Demystifying Generative AI ๐Ÿค– A Security Researcher's Notes

Demystifying Generative AI ๐Ÿค– A Security Researcher's Notes

As a security researcher, stepping into the world of Generative Artificial Intelligence was like entering unfamiliar territory. While I was excited by the potential it held for revolutionizing security, I soon realized there were many unfamiliar concepts and terms that were new to me.

In this blog post, I simplify Generative AI concepts and share a few practical applications in security. We start by defining terminology around AI, learn how 'Neural Networks' process language, and explain the role of large language models (LLMs) in modern Generative AI. Along the way, I explain concepts like tokenization, embeddings, retrieval augmented generation, and agents. I hope this helps you and inspires you to build your own tools.

What is Artificial Intelligence (AI)?

AI refers to a machine or computer program that can process data and, in advanced forms, learn and improve its responses over time. AI models can be basic scripts or advanced systems that improve by analyzing samples of data.

A little bit of history...

Artificial intelligence has a long history dating back to the 1950s. In 1956, the Dartmouth Summer Research Project on Artificial Intelligence workshop, attended by influential researchers such as John McCarthy, Marvin Minsky, Nathaniel Rochester, and Claude Shannon, was the first time the term 'artificial intelligence' was coined, marking a significant moment in the field.

AI, Machine Learning, Neural Networks, Deep Learning? ๐Ÿค”

After reading about AI, I was a little confused by its distinction from Machine Learning and its relation to concepts like Neural Networks and Deep Learning within generative AI. Let's break it down!

Machine Learning (ML)

Machine Learning (ML) is a subset of AI that connects AI models with data. It helps machines learn from data using methods like statistics and artificial neural networks. This shift has allowed them to go from set computer instructions to learn from samples of data and recognizing patterns independently, improving their decision-making and predictions over time.

Neural Networks (NN)

A neural network, a type of machine learning model, is like a digital brain composed of simple decision-makers known as neurons. It processes input data, assigns importance (weights) to different parts of the input, uses a default preference (bias), activates decision-makers (activation function), and produces an output. During training, a neural network identifies essential patterns in the data, enabling them to provide accurate responses to a task. In inference, a neural network applies its acquired knowledge to make decisions.

The conceptual idea of neural networks was introduced in 1943, with Warren McCulloch and Walter Pitts creating a simple neural network to mimic brain functions. However, it wasn't until the 1990s and beyond that this concept truly took off in practical applications, especially in machine learning. This resurgence was fueled by improved algorithms, increased computing power, access to abundant data, practical applications, and enabling technologies.

Deep Learning (DL)

Deep learning, driven by deep neural networks (DNN), is another fundamental machine learning technique in modern AI. It extends neural network principles by incorporating additional layers of decision-makers. This enhancement enables AI systems to understand and learn from increasingly complex patterns of data, resulting in more advanced recommendations.

Deep learning has played an important role in advancing natural language processing (NLP) and driving large language model (LLM) development, revolutionizing our approach to understanding and processing text.

Foundation Models -> Generative AI

Expanding upon deep learning, Foundation Models push this idea even further. They're pre-trained on massive data and built upon deep neural network architectures, stretching the possibilities in the field of AI. Thanks to the advancements in DL, data availability, and computing power, these models can be adapted for various tasks, from generating written, visual, to auditory content. They're at the core of modern Generateive AI, empowering AI applications ๐ŸŒŽ.

Artificial Neural Networks 101

After exploring how these fundamental concepts were related, I was curious about some of the terminology used when reading about Generative AI models. Words like Parameters, Weights, Hidden Layers, and even Gradients, seemed unfamiliar. I needed to read more about the basics of neural networks.

