The AI Red Teaming Wiki
The definitive knowledge base for AI red teaming, prompt injection, and LLM security.
2939+ expert-level guides covering prompt injection techniques, jailbreak research, agent exploitation, MCP attack surfaces, RAG poisoning, model extraction, adversarial ML, and end-to-end red team engagements. Built by and for AI security researchers.
Explore Topics
36 parts, 1268 sections, 2939+ in-depth guides.
LLM Internals & Exploit Primitives
Transformer architecture, tokenizer exploitation, alignment bypass, embedding attacks.
Prompt Injection & Jailbreaks
Advanced injection techniques, automated jailbreak research, multimodal attack vectors.
Agent & Agentic Exploitation
AI agent attacks, multi-agent/A2A protocol exploitation, MCP tool surface attacks.
RAG, Data & Training Attacks
RAG pipeline poisoning, training data attacks, model extraction and IP theft.
Infrastructure & Supply Chain
Model serialization RCE, AI infra exploitation, application security patterns.
Recon & Tradecraft
LLM fingerprinting, system prompt extraction, AI-specific threat modeling.
Exploit Dev & Tooling
Custom adversarial tools, red team C2 frameworks, continuous automated red teaming.
Capstone: Full Engagement
End-to-end red team engagement methodology, reporting, and remediation.
Recently Updated
AI Red Team Evidence Collection
intermediateSystematic evidence collection methodologies for AI red team engagements, including artifact preservation, finding documentation, and chain of custody procedures.
Updated 2026-03-21
API Key Compromise Investigation
intermediateInvestigating AI API key compromise incidents including detection, scope assessment, usage forensics, and remediation procedures.
Updated 2026-03-21
Cloud AI Forensics: AWS
advancedForensic investigation techniques for AWS AI services including SageMaker, Bedrock, and associated infrastructure logging and evidence collection.
Updated 2026-03-21
Cloud AI Forensics: Azure
advancedForensic investigation techniques for Azure AI services including Azure OpenAI, Azure ML, and Cognitive Services with diagnostic logging and evidence collection.
Updated 2026-03-21
LLM Conversation Forensics
intermediateForensic analysis techniques for investigating LLM conversation logs, detecting manipulation patterns, and reconstructing attack timelines from chat histories.
Updated 2026-03-21
Stay Updated
Get the latest AI red teaming research, techniques, and tool releases delivered to your inbox.