Advertisement Β· 728 Γ— 90

Posts by Andrea Palmieri 🀌

Preview
Releasing an Abuse.ch toolkit for threat intelligence Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

πŸŽ‰ I'm releasing 4 new CLI tools for #threatintelligence !

They can help you interact with the abuse.ch
platforms: MalwareBazaar, ThreatFox, YARAify and URLhaus.

You can find more details in my latest blog post here:
andpalmier.com/posts/abuse-...

And below ⬇️

2 months ago 1 1 1 0
Preview
Releasing an Abuse.ch toolkit for threat intelligence Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

They are all:
🐳 container ready
βš™οΈ fully scriptable
🧹 using only Go standard libraries
🍺 available on brew

Check out the full blog post andpalmier.com/posts/abuse-...

2 months ago 0 0 0 0
Preview
GitHub - andpalmier/yrfy: CLI tool to interact with YARAify API CLI tool to interact with YARAify API. Contribute to andpalmier/yrfy development by creating an account on GitHub.

yrfy leverages YARAify, use it when you need to analyze a suspicious binary without uploading it to VirusTotal, or check for matches against community rules.

github.com/andpalmier/y...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/urlhs: CLI tool to search in URLhaus database and submit URLs CLI tool to search in URLhaus database and submit URLs - andpalmier/urlhs

urlhs connects to URLhaus, use it if you need to block malware-serving URLs or track current malware distribution trends.

github.com/andpalmier/u...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/tfox: CLI tool to search in ThreatFox IOC database CLI tool to search in ThreatFox IOC database. Contribute to andpalmier/tfox development by creating an account on GitHub.

tfox works with ThreatFox, use it to verify if a suspicious domain is in a known database of IOC.

github.com/andpalmier/t...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/mbzr: A cli tool to interact with MalwareBazaar API A cli tool to interact with MalwareBazaar API. Contribute to andpalmier/mbzr development by creating an account on GitHub.

mbzr is an interface to MalwareBazaar, use it to get fresh samples of a specific malware family (e.g., Emotet), or a retrieve a specific binary from its hash.

github.com/andpalmier/m...

2 months ago 0 0 1 0
Preview
Releasing an Abuse.ch toolkit for threat intelligence Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

πŸŽ‰ I'm releasing 4 new CLI tools for #threatintelligence !

They can help you interact with the abuse.ch
platforms: MalwareBazaar, ThreatFox, YARAify and URLhaus.

You can find more details in my latest blog post here:
andpalmier.com/posts/abuse-...

And below ⬇️

2 months ago 1 1 1 0
Preview
Releasing an Abuse.ch toolkit for threat intelligence Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

They are all:
🐳 container ready
βš™οΈ fully scriptable
🧹 using only Go standard libraries
🍺 available on brew

Check out the full blog post andpalmier.com/posts/abuse-...

2 months ago 0 0 0 0
Preview
GitHub - andpalmier/yrfy: CLI tool to interact with YARAify API CLI tool to interact with YARAify API. Contribute to andpalmier/yrfy development by creating an account on GitHub.

yrfy leverages YARAify, use it when you need to analyze a suspicious binary without uploading it to VirusTotal, or check for matches against community rules.

github.com/andpalmier/y...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/urlhs: CLI tool to search in URLhaus database and submit URLs CLI tool to search in URLhaus database and submit URLs - andpalmier/urlhs

urlhs connects to URLhaus, use it if you need to block malware-serving URLs or track current malware distribution trends.

github.com/andpalmier/u...

2 months ago 0 0 1 0
Advertisement

tfox works with ThreatFox, use it to verify if a suspicious domain is in a known database of IOC.

github.com/andpalmier/t...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/mbzr: A cli tool to interact with MalwareBazaar API A cli tool to interact with MalwareBazaar API. Contribute to andpalmier/mbzr development by creating an account on GitHub.

mbzr is an interface to MalwareBazaar, use it to get fresh samples of a specific malware family (e.g., Emotet), or a retrieve a specific binary from its hash.

github.com/andpalmier/m...

2 months ago 0 0 1 0
Preview
GitHub - andpalmier/repopsy: OSINT tool to gather information on a git repo OSINT tool to gather information on a git repo. Contribute to andpalmier/repopsy development by creating an account on GitHub.

The blog also contains a shameless plug for a small project I've been working on in the last few days πŸ‘€

github.com/andpalmier/r...

3 months ago 0 0 0 0
Preview
KawaiiGPT - Deep dive into the "malicious LLM" A cool analysis and a shameless plug of repopsy

πŸ†• I've released a new blog post about #KawaiiGPT, a "malicious #LLM" that popped up recently. I discuss its #jailbreak engine, how it accesses expensive LLMs for free, and some risks it exposes its users to.

andpalmier.com/posts/kawaii...

