# Advanced Attack Techniques
Using techniques like Base64 encoding, character transformations (e.g., ROT13), or prompt-level obfuscations to bypass restrictions.
Automating the creation of adversarial attacks by evolving simple synthetic inputs into more complex attacks.
Employing reinforcement learning with two models: the target LLM and a red-teamer model trained to exploit vulnerabilities.