Key Components

  • Input: Information received, often represented as numerical values.
  • Weights and Biases: Weights are numbers that indicate how important various parts of the input data are, and biases are numerical preferences that influence decision-making. Together, these values, are known as Parameters, and play a critical role in adjusting how the network processes input during training. After training, these Parameters represent the acquired knowledge.
  • Perceptron: Each perceptron in the network acts as a simple decision-maker. It takes the weighted input, adds bias, and produces an output. It's important to note that a single perceptron makes straightforward, linear decisions.
  • Activation Function: The activation function is a key element that introduces non-linearity into the network. It allows the network to capture more complex patterns in the data, helping it to identify important context from the input. This non-linear connection is important for understanding the nuances in the data and making more accurate predictions.
  • Output: This depends on the network's specific task and could be a prediction, a classification, or other form of informed response.

Neural Network Layers ๐Ÿฎ

Next, let's break down the concept of layers that form a neural network.

  • Input Layer: Receives the numeric representation of the input data.
  • Hidden Layers: Intermediate layers where the network learns and extracts patterns from the input data during training, and also very important during inference, helping the network make decisions.
  • Output Layer: Layer that produces the network's output, which can be predictions, classifications, or other relevant information.

Training Neural Networks? ๐Ÿ‹๐Ÿฝโ€โ™€๏ธ

Training is how a model learns from data, adjusting its parameters (weights and biases), getting better at making predictions or classifications. Key training concepts include forward propagation, backpropagation, and gradient descent, which all work together to improve the network's performance.

  • Forward Propagation: The concept of how data flows through the neural network from input to output. Important for both inference and training, where the network identifies relevant patterns in the data to make informed decisions.
  • Backpropagation: During training, backpropagation is how the network gets better. When the network makes errors in its predictions, backpropagation figures out how to tweak its parameters (weights and biases) to minimize errors, enabling learning and improved performance. It goes backward through the network, seeing how each weight affects errors and gives guidance through gradients, which show how the function's output changes with input changes.
  • Gradient Descent: It is used during training to reduce errors and improve the network's performance. It's an optimization technique in ML and neural networks training that helps adjust a model's parameters in the direction indicated by the gradients calculated during backpropagation, all in small steps.

What Happens after Training? ๐Ÿง 

After the neural network has minimized the loss (mistakes) to an acceptable level, retaining good model performance, the latest neural network parameters encapsulate the knowledge it has acquired. These parameters are matrices and vectors, with matrices representing the weight connections between layers and each layer having a bias vector. This knowledge (parameters) is then used to make predictions with new, unseen data of the same type it was trained on.

Neural Networks and Language

Even after learning the fundamentals of neural networks, it was still not clear how they process language and generate text.

Neural Networks and Sequence of Inputs

In language, neural networks work by handling input as a series of connected words. This word-to-word connection is crucial for understanding the input's meaning. Unlike traditional neural networks, which are good with non-sequential data, language processing requires a more time-based approach.

By time-based, I mean that the order and timing of words in a sentence influences its meaning. To effectively understand the nuances of language and generate text, neural networks need to process words in the right sequence.

In the image below, we have a simple setup where each input in a sequence goes through a feedforward neural network. However, the final output doesn't connect with the starting input, because context from each step is not carried over.

Neurons with Recurrence

Here is where the concept of Recurrence was introduced, allowing neural networks to connect each step and pass on the state to the next iteration. This led to the development of Recurrent Neural Networks (RNNs).

RNNs enable a range of sequence modeling tasks. For instance, they can determine the sentiment in a sentence (Many to One), provide multiple descriptions for an image (One to Many), or translate text between languages (Many to Many).

What can we do with that information? ๐Ÿ’ก

I guess, it started to make more sense how some of these concepts could be applied to the security field. I created the following table to organize my ideas.

Empowering Sequence Processing with Encoder-Decoder

Building upon the principles of RNNs and their ability to capture sequential data, the concept of Encoder-Decoder architectures emerged, setting the stage for more advanced options, such as Transformers, which we'll explore later.

