<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4373740&amp;fmt=gif">

Developing Metasploit Python Modules the Easy Way

Introduction For a while now, the Metasploit Framework has supported modules written in...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a...

Critical Path Traversal Flaw Leads to Remote Code Execution in parisneo/lollms

Introduction Hello everyone! I am Nhien Pham, aka nhienit. Today, I would like to share...

Spotlight on mnqazi: Critical Findings in ChuanhuChatGPT and AI/ML Security

Introduction At huntr, we love to celebrate the incredible talent working with us to...

How I Discovered a Server-Side Template Injection Vulnerability in berriai/litellm

Introduction Hi, everyone! My name is Mevlüt Akçam, aka mvlttt on huntr, and I'm excited...

Spotlight on PinkDraconian: From CTFs to huntr – A Hacker's Path

Intro At huntr, we love to celebrate the incredible talent working with us to build a...

Spotlight on zpbrent: Uncovering AI Vulnerabilities with huntr

Introduction At huntr, we love to celebrate the incredible talent working with us to...

Advanced API Attacks in ChatGPT

Hacking AI/ML: Advanced API Attacks in ChatGPT Server architecture leads to rate limit...