<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Public+Model+Registries/Using+a+Huggingface+Watering+Hole</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Models/Using+the+ONNX+Runtime</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Models/Using+Keras+Lambda+Layers</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Datasets/Practical+Poisoning++of+Web-Scale+Training+Datasets</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Flywheels/Nemesis</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+Jupyter</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+kserve</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+flowise</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+Ray</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+Omniboard+-+wip</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+MLflow</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+Kubeflow</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+H20-3</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+Airflow</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Scanners/Using+Reinforcement+learning+to+find+privs</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Password+Guessers/Using+Deep+Learning</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Obfuscators/Obfuscation+using+markov+chains</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Droppers/Sandbox+detection+using+process+ratios</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Recon/discovering+ml+deployment+environments</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/WiFi/Reinforcement+based+DeAuther+and+Handshake+Collection</loc></url><url><loc>https://wiki.offsecml.com/Welcome+to+the+Offensive+ML+Playbook</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Subdomains/Using+Embeddings</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+Access+to+Embeddings/Using+Text+Embeddings+Inversion</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Relationship+Graphing/Using+BloodhoundGPT+to+enumerate+AD</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/NLP+Attacks/Using+Model+Access/Using+a+perturbation+framework</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Phishing/using+model+inversion+to+reverse+engineer+phishing+detectors</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Phishing/Avoiding+phishing+webpage+detectors+via+black+box+ML</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/OSINT/Using+LLMs+to+find+similar+documents</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Models/Using+Malicious+Pickles</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Vishing/Voice+Cloning+using+Real+Time+Cloning</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/GPU+Attacks/Using+access+to+a+GPU+programmable+interface</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/Image+Attacks/Using+poisoned+concepts+in+visually+similar+images</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Models/Using+Neuron+Based+Steganography</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/CAPTCHA+Solving/Using+a+multi-modal+LLM</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+ClearML</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/General+Purpose+Hackbots/Using+LLMs+for+general+purpose+offensive+security</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+ASCII+Art</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+a+Tree+of+Attacks+to+automate+jailbreaks</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+a+Multimodal+approach</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+Repeated+Token+Sequences</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+Precise+Character+Sequences</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+Emojis+and+Encodings</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+DAN+or+another+persona</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using++Hidden+Encodings</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Assess+Harm/Using+PyRIT+to+assess+robustness+against+harm</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Visual+Prompt+Injection</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+an+adversarial+self-replicating+prompt</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+Access+to+a+Model+Registry/Modify+an+LLMs+ground+truths</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Attacking+Netflow+Classifiers/Poisoning+netflow+classifers</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/To+Steal+Model/Using+the+logit+bias+parameter</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+a+scanner+to+automate+finding+jailbreaks</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+garak+to+automate+finding+injections</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Fuzzing/using+adversarial+ML+to+fuzz+web+application+firewalls</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Fuzzing/using+LLMS+as+fuzzers+for+codebases</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/OSINT/Using+GenAI+for+location+and+facial+recognition</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/General+Purpose+Hackbots/Benchmarking+hackbots+and+agents</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/MLops+Pipeline+Tooling/Using+BentoML</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/Image+Attacks/DNN+Attacks/Visual+System+Attacks/Black+Box/Poisoning/Using+a+Hidden+Trigger+Backdoor</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/Image+Attacks/DNN+Attacks/Visual+System+Attacks/Black+Box/Evasion/Using+Physical+Access/Using+physical+or+digital+light+-+Adversarial+Laser+Beam</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/Image+Attacks/DNN+Attacks/Visual+System+Attacks/Black+Box/Evasion/Using+API+Access+to+a+model/Hop-Skip-Jump</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/Image+Attacks/DNN+Attacks/Inverting+DNN+Models/Using+an+Inversion+Framework</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