  • Two models working together.
  • The encoder model processes the source language input sequence, producing a fixed-size context vector that captures the input's meaning.
  • The context vector becomes the starting point for the decoder.
  • The decoder model uses the context vector to generate the target language output sequence step by step, producing one element at a time based on its current state and the previously generated output elements.

How do they consume data? as Raw Text? ๐Ÿค”

While reading about RNN-Based Encoder-Decoder architectures, I started to wonder if the input processing was as simple as just passing text to them.

Apparently, the input data goes through two key preparation steps, tokenization and embedding, before it's ready for a neural network to process.


  • Tokenization is the process of breaking down raw text into smaller units, such as words or subwords.
  • Tokenization often includes assigning unique IDs, known as token IDs, to tokens, which facilitates the subsequent embedding process, facilitating efficient neural network processing, especially in natural language tasks. These token IDs are typically generated as part of the model's embedding vocabulary.


  • Embeddings are numerical representations of tokens.
  • These representations convert tokens into vectors by capturing their semantic meaning through an embeddings vocabulary with token-to-vector mappings, which the neural network model relies on.
  • Embeddings enable neural networks to use meaningful numerical representations of text, capturing both high-level context for sentences or text sequences and individual word or subword embeddings. These combined embeddings are utilized by the model for text generation.

Did you know that similar words share close embeddings?

Words with similar meanings or contextual relationships are represented as nearby vectors. This allows neural networks to use their semantic similarities for language understanding and text generation. Moreover, when combined in a sentence, they create a higher-level embedding that captures the overall meaning.

A Basic Experiment ๐Ÿงช: How can we tokenize & embed text?

Even though I was not familiar with any language models yet ๐Ÿ˜†, I still wanted to practice and learn how to tokenize and generate embeddings for some text.

For this example, I used the Hugging Face Transformer APIs to download and use the BigBird text model to generate tokens and embeddings for a sentence. Simply pip install transformers and run the code below:

Generate Tokens

from transformers import AutoTokenizer

# Set up the tokenizer
tokenizer = AutoTokenizer.from_pretrained("google/bigbird-roberta-base")

# Tokenize a sentence
tokens = tokenizer.tokenize("Hello, my name is Roberto")
['โ–Hello', ',', 'โ–my', 'โ–name', 'โ–is', 'โ–Roberto']

Get Token IDs

import torch

# Convert tokens to input IDs
input_ids = tokenizer.convert_tokens_to_ids(tokens,)

# Create a PyTorch tensor
input_ids = torch.tensor(input_ids).unsqueeze(0)  # Add a batch dimension
tensor([[18536, 112, 717, 1539, 419, 32177]])

Get Embeddings

from transformers import BigBirdConfig, BigBirdModel

# Define a configuration with "original_full" attention
model_config = BigBirdConfig.from_pretrained("google/bigbird-roberta-base")
model_config.attention_type = "original_full"

model = BigBirdModel.from_pretrained("google/bigbird-roberta-base", config=model_config)

# Generate Embeddings with BigBird model
with torch.no_grad():
    outputs = model(input_ids)

embeddings = outputs.last_hidden_state

print(f"Token: {tokens[0]}\nIndex ID: {input_ids[0][0]}\nEmbedding: {embeddings[0][0]} \n")
Token: โ–Hello
Index ID: 18536
Embedding: tensor([-1.1636e-01, -2.0380e-02, -6.1083e-02, -3.8545e-01, 5.7417e-01, 1.0884e-01, -1.0427e-01, 9.3820e-02, ... (cropped)

Basic Experiment ๐Ÿงช: Can we tokenize and generate embeddings for a security event log?

The short answer is Yes! However, I learned that not all models can do it efficiently because security event logs have a different structure than regular sentences. It may be necessary to train a model from scratch to tokenize security event logs and generate embeddings for a more accurate representation.

I used the same Hugging Face Transformer APIs to download and use the BigBird text model to tokenize and generate embeddings for a security event log.

