ToxSec - AI and Cybersecurity

ToxSec - AI and Cybersecurity

Home
Notes
Chat
Deep Dive
Archive
About

Sitemap - 2025 - ToxSec - AI and Cybersecurity

The Voluntary Exfiltration Program

Model Collapse Is Already Polluting the Internet You Search

Chain of Thought Is Security Theater for AI Alignment

AI-Powered Phishing: You Will Fall for This

Human in the Loop Is a Vulnerability, Not a Control

The Dead Internet Is No Longer a Theory

OWASP Top 10 for LLMs: How Each Vulnerability Breaks in Production

ToxSec Cybersecurity Awareness Month!

BSides 2025 AI Presentation Review | Favorite Talks

Nvidia's AI Kill Chain

Claude vs Humans: Anthropic’s CTF Run

Gandalf | GenAI CTF

Bug Bounty Hunting for GenAI

HTTP/1.1 Request Smuggling | CL:TE

IDOR Hunting

SSRF For Bug Bounty Hunters

Bug Bounty API Security Testing

Writing Effective Bug Bounty Reports

Getting Started in Bug Bounty Hunting

Web Cache Poisoning: A Bug Bounty Hunter's Guide

Subdomain Takeover in Bug Bounty

Brute Forcing Web Application Passwords

File Upload Attacks for Bug Bounty Hunting

© 2026 Christopher Ijams · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture