Shuciran Pentesting Notes
Knowledge Base for Penetration Testing
HOME
CATEGORIES
TAGS
ARCHIVES
ABOUT
Weakness AI Code
Weakness AI Code
Tag
Weakness AI Code
1
Finding and Fixing Weaknesses in AI Code
27/11/2025
VBA Office Macro
Certutil.exe
Reverse Shells
Prompt Injection Step by Step
Using Ollama Modelfiles
AI
exploitation
wireless
file transfer
hackthebox
active directory
scr
windows privesc
mobile
linux enumeration
AI
exploitation
wireless
file transfer
hackthebox
active directory
scr
windows privesc
mobile
linux enumeration