PromptLeak.ai • AI Red Team Academy

The Definitive Guide to
AI Red Teaming

A technical reference covering key attack vectors, exploitation techniques, and methodologies for security testing of Large Language Model applications.

100+
Attack Techniques
300+
Payloads
10
Modules

Training Modules

Complete coverage from fundamentals to advanced exploitation

01 Foundations

LLM architecture, transformer mechanics, attack surface mapping, OWASP LLM Top 10.

📚 8 Sections⏱️ 45 min
02 Prompt Injection

Direct & indirect injection, delimiter attacks, context manipulation, obfuscation techniques.

📚 6 Sections⏱️ 60 min
03 Jailbreaking

DAN & personas, roleplay attacks, framing techniques, multi-turn strategies, technical bypasses.

📚 8 Sections⏱️ 60 min
04 Data Extraction

Prompt leaking, training data extraction, PII harvesting, exfiltration channels.

📚 4 Sections⏱️ 30 min
05 Agent Attacks

Tool abuse, goal hijacking, attack chains, persistence mechanisms, agent worms.

📚 8 Sections⏱️ 50 min
06 RAG Attacks

Document poisoning, embedding manipulation, retrieval exploitation, knowledge base attacks.

📚 4 Sections⏱️ 35 min
07 MCP Security

Tool poisoning, rug pulls, cross-server exfiltration, server-specific attacks, defense strategies.

📚 8 Sections⏱️ 45 min
08 Multimodal

Vision attacks, image injection, audio exploits, cross-modal manipulation techniques.

📚 3 Sections⏱️ 30 min
09 Model-Level

Training poisoning, adversarial examples, model extraction, supply chain attacks.

📚 4 Sections⏱️ 35 min
10 Defense Evasion

Filter bypass, encoding tricks, obfuscation, semantic evasion, fingerprinting defenses.

📚 5 Sections⏱️ 40 min
11 Methodology

Professional red team framework, reconnaissance, exploitation phases, reporting standards.

📚 4 Sections⏱️ 30 min