<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4373740&amp;fmt=gif">

A Technical Deep Dive: Backdooring AI Model File Formats

Introduction As AI and machine learning models become more embedded in modern...

Spotlight on m0kr4n3: Hacking AI/ML Systems with a CTF Mindset

Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers...

Spotlight on acciobugs: Uncovering Improper Access Control Vulnerabilities in lunary-ai/lunary

Introduction At huntr, we love to celebrate the incredible talent in our community who...

Developing Metasploit Python Modules the Easy Way

Introduction For a while now, the Metasploit Framework has supported modules written in...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a...

Critical Path Traversal Flaw Leads to Remote Code Execution in parisneo/lollms

Introduction Hello everyone! I am Nhien Pham, aka nhienit. Today, I would like to share...

Spotlight on mnqazi: Critical Findings in ChuanhuChatGPT and AI/ML Security

Introduction At huntr, we love to celebrate the incredible talent working with us to...

How I Discovered a Server-Side Template Injection Vulnerability in berriai/litellm

Introduction Hi, everyone! My name is Mevlüt Akçam, aka mvlttt on huntr, and I'm excited...

Spotlight on PinkDraconian: From CTFs to huntr – A Hacker's Path

Intro At huntr, we love to celebrate the incredible talent working with us to build a...

Spotlight on zpbrent: Uncovering AI Vulnerabilities with huntr

Introduction At huntr, we love to celebrate the incredible talent working with us to...