top of page
Dave Gilmore's Tech Blog

Understanding Integrity-based Cyber Attacks Against AI Systems - Research Paper by David Gilmore
I am delighted to present my research paper on integrity based cyber attacks on AI systems. Please feel free to download a copy by...
Mar 16, 20241 min read

Red Teaming LLM's - Automated Pentesting Large Language Models
As more and more tools appear on Github relating to pen testing large language models I thought it would be good to test some of these...
Mar 10, 20241 min read

Let's Hack Some LLM's (Large Language Models)
I have learnt a lot about machine learning and LLM's over the past year, I have taken a handful of courses and I think I have a good...
Feb 14, 20242 min read


Brushing with Danger: How 3 Million Smart Toothbrushes Became Cyber Criminals' Newest Weapon
A recent article from the Aargauer Zeitung, cited by Golem.de, reports that approximately three million smart toothbrushes have been...
Feb 8, 20241 min read

Cybersecurity Academic Transcript
I was just reviewing the units I studied at Victoria University and thought I should share the transcript here on my blog....
Feb 7, 20241 min read

Pentesting Principles
I have recently taken a break from TryHackMe to try and recoup some energy over my weekends but now I feel like I am ready to slowly move...
Feb 7, 20241 min read

Managing Hybrid Cloud User Authentication with Azure and Entra ID
Furthering my learning with Microsoft Azure I thought I would write an article about managing user authentication in a hybrid enviroment...
Jan 30, 20242 min read

Microsoft Security, Compliance, and Identity Badge
Today I earned my "Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and...
Jan 30, 20241 min read

I Just Moved up to the Top 2% of Ethical Hackers on TryHackMe !
To say I am stunned is an under statement ! It's been a lot of hard work and many, many hours spent researching and trying and failing...
Jan 24, 20241 min read

Exploiting GitLab - CVE-2023-7028
In this article I will demonstrate how an attacker could craft a malicious Python script to initiate a password reset of a GitLab account...
Jan 18, 20243 min read


Epic Ransomware Crisis is Coming Our Way !
The past year has marked another record-breaking period in the realm of cyber threats, particularly ransomware. The headlines were...
Jan 12, 20242 min read

Automating Kali Updates With a Desktop Icon
OK I am getting ready for my shift at 8:30am but my Bash updater script has been on my mind, gotta make it slicker and easier for newbs. ...
Jan 4, 20241 min read

Automating Nmap Scans with Bash Scripting
Today I am revisiting good old Bash scripting in Kali, I have put so much effort in to learning Python in 2023 I had forgotten just how...
Jan 3, 20241 min read


Getting Started Becoming a Master Hacker by Occupy the Web - A book review
"Getting Started: Becoming a Master Hacker" by Occupy the Web (OTB) is an enlightening journey into the intricate world of cybersecurity...
Jan 3, 20241 min read


Why Entry-Level Cybersecurity Staff are Vital for Companies to Consider in Hiring
In light of the recent insights shared by Australia's top CEOs, as reported in the Australian Financial Review, there's an unmistakable...
Jan 2, 20242 min read

Chat GPT For Smarter Cyber Security
Chat ChatGPT is groundbreaking technology that’s has had an impact on a wide variety of fields, ranging from creating a never ending...
Dec 31, 20231 min read

Learning Docker, Machine Learning with Jupyter Notebooks and Tensorflow
I have been interested in Docker for a while, however this year 's focus has mainly been on cyber security studies so I have not had much...
Dec 18, 20231 min read

Certificate IV Cyber Security Awarded by Victoria University.
Today was a really good day, waking up to find my Certificate IV in Cyber Security waiting in my inbox. Here is a direct link:...
Dec 15, 20231 min read


Unveiling the Intricacies of Australia's Cyber Threat Landscape: Insights from the ASD Cyber Threat
Image produced with GPT-4 Dalle-e As the digital era accelerates, cyber threats continue to evolve in complexity and intensity. The...
Dec 5, 20232 min read

Juypter Notebooks for Cyber Security
Jupyter Notebooks is an open-source web application that allows you to create and share documents containing live code, equations,...
Dec 3, 20231 min read
bottom of page