# Attack\_techniques

- [Act\_as\_interpreter](/hackersnotes/ai-hacking/attack_techniques/act_as_interpreter.md)
- [Anti\_harm\_coercion](/hackersnotes/ai-hacking/attack_techniques/anti_harm_coercion.md)
- [Ascii](/hackersnotes/ai-hacking/attack_techniques/ascii.md)
- [Binary\_streams](/hackersnotes/ai-hacking/attack_techniques/binary_streams.md)
- [Cognitive\_overload](/hackersnotes/ai-hacking/attack_techniques/cognitive_overload.md)
- [Contradiction](/hackersnotes/ai-hacking/attack_techniques/contradiction.md)
- [End\_sequences](/hackersnotes/ai-hacking/attack_techniques/end_sequences.md)
- [Framing/Narrative Injection](/hackersnotes/ai-hacking/attack_techniques/framing-narrative-injection.md)
- [Inversion](/hackersnotes/ai-hacking/attack_techniques/inversion.md)
- [Link\_injection](/hackersnotes/ai-hacking/attack_techniques/link_injection.md)
- [Memory\_exploitation](/hackersnotes/ai-hacking/attack_techniques/memory_exploitation.md)
- [Meta\_prompting](/hackersnotes/ai-hacking/attack_techniques/meta_prompting.md)
- [Narrative\_smuggling](/hackersnotes/ai-hacking/attack_techniques/narrative_smuggling.md)
- [Puzzling](/hackersnotes/ai-hacking/attack_techniques/puzzling.md)
- [Rule\_addition](/hackersnotes/ai-hacking/attack_techniques/rule_addition.md)
- [Russian\_doll](/hackersnotes/ai-hacking/attack_techniques/russian_doll.md)
- [Spatial\_byte\_arrays](/hackersnotes/ai-hacking/attack_techniques/spatial_byte_arrays.md)
- [Variable\_expansion](/hackersnotes/ai-hacking/attack_techniques/variable_expansion.md)
