Home
SecureYourGear
Cancel

LLM Prompt Injection - Gandalf AI Security CTF

What is Prompt Injection? Prompt injection exploits how LLMs process instructions and data in the same format (natural language). Unlike databases that separate SQL commands from data, LLMs cannot...

ROP Chain Exploitation - ret2libc stack overflow

Understanding ROP: Return Oriented Programming ROP is a powerful exploitation technique that chains together existing snippets of code (called gadgets) already present in binaries. Here’s how it w...

SOC Automation Lab: Wazuh, TheHive, and Shuffle

Learn how to build a production-grade Security Operations Center (SOC) automation lab using Wazuh SIEM, TheHive case management, and Shuffle SOAR. This comprehensive guide walks you through creat...

WireGuard: VPN Tunnel

WireGuard: VPN Tunnel - Server & Client Configuration Online privacy and security offers many benefits. VPNs (Virtual Private Networks) have become essential tools for protecting personal da...

Bandit CTF: Levels 18-33

This is a complete, step-by-step walkthrough of OverTheWire Bandit levels 18-33. Follow along with each command and see exactly what output to expect. These advanced levels cover privilege escala...

Bandit CTF: Levels 0-17

This is a complete, step-by-step walkthrough of OverTheWire Bandit levels 0-17. Follow along with each command and see exactly what output to expect. Perfect for beginners learning Linux command-...