Chapter 5: Tool Use (Function Calling): Extending AI Agents to Interact with the Real World
ThrillQuestX
Chapter 5: Tool Use (Function Calling): Extending AI Agents to Interact with the Real World
8:27
Chapter 4: Reflection: Iterative Self-Correction for Optimal Agent Output
ThrillQuestX
Chapter 4: Reflection: Iterative Self-Correction for Optimal Agent Output
6:38
Chapter 3: Parallelization: Executing Concurrent Agentic Workflows for Accelerated Performance
ThrillQuestX
Chapter 3: Parallelization: Executing Concurrent Agentic Workflows for Accelerated Performance
6:51
Chapter 2: Routing: Enabling Dynamic Decision-Making in Adaptive AI Agents
ThrillQuestX
Chapter 2: Routing: Enabling Dynamic Decision-Making in Adaptive AI Agents
4:59
Chapter 1: Prompt Chaining: The Foundational Pattern for Reliable Multi-Step AI Systems
ThrillQuestX
Chapter 1: Prompt Chaining: The Foundational Pattern for Reliable Multi-Step AI Systems
7:23
Prompt Chaining: The Foundational Pattern for Building Reliable Multi-Step AI Agents
ThrillQuestX
Prompt Chaining: The Foundational Pattern for Building Reliable Multi-Step AI Agents
4:55
An investigator's journey
ThrillQuestX
An investigator's journey
6:47
OSINT art of finding anything
ThrillQuestX
OSINT art of finding anything
6:47
OSINT unlocking secrets
ThrillQuestX
OSINT unlocking secrets
6:47
The Hacker's Playbook: - Web Security Testing - From Recon to RCE
ThrillQuestX
The Hacker's Playbook: - Web Security Testing - From Recon to RCE
8:24
From XSS to SSRF:- A Hacker's Guide to Web Application Vulnerabilities
ThrillQuestX
From XSS to SSRF:- A Hacker's Guide to Web Application Vulnerabilities
53:33
Anatomy of a Web Attack: A Deep Dive into Penetration Testing Stages with Burp Suite
ThrillQuestX
Anatomy of a Web Attack: A Deep Dive into Penetration Testing Stages with Burp Suite
7:09
Silent Watchers: - How Your Devices, Data, and Even Wi Fi Are Spying on You
ThrillQuestX
Silent Watchers: - How Your Devices, Data, and Even Wi Fi Are Spying on You
56:22
Why privacy is a Myth
ThrillQuestX
Why privacy is a Myth
8:25