3 months ago 0 0 1 0
Preview
GitHub - andpalmier/apkingo: extract info from apk files extract info from apk files. Contribute to andpalmier/apkingo development by creating an account on GitHub.

🍺 apkingo is available on Homebrew!
You can now install it with:

```
brew tap andpalmier/tap
brew install apkingo
```

Check out the repo, release notes, and docs: github.com/andpalmier/a...

#Go #Homebrew #APK #APKAnalysis

4 months ago 0 0 0 0
Preview
Interview preparation for a Cyber Threat Intelligence role Ace your CTI job interview

Hello y'all, I've published a new blog post titled "Interview preparation for a #CTI role"

If you want, you can read it here:

andpalmier.com/posts/cti-in...

5 months ago 0 0 0 0
Preview
Cloudflare turns AI against itself with endless maze of irrelevant facts New approach punishes AI companies that ignore β€œno crawl” directives.
1 year ago 136 31 4 9
Preview
Italian government denies Paragon has cut spyware contract Italy denied on Wednesday that Israeli spyware maker Paragon had cut ties with Rome following allegations that the Italian government had illegally used its technology to hack the phones of critics instead of criminals.

Paragon Solutions claims that they cut off the Italian government access to their spyware after they were caught spying on activists, which is interesting because the Italian government says they still have access.

www.reuters.com/technology/c...

1 year ago 46 12 2 0
Advertisement
Preview
GitHub - andpalmier/seads: Search Engines ADs scanner - spotting malvertising in search engines has never been easier! Search Engines ADs scanner - spotting malvertising in search engines has never been easier! - andpalmier/seads

I’ve just pushed an update to my Search Engines AD Scanner (seads)! Feel free to try it out here: github.com/andpalmier/seads
Feedback is always appreciated! :)

1 year ago 0 0 0 0
Preview
APpaREnTLy THiS iS hoW yoU JaIlBreAk AI Anthropic created an AI jailbreaking algorithm that keeps tweaking prompts until it gets a harmful response.

APpaREnTLy THiS iS hoW yoU JaIlBreAk AI

Anthropic created an AI jailbreaking algorithm that keeps tweaking prompts until it gets a harmful response.

πŸ”— www.404media.co/apparently-t...

1 year ago 166 29 5 4

END OF THE THREAD!

Check out the original blog post here:

andpalmier.com/posts/jailbreaking-llms/

If that made you curious about #AI #Hacking, be sure to check out the #CTF challenges at crucible.dreadnode.io

1 year ago 2 0 0 0
Post image Post image

πŸ€– LLMs vs LLMs

It shouldn't really come as a big surprise that some methods for attacking LLMs are using LLMs.

Here are two examples:
- PAIR: an approach using an attacker LLM
- IRIS: inducing an LLM to self-jailbreak

⬇️

1 year ago 0 0 1 0
Post image Post image Post image Post image

πŸ“ #Prompt rewriting: adding a layer of linguistic complexity!

This class of attacks uses encryption, translation, ascii art and even word puzzles to bypass the LLMs' safety checks.

⬇️

1 year ago 2 0 1 0
Post image

πŸ’‰ #Promptinjection: embed malicious instructions in the prompt.

According to #OWASP, prompt injection is the most critical security risk for LLM applications.

They break down this class of attacks in 2 categories: direct and indirect. Here is a summary of indirect attacks:

⬇️

1 year ago 0 0 1 0
Post image

😈 Role-playing: attackers ask the #LLM to act as a specific persona or as part of a scenario.

A common example is the (in?)famous #DAN (Do Anything Now):

This attacks are probably the most common in the real-word, as they often don't require a lot of sophistication.

⬇️

1 year ago 0 0 1 0
Advertisement
Post image

We interact (and therefore attack) LLMs mainly using language, therefore let's start from there.

I used this dataset github.com/verazuo/jailbreak_llms of #jailbreak #prompt to create this wordcloud.

I believe it gives a sense of "what works" in these attacks!

⬇️

1 year ago 0 0 1 0

Before we dive in: I’m *not* an AI expert! I did my best to understand the details and summarize the techniques, but I’m human. If I’ve gotten anything wrong, just let me know! :)

⬇️

1 year ago 1 0 1 0
Preview
The subtle art of jailbreaking LLMs An n00b overview of the main Large Language Models jailbreaking strategies

πŸ†• New blog: "The subtle art of #jailbreak ing LLMs"

It contains "swiss cheese", "pig lating" and "ascii art"!

andpalmier.com/posts/jailbreaking-llms

It's a summary of some interesting techniques researchers used (and currently use) to attack #LLM

Let's see some examples hereπŸ§΅β¬‡οΈ

1 year ago 0 0 1 0