# internals
6 articlestagged with “internals”
LLM Internals
Deep technical exploration of LLM internal mechanisms for exploit development, covering activation analysis, alignment bypass primitives, and embedding space exploitation.
LLM Internals for Exploit Developers
Transformer architecture, tokenizer internals, logit pipelines, and trust boundaries from an offensive security perspective.
Representation Probing for Vulnerability Discovery
Probe model internal representations to discover exploitable features and latent vulnerability patterns.
Exploiting Attention Mechanisms
How the self-attention mechanism in transformers can be leveraged to steer model behavior, hijack information routing, and bypass safety instructions.
Embedding Space Attacks
Techniques for attacking the embedding layer of LLMs, including adversarial perturbations, embedding inversion, and semantic space manipulation.
LLM Internals & Exploit Primitives
An overview of large language model architecture from a security researcher's perspective, covering the key components that create exploitable attack surfaces.