Adversarial Attacks on Vision Language Models
Exploring typographic and visual prompt injection techniques that bypass VLM safety guardrails through carefully crafted image perturbations.
Notes on offensive security, AI research, intelligence engineering, and the tools we build. Sporadically updated.
Exploring typographic and visual prompt injection techniques that bypass VLM safety guardrails through carefully crafted image perturbations.
How we built SecRecon's subdomain enumeration engine to identify dangling DNS records across Fortune 500 attack surfaces.
Using retrieval-augmented generation to correlate CVE databases, dark web feeds, and internal telemetry into actionable intel.
VANGUARD's approach to generating attack chains, deploying KQL detection rules, and measuring SOC response in real-time.
A framework for processing SOCMINT data streams to identify behavioral patterns, influence operations, and potential insider threats.