E-books & Guides
May 1, 2025
Offensive Security in the age of AI
Think Like a Hacker. Break the LLM.A hands on guide for Red Team leaders to understand, exploit, and simulate the latest AI vulnerabilities. As AI systems like ChatGPT, Gemini, and open-source LLMs integrate into enterprise workflows, they open up new attack surfaces and new responsibilities for red teams. In this exclusive white paper, you’ll discover how OffSec’s Red Teaming LLM Learning Path empowers offensive
1 min read

Think Like a Hacker. Break the LLM.
A hands on guide for Red Team leaders to understand, exploit, and simulate the latest AI vulnerabilities.
As AI systems like ChatGPT, Gemini, and open-source LLMs integrate into enterprise workflows, they open up new attack surfaces and new responsibilities for red teams. In this exclusive white paper, you’ll discover how OffSec’s Red Teaming LLM Learning Path empowers offensive security leaders to:
- Map and enumerate real world LLM deployments.
- Execute advanced jailbreaks, prompt injections, and supply chain exploits.
- Simulate red team operations that challenge AI enabled defenses.
Download the eBook to future proof your red team against the next generation of adversarial threats.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-46986 – Arbitrary File Write in Camaleon CMS Leading to RCE
A vulnerability was discovered in Camaleon CMS authenticating attackers to write files on the file system which enabled them to execut remote code under certain conditions.
May 22, 2025
3 min read

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read