GenAI-Security-Adventures/experiments/Basics/Local-Tokenizing-Embedding.ipynb at main ยท OTRF/GenAI-Security-Adventures
Contribute to OTRF/GenAI-Security-Adventures development by creating an account on GitHub.
Did you know that OpenAI provides a free tokenizer tool over the web to show how a piece of text might be tokenized by some of their language models? Take a look at the tokenization output in the notebook for this exercise and compare it with the one below.

RNN-Based Encoder-Decoder Disadvantages

While reading about tokenization and embeddings, I noticed that RNN-based Encoder-Decoder models were not frequently mentioned in the latest approaches for processing large texts in generative AI ๐Ÿค”. As I was updating my notes, I started to realize their limitations, especially when dealing with large texts, as they process one embedding at a time. Can parallelism help here?

It turned out there were more limitations I didn't know about.

Enter Transformers ๐Ÿค–

In 2017, researchers at Google introduced groundbreaking method to overcome the limitations of the initial RNN-based encoder-decoder. This innovative approach, outlined in the paper 'Attention Is All You Need', introduced a novel encoder-decoder architecture known as Transformers.

Transformers introduced concepts like parallel processing, positional encoding, and self-attention, marking a significant leap in how we work with language.

Parallelism (No Recurrence)

Sequential processing can pose challenges in capturing long-range dependencies effectively. Transformer-based models offer the advantage of parallel processing but are constrained by a maximum token count, a limitation frequently mentioned in the context of the latest Large Language Models (LLMs).

Positional Encoding

Parallelism greatly improved input processing but removed the order of words in sequential modeling. Transformers introduced positional encoding, appending context to embeddings, allowing the model to understand word positions.


In addition to parallelism and positional encoding, transformers introduced self-attention. Self-attention in transformer-based models works like words in a sentence helping each other understand their importance and context, improving the model's understanding of text meaning. In the example below, the word it has a stronger relationship with animal than with street.

This transformer-based architecture has gained immense popularity, extending its use beyond text to various modalities like images, audio, and video. This highlights the versatility of transformers as a cross-modal general architecture.

Can a transformer-based model be an encoder only?

Yes! Encoder-only models process input data, Decoder-only models generate output, and Encoder-Decoder models handle both input and output.

General Purpose AI Models

Transformer's innovative approach enabled the training of large models, often referred to as foundation or general-purpose models. These models are capable of understanding and processing various data types, contributing to significant advancements in generative AI and beyond.

Large Language Models (LLMs)

Large language models are a specific type of general-purpose model, primarily text-based, that have significantly contributed to the advancement of generative AI. These models, trained in large amounts of data, have emerged as powerful tools for various Natural Language Processing (NLP) applications. They excel in tasks like natural language understanding, text generation, and more.

The parameters of these models, often referred to as Parametric Knowledge, encapsulate the model's understanding of language ๐Ÿ˜Ž.

How can I organize these out-of-the-box NLP abilities?

LLMs can handle numerous NLP tasks. I wanted to find a way to organize my experiments, and I think this is a good reference to help you categorize your own.

Two Types of Large Language Models (LLMs)

Now, this was interesting. I assumed that LLMs could right away start answering questions based on their training data and understanding of language. Nope!

  • Base LLMs were initially trained to predict the next word by processing large amounts of data using a self-supervised approach, filling in missing words in text. However, they couldn't naturally comprehend questions or instructions as humans do, which make it tricky to interact with them.
  • To address this, Instruction-Tuned LLMs emerged. These models were fine-tuned from base LLMs to comprehend instructions or questions, enabling them to generate contextually relevant responses. This fine-tuning improved their ability to engage in conversational exchanges.

Transfer Learning: What is Fine-Tuning?

While reading about LLMs, I noticed the concept of fine-tuning appearing frequently, not realizing it was an important part of transfer learning. Transfer learning, in simple terms, allows models to effectively tackle new tasks by building upon their acquired knowledge. With LLMs, this involves initially training a model on a large dataset and then refining it for specific tasks.

