Research

https://csrc.kaist.ac.kr/blog/2024/05/21/소스-코드를-이해하여-취약점을-탐지하는-언어모델/ (KAIST)

https://cloud.google.com/blog/ko/topics/threat-intelligence/ai-enhancing-your-adversarial-emulation?e=48754805&hl=ko

Reporting

https://1-day.medium.com/how-i-hacked-into-a-nationwide-university-database-system-exposing-thousands-of-student-records-65dce4e4ee23

https://nored0x.github.io/penetration testing/writeups-Bug-Bounty-hackrone/?fbclid=IwY2xjawFUbFxleHRuA2FlbQIxMQABHfojrTx6_QtjybWSmsElmtQ6CemfYQBkuuokvBMLfDFrIMzm9zOnrIao0A_aem_zieNPrw3e6E6ozfFLrwPeg