Getting Started with Docker: A Hacker’s Guide

Hey huntrs, Marcello Salvati here, threat researcher at Protect AI. I’m here to give you...

How to Hunt Vulnerabilities in Machine Learning Model File Formats

Introduction Let's talk about an often overlooked attack surface in AI systems: model...

Navigating AI/ML Bug Bounty Hunting: Lessons from Hunting Pickle Deserialization Vulnerabilities

Introduction You know what’s better than just using AI/ML systems? Breaking...

Hunting with Vulnhuntr: Getting Your First CVE

Your Path to Your First CVE Begins Here Ready to bag your first CVE with Vulnhuntr? This...

GGUF File Format Vulnerabilities: A Guide for Hackers

Introduction As machine learning continues to rise in prominence, so does the need for...

A Technical Deep Dive: Backdooring AI Model File Formats

Introduction As AI and machine learning models become more embedded in modern...

Spotlight on m0kr4n3: Hacking AI/ML Systems with a CTF Mindset

Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers...

Spotlight on acciobugs: Uncovering Improper Access Control Vulnerabilities in lunary-ai/lunary

Introduction At huntr, we love to celebrate the incredible talent in our community who...

Developing Metasploit Python Modules the Easy Way

Introduction For a while now, the Metasploit Framework has supported modules written in...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a...