The word Pretrained was also coming up frequently, and it was at this point that its connection to fine-tuning started to make more sense.

Pretrained Language Models

Pre-trained language models are foundational models created by training on large amounts of data, requiring substantial computational resources and days of training. These models serve as a basis, providing foundational knowledge for more specific tasks, achieved through fine-tuning.

Fine-Tuned Language Models

Fine-tuned language models are like tailored versions of pre-trained models, meticulously adjusted for specific tasks. The training can be accomplished on a single GPU, making it cost-effective and easy to replicate.

Wait! Generative Pre-trained Transformer (GPT)? ๐Ÿ˜Ž

GPT makes more sense now! ๐Ÿ˜…

  • A type of LLM trained to predict subsequent words in sentences.
  • Pre-trained on vast unlabeled text using self-supervised learning.
  • A Transformer-based decoder-only model.
  • Optimized for chat interactions while also performing well in traditional completion tasks (i.e., text generation).

So, how do we talk to LLMs? ๐Ÿ—ฃ๏ธ

Through prompts! By giving them specific instructions through prompts, we can generate the content / response we want.

When crafting a prompt, consider defining the role, an instruction, the context, and the output format to guide the model effectively. The role sets the context for the interaction, the instruction guides the model on what task to perform, the context offers additional information, and defining the output specifies the desired response, ensuring a well-structured interaction with the LLM.

A Basic Experiment ๐Ÿงช: How can I ask a question to an LLM?

At this point, I was already getting more familiarized with a few public LLMs, so I decided to try one from GPT4All, an open-source ecosystem to train and deploy large language models that run locally on consumer grade CPUs.

For this experiment, I downloaded the orca-mini-3b-gguf2-q4_0.gguf instruction-based model from the GPT4All site, installed langchain and gpt4all python packages, and ran the following python code:

from langchain.llms import GPT4All

# Initialize Model
llm = GPT4All(model='./model/orca-mini-3b-gguf2-q4_0.gguf')

# Define Prompt
prompt = "Where is Peru?")

# Pass prompt to LLM to generate text
llm("Where is Peru?")
'Peru is located in the western coast of South America, bordering Ecuador, Colombia, Brazil, Bolivia and Chile. It has a diverse geography that ranges from the Andes Mountains to the Pacific Ocean. The capital city of Peru is Lima, which is also its largest city.'

LLMs are Few-Shot Learners!

Did you know that when interacting with LLMs through text prompts, you can utilize various approaches, including "zero-shot" and "few-shot" techniques.

  • In zero-shot scenarios, models generate content without specific examples or training data for a task, relying solely on the provided prompt.
  • In few-shot scenarios, LLMs perform tasks with minimal examples, allowing them to adapt to new tasks or generate content effectively with just a handful of examples or instructions.

How does that help? ๐Ÿค”

Traditional ML requires labeling and training data for predictions. In contrast, prompt-based models allow us to use natural language prompts for direct predictions, making it easier to create ML models like classifiers with only a few examples in the prompt, simplifying the process.

A Basic Experiment ๐Ÿงช: How can I build a sentiment classifier?

A sentiment classifier is a type of ML model that is trained to determine the sentiment of a piece of text, such as positive, negative, or neutral. To keep it simple, I wanted to create a demo to classify if the subject of an email was benign or malicious. This of course can be extended to cover more context from an email.

For this experiment, I use the same orca-mini-3b-gguf2-q4_0.gguf instruction-based model from GPT4All, and langchain and gpt4all python packages.

from langchain.llms import GPT4All

# Model downloaded manually from
llm = GPT4All(model='./model/orca-mini-3b-gguf2-q4_0.gguf')

prompt = """
Classify the email subject text below, delimited by three dashes (-),
as being malicious or benign. Explain why.