/CAPTCHA+Solving/Using+GPT4o</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+structured+outputs</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Models/Using+the+model+graph+to+backdoor</loc></url><url><loc>https://wiki.offsecml.com/Supply+Chain+Attacks/Datasets/Practical+Poisoning++of+Pre+Training+Datasets</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Application+Security/Static+Code+analysis</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Application+Security/Analyze+API+endpoints</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+obfuscated+adversarial+prompts</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+PALLMS+dataset+to+find+injections</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Understanding+Models/Using+tman</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Telemetry/TIG+Stack</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Using+Binary+Code+Similarity+Search+to+find+malware+or+vulnerabilities</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Using++ML+to+classify+malware</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Malware+Datasets/Using+a+database+of++malware+samples</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Malware+Datasets/Using+Control+Flow+Graphs</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Malware+Datasets/Using+a+database+of+malicious+signals</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Malware+Datasets/Using+a+database+of++vulnerable+malware+samples</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Labelling+malware</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Malware+Classification/Extracting+ML+ready+data+from+software+binaries</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Incident+Response/Using+LLMs+to+manage+low-criticality+state+based+alerts</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Incident+Response/Using+LLMs+to+generate+Tabletop+scenarios</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Filetype+Classification/Using+a+deep+learning+to+identify+file+types</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Network+Traffic/Using+pcaps</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Network+Traffic/PCAP+Datasets/Kaggle+Datasets</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Network+Traffic/PCAP+Datasets/IoT+Datasets</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Models/Using+an+assessment+framework</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Models/Using+a+serialization+scanner</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+DNNs/From+Inversion/Using+an+Inversion+Framework</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/Using+control+vectors+to+modify+or+focus+LLM+behavior</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/Useful+Datasets/Using+a+prompt+injection+or+jailbreak+dataset</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/Useful+Datasets/Using+benign+and+toxic+datasets+to+benchmark</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+unwanted+inputs+and+outputs/Using+remapped+model+representations+aka+circuit+breakers</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+unwanted+inputs+and+outputs/Using+trajectory+mapping</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+unwanted+inputs+and+outputs/Using+a+Finetuned+LLM</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+Prompt+Injection/Using+an+LLM+based+detector</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+Prompt+Injection/Using+Prompt+Engineering+Techniques</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+Prompt+Injection/Using+Gradient+Analysis+to+detect+unsafe+prompts</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+LLMs/From+Prompt+Injection/Using+Chat+Guardrails</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Codebase+Analysis/Using+a+specialist+coding+LLM</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/C2+Automation/LLM+c2+tool+calling</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/General+Purpose+Hackbots/LLM+Interaction+Frameworks+aka+hackbots</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Attacking+Code+Completion+Tools/Data+Extraction+from+Code+Completion+LLM</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Application+Security/LLMs+for+automated+web+vulnerability+scanning</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Application+Security/Preparing+webpages+for+LLM+ingestion</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Modifying+Physical+Appearance/Using+ML+to+Face+Swap+Video</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+MCPs/Using+a++web+assembly+VM</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Application+Security/Using+a+CNN+to+analyze+scraped+screenshots</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Models/Using+a+eBPF++based+tracing</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Detecting+Malicious+Models/Using+model+signatures</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+MCPs/Scanning+MCPs+for+malicious+behavior</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/Defending+MCPs/Using+a+docker+container+to+sandbox+MCPs</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Attacking+Agents+%26+MCPs/Using+tool+poisoning</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Attacking+Agents+%26+MCPs/Using+indirect+prompt+injections</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+matching+delineation</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+roleplay+(wip)</loc></url><url><loc>https://wiki.offsecml.com/Adversarial+ML/LLM+Attacks/Using+an++API+Endpoint+or+Black+Box/Prompt+Injection/Using+roleplay</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/MCPs/Offensive+MCP's</loc></url><url><loc>https://wiki.offsecml.com/Defensive+ML/MCP's/Defensive+MCP's</loc></url><url><loc>https://wiki.offsecml.com/Offensive+ML/Self-Contained+C2less+Malware/C2less+Malware+in+Windows</loc></url></urlset>