AI Resources

Full list of AI resources shared by Nicole Carignan (VP AI Strategy Darktrace) on recent 'whoami' podcast apppearance:

Read more  ↩︎

Updates on the way

Apologies that this blog hasn't been updated in so long. Here are some announcements to get caught up:
I'll be speaking at Red Team Village at DEFCON 32. I'm also releasing a private c2 framework with this talk. (TEMPEST)

I launched the 'whoami' podcast. There's a few episodes out so far. You can check it out on X, youtube, or spotify. Here's some links:

  • X: https://x.com/Teach2Breach/status/1796297204149403816
  • youtube: https://www.youtube.com/channel/UCtmsPHGrW6fhnSI9wNmNHaw
  • spotify: https://open.spotify.com/show/76RZgAzX2HfrzavLsnxZ1w

Read more  ↩︎

Updates on the way


Read more  ↩︎

Emerging Use Cases for AI in Red Team

In this article, we will examine some of the emerging use cases for the inclusion of AI in Red Team operations. We will not attempt to examine all cases, but to hone in on a few which I feel are "just around the corner" and also the most immediately impactful to the security space. Namely, we will cover the use of AI for operational decision making, code generation, and runtime code synthesis. I'd like to include 'AI as a C2', but that should probably get it's own post (soon).

So let's examine the 3 use cases I've identified so far:

Read more  ↩︎

Coding with AI Part II: My Setup

I'd like to preface this write-up by first making fun of myself from the future. Not long from now, the title of this article will be akin to saying "Driving with a car" or "Cooking with electricity". You won't need or want to specify the AI part, that will just be assumed. It won't be "coding with AI", just coding.

Now that I've got that out of my system, let's get into it.

Read more  ↩︎

Cyphercon: AI for Red Team and Malware Development

Slides are posted at /cyphercon/slides.pdf.

Read more  ↩︎