’s unparalleled ability to predict the intricate structures and interactions of life’s essential molecules, including proteins, DNA and RNA among others. read more...