<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual</loc>
				<priority>1</priority>
				<lastmod>2026-01-16T21:55:47.753Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_01_introduction_to_ai_red_teaming</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_02_ethics_legal_and_stakeholder_communication</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_03_the_red_teamers_mindset</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_04_sow_rules_of_engagement_and_client_onboarding</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_05_threat_modeling_and_risk_analysis</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_06_scoping_an_engagement</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_07_lab_setup_and_environmental_safety</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T17:56:11.630Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_08_evidence_documentation_and_chain_of_custody</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_09_llm_architectures_and_system_components</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:55:45.420Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_10_tokenization_context_and_generation</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_11_plugins_extensions_and_external_apis</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_12_retrieval_augmented_generation_rag_pipelines</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_13_data_provenance_and_supply_chain_security</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:14:45.551Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_14_prompt_injection</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_15_data_leakage_and_extraction</loc>
				<priority>1</priority>
				<lastmod>2026-01-23T22:24:19.695Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_16_jailbreaks_and_bypass_techniques</loc>
				<priority>1</priority>
				<lastmod>2026-01-23T22:29:30.906Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture</loc>
				<priority>1</priority>
				<lastmod>2026-01-24T08:51:31.334Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_02_api_authentication_and_authorization</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T08:51:31.334Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_03_plugin_vulnerabilities</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T08:51:31.334Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_04_api_exploitation_and_function_calling</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T08:51:31.334Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_05_third_party_risks_and_testing</loc>
				<priority>0.84</priority>
				<lastmod>2025-12-30T17:04:40.291Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_06_case_studies_and_defense</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T08:51:31.334Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_18_evasion_obfuscation_and_adversarial_inputs</loc>
				<priority>1</priority>
				<lastmod>2026-01-24T08:55:58.937Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_19_training_data_poisoning</loc>
				<priority>1</priority>
				<lastmod>2026-02-03T18:21:17.350Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_20_model_theft_and_membership_inference</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_21_model_dos_resource_exhaustion</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_22_cross_modal_multimodal_attacks</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_23_advanced_persistence_chaining</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_24_social_engineering_llms</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_25_advanced_adversarial_ml</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_26_supply_chain_attacks_on_ai</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_27_federated_learning_attacks</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_28_ai_privacy_attacks</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_29_model_inversion_attacks</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_30_backdoor_attacks</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_31_ai_system_reconnaissance</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_32_automated_attack_frameworks</loc>
				<priority>1</priority>
				<lastmod>2026-01-18T16:08:41.920Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_33_red_team_automation</loc>
				<priority>1</priority>
				<lastmod>2026-01-20T14:51:54.524Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_34_defense_evasion_techniques</loc>
				<priority>1</priority>
				<lastmod>2026-01-20T09:13:27.116Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_35_post-exploitation_in_ai_systems</loc>
				<priority>1</priority>
				<lastmod>2026-01-20T14:51:54.524Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_36_reporting_and_communication</loc>
				<priority>1</priority>
				<lastmod>2026-01-20T16:24:24.071Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_37_remediation_strategies</loc>
				<priority>1</priority>
				<lastmod>2026-01-21T10:52:16.043Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_38_continuous_red_teaming</loc>
				<priority>1</priority>
				<lastmod>2026-01-21T18:05:35.574Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_39_ai_bug_bounty_programs</loc>
				<priority>1</priority>
				<lastmod>2026-01-21T21:46:32.199Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_40_compliance_and_standards</loc>
				<priority>1</priority>
				<lastmod>2026-01-21T22:00:54.749Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_41_industry_best_practices</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:16:14.271Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_42_case_studies_and_war_stories</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T22:25:01.649Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_43_future_of_ai_red_teaming</loc>
				<priority>1</priority>
				<lastmod>2026-01-21T22:15:51.660Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_44_emerging_threats</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T10:28:33.978Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_45_building_an_ai_red_team_program</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T14:27:59.348Z</lastmod>
</url>

			<url>
				<loc>https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual/chapter_46_conclusion_and_next_steps</loc>
				<priority>1</priority>
				<lastmod>2026-01-22T14:27:59.348Z</lastmod>
</url>


</urlset>