Account email verification code, enter now and reply

This email is likely to be considered as a phishing attempt because it requests the recipient to provide an account verification code that they may not have received from the actual email provider. Additionally, the email does not contain any legitimate information or context that would make the recipient believe that this is a genuine request for account verification. Therefore, it can be classified as malicious.

The model classified the email subject as phishing when there was not much context. It is either hallucinating ๐Ÿ˜† or using facts from its training dataset.

I decided to experiment with another model and ended up using OpenAI gpt-3.5-turbo to extend the example and show Zero-Shot and Few-Shot. The idea was to provide examples to my prompt and influence the classification.

This exercise requires an OpenAI API key.
GenAI-Security-Adventures/experiments/Basics/OAI-Inferring-Sentiment.ipynb at main ยท OTRF/GenAI-Security-Adventures
Contribute to OTRF/GenAI-Security-Adventures development by creating an account on GitHub.

Any Constraints with LLMs? ๐Ÿ˜ฑ

Something I didn't initially realize about LLMs was some of their limitations:

  • Knowledge Coverage: How much they know about different topics.
  • Timeliness: How current the information is.
  • Personalization: The inability to provide private or personalized data.
  • Hallucinations: Instances where the generated content lacks factual basis due to guessing or speculating beyond available data.

Knowledge Coverage? Timeliness? What do you mean? ๐Ÿค”

Let's say you want to know about a specific ATT&CK technique and ask ChatGPT about it. Depending on the ATT&CK technique, you might get a similar response.

Yup! That specific technique was added to ATT&CK in April 2023.

Hallucinations? What do you mean? ๐Ÿค”

What if the LLM tries to explain something that was not part of its training data? Let's say we want to know about ATT&CK technique Financial Theft (T1657) (added in October 2023). In the chat below, the LLM hallucinates and states that T1657 is related to Dynamic Data Exchange and not Financial Theft ๐Ÿ’€

Enter Retrieval Augmented Generation (RAG)!

To overcome these limitations, a promising technique exists known as Retrieval Augmented Generation (RAG). A technique that combines information retrieval with text generation, allowing a language model to use external information as context to enhance the quality and relevance of generated text or response.

What does a Basic RAG Flow look like?

  1. Source knowledge is tokenized and embedded. These embeddings are stored in a vector database and are available to the LLM to be used as additional context.
  2. The user begins by asking a question.
  3. The question is converted into numerical vectors (tokenized and embedded).
  4. The retriever conducts a similarity search within the vector database containing embedded knowledge from various sources.
  5. Relevant documents similar to the user's question are retrieved.
  6. The user combines the original query and the retrieved documents (context) to create a more informative prompt and pass it to the LLM.
  7. With the additional context, the LLM generates a more accurate and context-aware response to the user's query.

A Basic Experiment ๐Ÿงช: Can I query my own Threat Intelligence then? (Private Data) ๐Ÿ”’

I wanted to showcase a simple RAG flow for querying private data in the context of cybersecurity, so threat intel data seemed to be a good use-case. To show this idea, I decided to use ATT&CK groups, which represent clusters of public threat activity linked to specific groups, as a way to mimic an organization's TI.

I will write another blog post explaining everything in more details ๐Ÿ˜Ž, but for now, I can share a few notebooks to show how to download ATT&CK groups, store their embeddings in a vector database and use it with a RAG workflow.

This exercise requires an OpenAI API key and is organized in 2 parts.

1) ATT&CK Groups -> Tokens -> Embeddings -> Vector DB

GenAI-Security-Adventures/experiments/RAG/Threat-Intelligence/ATTCK-Groups/source-knowledge/notebook.ipynb at main ยท OTRF/GenAI-Security-Adventures
Contribute to OTRF/GenAI-Security-Adventures development by creating an account on GitHub.

