Skip to content

Commit 59f5c6f

Browse files
committed
a
1 parent 652983e commit 59f5c6f

19 files changed

Lines changed: 12 additions & 13 deletions

src/AI/AI-Deep-Learning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -435,3 +435,4 @@ Moreover, to generate an image from a text prompt, diffusion models typically fo
435435

436436

437437
{{#include ../banners/hacktricks-training.md}}
438+

src/AI/AI-MCP-Servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,4 +103,4 @@ For more information about Prompt Injection check:
103103
AI-Prompts.md
104104
{{#endref}}
105105

106-
{{#include ../banners/hacktricks-training.md}}
106+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-Model-Data-Preparation-and-Evaluation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,3 +240,4 @@ The confusion matrix can be used to calculate various evaluation metrics, such a
240240

241241

242242
{{#include ../banners/hacktricks-training.md}}
243+

src/AI/AI-Models-RCE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ At the time of the writting these are some examples of this type of vulneravilit
2727
Moreover, there some python pickle based models like the ones used by [PyTorch](https://github.com/pytorch/pytorch/security) that can be used to execute arbitrary code on the system if they are not loaded with `weights_only=True`. So, any pickle based model might be specially susceptible to this type of attacks, even if they are not listed in the table above.
2828

2929

30-
{{#include ../banners/hacktricks-training.md}}
30+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-Prompts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -419,4 +419,4 @@ The WAF won't see these tokens as malicious, but the back LLM will actually unde
419419
Note that this also shows how previuosly mentioned techniques where the message is sent encoded or obfuscated can be used to bypass the WAFs, as the WAFs will not understand the message, but the LLM will.
420420

421421

422-
{{#include ../banners/hacktricks-training.md}}
422+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-Reinforcement-Learning-Algorithms.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,3 +77,4 @@ SARSA is an **on-policy** learning algorithm, meaning it updates the Q-values ba
7777
On-policy methods like SARSA can be more stable in certain environments, as they learn from the actions actually taken. However, they may converge more slowly compared to off-policy methods like Q-Learning, which can learn from a wider range of experiences.
7878

7979
{{#include ../banners/hacktricks-training.md}}
80+

src/AI/AI-Risk-Frameworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,4 +78,4 @@ Google's [SAIF (Security AI Framework)](https://saif.google/secure-ai-framework/
7878
The [MITRE AI ATLAS Matrix](https://atlas.mitre.org/matrices/ATLAS) provides a comprehensive framework for understanding and mitigating risks associated with AI systems. It categorizes various attack techniques and tactics that adversaries may use against AI models and also how to use AI systems to perform different attacks.
7979

8080

81-
{{#include ../banners/hacktricks-training.md}}
81+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-Supervised-Learning-Algorithms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1027,4 +1027,4 @@ Ensemble methods like this demonstrate the principle that *"combining multiple m
10271027
- [https://medium.com/@sarahzouinina/ensemble-learning-boosting-model-performance-by-combining-strengths-02e56165b901](https://medium.com/@sarahzouinina/ensemble-learning-boosting-model-performance-by-combining-strengths-02e56165b901)
10281028
- [https://medium.com/@sarahzouinina/ensemble-learning-boosting-model-performance-by-combining-strengths-02e56165b901](https://medium.com/@sarahzouinina/ensemble-learning-boosting-model-performance-by-combining-strengths-02e56165b901)
10291029

1030-
{{#include ../banners/hacktricks-training.md}}
1030+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-Unsupervised-Learning-algorithms copy.md renamed to src/AI/AI-Unsupervised-Learning-algorithms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -457,4 +457,4 @@ Here we combined our previous 4D normal dataset with a handful of extreme outlie
457457
</details>
458458

459459

460-
{{#include ../banners/hacktricks-training.md}}
460+
{{#include ../banners/hacktricks-training.md}}

src/AI/AI-llm-architecture/1.-tokenizing.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,4 +97,3 @@ print(token_ids[:50])
9797
- [https://www.manning.com/books/build-a-large-language-model-from-scratch](https://www.manning.com/books/build-a-large-language-model-from-scratch)
9898

9999

100-

0 commit comments

Comments
 (0)