<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4373740&amp;fmt=gif">

Navigating AI/ML Bug Bounty Hunting: Lessons from Hunting Pickle Deserialization Vulnerabilities

Introduction You know what’s better than just using AI/ML systems? Breaking...

Hunting with Vulnhuntr: Getting Your First CVE

Your Path to Your First CVE Begins Here Ready to bag your first CVE with Vulnhuntr? This...

GGUF File Format Vulnerabilities: A Guide for Hackers

Introduction As machine learning continues to rise in prominence, so does the need for...

A Technical Deep Dive: Backdooring AI Model File Formats

Introduction As AI and machine learning models become more embedded in modern...

Spotlight on m0kr4n3: Hacking AI/ML Systems with a CTF Mindset

Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers...

Spotlight on acciobugs: Uncovering Improper Access Control Vulnerabilities in lunary-ai/lunary

Introduction At huntr, we love to celebrate the incredible talent in our community who...

Developing Metasploit Python Modules the Easy Way

Introduction For a while now, the Metasploit Framework has supported modules written in...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a...

Critical Path Traversal Flaw Leads to Remote Code Execution in parisneo/lollms

Introduction Hello everyone! I am Nhien Pham, aka nhienit. Today, I would like to share...

Spotlight on mnqazi: Critical Findings in ChuanhuChatGPT and AI/ML Security

Introduction At huntr, we love to celebrate the incredible talent working with us to...