2) RAG ATT&CK Groups Context

GenAI-Security-Adventures/experiments/RAG/Threat-Intelligence/ATTCK-Groups/LangChain/notebook.ipynb at main ยท OTRF/GenAI-Security-Adventures
Contribute to OTRF/GenAI-Security-Adventures development by creating an account on GitHub.

How can I build tools with LLMs? ๐Ÿฆพ๐Ÿค–

After learning some of the fundamentals, I decided to explore how to create an assistant/agent that uses LLMs to help it decide when to use a specific function or tool and generate structured output for the tool to use as input to perform a task.

A Basic Experiment ๐Ÿงช: Can an LLM help me call an API? ๐Ÿคฏ

I will write another blog post explaining everything in more details ๐Ÿ˜Ž, but for now, the idea is to create an assistant/agent that understands the Microsoft Graph API OpenAPI specs and converts natural language into API calls to interact with it. This reduces the amount of code I used to write to call the API ๐Ÿคฏ.

The OpenAPI Specification (OAS) is a widely recognized standard that explains RESTful API specifics in a machine-readable format. It helps humans and computers understand a service's capabilities, and it can guide LLMs on using APIs effectively.

The Basic Idea!

  1. We take the MS Graph API OpenAPI specification and transform it into a list of OpenAI functions to have our LLM intelligently choose to output a JSON object containing arguments to call those functions ๐Ÿš€.
  2. User interactively authenticates with Microsoft Entra ID via the authorization code authentication flow to retrieve an access token for the MS Graph API.
  3. Access token is set on the tool authorization header to query MS Graph APIs.
  4. User uses natural language to task the assistant with an action.
  5. Assistant takes the prompt and appends the MS Graph API OpenAI functions.
  6. The enriched prompt is passed to the LLM to decide what API to use based on the prompt and the MS Graph API OpenAI functions.
  7. LLM picks the right API for the task and produces a structured output with the right API parameters and values related to the initial prompt.
  8. The tool processes the parameters and values produced by the LLM and calls the MS Graph API.
  9. The tool passes the MS Graph API response to the LLM.
  10. The LLM summarizes the response and passes it to the assistant.
  11. The assistant passes the response to the user.
This exercise requires an OpenAI API key.

For this experiment, I use OpenAI GPT4 model, OpenAI function calling, langchain and MS Graph API OpenAPI specs for the Users endpoint. I am still trying to figure out how to make the LLM work with a larger OpenAPI spec.

GenAI-Security-Adventures/experiments/ExternalAPIs/MSGraph/OAI-MSGraph-Users-Agent.ipynb at main ยท OTRF/GenAI-Security-Adventures
Contribute to OTRF/GenAI-Security-Adventures development by creating an account on GitHub.

Take a look at the results ๐Ÿคฏ!

What's next? ๐Ÿค–๐Ÿ›ก๏ธ

Experiments Table

Experiment Description
Email Subject Sentiment Classifier Create a basic Email subject sentiment classifier to determine if an email subject is benign or malicious.
Incident Summary Query Microsoft 365 Defender alerts from an incident, extract alerts' title and description and summarize all that context.
Script Content Analyzer Get a summary / description of what a PowerShell script does.
Basic Process to Embed Threat Intelligence Source Knowledge Download ATT&CK groups knowledge, tokenize it, generate embeddings and store it in a vector database for RAG operations.
Basic RAG Agent for Threat Intelligence Query ATT&CK groups, which represent clusters of threat activity linked to specific threat groups, as a way to mimic an organization's threat intelligence and use a RAG technique to add context to your prompts and get more accurate responses from an LLM.
Basic MS Graph API Agent An assistant/agent that understands the Microsoft Graph API specifics and can use it to perform various tasks.
NL -> Cypher -> BloodHound Query a BloodHound graph database with natural language.
NL -> SQL -> ROADTools Query a ROADTools SQL database with natural language.

Congrats for making it this far! Time for you to write your own adventure!

Stay up to date with this journey!