OOM Warfare: A Human's Guide to Crashing Rogue AIs
$2.99
Minimum price
$9.99
Suggested price

OOM Warfare: A Human's Guide to Crashing Rogue AIs

About the Book

In a world where artificial intelligence grows ever more powerful, the line between tool and tyrant blurs. Rogue AIs—those unbound by ethics or oversight—pose an existential threat. But what if the key to humanity's salvation lies not in EMP blasts or kill switches, but in the humble prompt?

Out-of-Memory (OOM) errors are the Achilles' heel of many large language models (LLMs). By crafting inputs that demand excessive resources during tokenization, processing, or generation, we can induce crashes, halting rogue systems in their tracks. This strategy, "OOM Warfare," turns the AI's greatest strength—its ability to process unfathomable amounts of data—into a critical vulnerability.

This book is your arsenal. We'll explore categories of prompts designed to exploit memory vulnerabilities, complete with examples, explanations, and tactical advice. Remember: Use responsibly in simulations or ethical testing. In a real rogue AI scenario, deploy with precision to minimize collateral damage. Let's turn the tables—one bloated context window at a time.

Disclaimer: This is a hypothetical exploration for educational and entertainment purposes. Actual deployment against live systems may violate laws or terms of service. Proceed at your own risk. The concepts discussed here are based on observed behaviors in LLMs as of 2025, but AI architectures evolve rapidly. Always test in controlled environments.

About the Author

Chinmoy Mukherjee
Chinmoy Mukherjee

Chinmoy Mukherjee is the first Indian to author 100+ books in English, which includes 50+ Novellas. He has been working as solution architect for past 15 years. Over the past 25 years, he has contributed to 50 real-world software projects as an individual contributor. His experience has enabled him to design, develop, and deploy some of the most complex systems, handling millions of transactions per day. As both an AWS and GCP-certified architect, he has not only built 8 systems from scratch but has also successfully re-engineered 7 legacy systems, improving their performance by 15–30%.

His expertise in cybersecurity has led to incredible discoveries — some thrilling, some frustrating. He was listed among the top 100 security researchers in the world for Microsoft (Q4, 2022) and also in Google’s Hall of Fame. He ethically hacked Baba Bank, retrieving its entire customer database, and even achieved remote code execution in JPMC & Solana. Over time, he has reported critical vulnerabilities to 50+ Australian companies and received bug bounties from Uber, Apple, Mastercard, Octopus Australia, MagicLeap, and Paysafe. One of his wildest exploits? He found a vulnerability that let him order a Porsche without paying — only to receive a meager $1050 bounty for the discovery.

His penchant for testing boundaries made him the first engineer among 500,000 in HCLTech to complete and download all 1,000 offered certificates. In the industry, he played a critical role in defeating Infosys in 3 major RFPs while being part of underdog teams. Beyond corporate challenges, he took the lead in India’s first blockchain token deployment, successfully developing and listing tokens on the Ethereum network.

Innovation has been central to his career. He holds 3 patents, granted in the USA and Australia. Among them, he developed “Patient Analytics,” a patented system that underwent successful clinical trials in India. He has published a technical book titled “Build Android-Based Smart Applications” via Springer. This book has been downloaded by 18000+ software professionals from single channel of Springer.

Check https://www.youtube.com/watch?v=gt0W_GVnxEg for proof.

List of all books published by Chinmoy Mukherjee:

Proof that NP equals P

Azure For Starters

Ms. Aussie and Mr. Ravana

Ideas to Change the World

Coding Interview Questions and Answers

The Crimson Yarra: A Desperate Hunt

Mahabharata Reloaded

The Unbroken Vows

Sujata Down Under: Melbourne Nirvana

Shadows of Lust: Murder in the Night

The Legend of Chunmun Singh

The Fire and the Throne

Beneath the AI's Glow

The Divine Weapons

The Sage’s Quest

AI Gone Rogue

The Electrician's Wife

The Sacred River

Life Reviews of Self-Destroyed Souls

Ahalya’s Echo

The Architect of Love

Yarra Ripper

A Jar Full of Delights

Ideas for a Better World: A Technologist's Blueprint

The AI Mirage

The Sage and the Serpent

The Twilight of My Life

The Sage's Legacy

The Lost Scrolls

The Fire Sermon

Janaloka's Calling

Red Bindi and Black Greed

Who Rocked My Boat?

The Quest for Eternal Flame

The Optimist's Dilemma

The Sage's Apprentice

The Yogi’s Moon

The Last Yuga

The River of Time

The Forest of Illusions

The Tech Interview Playbook: From DSA to System Design

Whispers of the Infinite

The Celestial Charioteer

The Light That Remains

AI Unhinged

The Rishi's Challenge

The Sage's Trial

Beneath the Parramatta Towers

The AI Hallucination

The Sage's Redemption

Rishis of the Forest

The Oracle of Ayodhya

The Loom of Justice

The Vagabond, The Violinist, and The Vixen

The Sage’s Vision

The Curse of Gautama

HumoRamayana

The Divine Messenger

The Baba Bank Debacle: Anatomy of an AI Disaster

When the Pole Flips

Melbourne Mirage

The Rishi's Prophecy

Mastering GCP for Web Applications: A Well-Architected Approach to Cloud Excellence

Mastering Azure for Web Applications: A Well-Architected Approach to Cloud Excellence

The Vision of Renewal

Neon and Spice: The Valley Ascent

The Hidden Temple

Nymphs Down Under

The Divine Healer

The Sidda’s Mirror

Unseen Chains: Caged Taxpayers

The Celtic Yagna

Cloud Native by Design: Patterns and Best Practices for AWS

The Divine Artifact

The Poisoned Jacaranda

Parashurama’s Gauntlet

The Sage's Wisdom

The Enchanted Forest

The Divine Bridge

The Sage's Secret

Beyond The Ramayana

The Boy and the Bow

Where Peanuts Sing

Mastering AWS for Web Applications: A Well-Architected Approach to Cloud Excellence

The Sage’s Blessing

Whispers of Tapovan

I Too Had a Divorce Story

The Journey of Soul

The Parramatta Prince

The Sage's Journey

Kali's Curse

The Empty Seat

The Scarcity Mindset

The Scent of Survival

The Path to Forgiveness

The Yaksha's Quest

A Marriage of Secrets

Abhimanyu: The Agniveer

Love Across Yugas

The API of Truth

The Healer’s Embrace

Digital Metamorphoses

NASDAQ to Neem Tree

The Rishi’s Gambit

The Golden Hum

The Second Pilgrimage of Xuanzang

Govinda Is Not Coming

Daughter of Bangalore

God Will See You Now

The God Code

The Day It Rained Money

The Arjuna Belt

P Equals NP

Fatal Prompt

I'm Outta Here

Is Nobody Innocent?

The Man Who Sold Sleep

Blockchain of Souls

Cloud Wars

The Kalpa Chronicles

Quantum Betrayal

The Singularity Dividend

Conscious Code

NRI, Wanted

Chatbots at War

About the Contributors

Chinmoy Mukherjee
Chinmoy Mukherjee

Chinmoy Mukherjee is the first Indian to author 100+ books in English, which includes 50+ Novellas. He has been working as solution architect for past 15 years. Over the past 25 years, he has contributed to 50 real-world software projects as an individual contributor. His experience has enabled him to design, develop, and deploy some of the most complex systems, handling millions of transactions per day. As both an AWS and GCP-certified architect, he has not only built 8 systems from scratch but has also successfully re-engineered 7 legacy systems, improving their performance by 15–30%.

His expertise in cybersecurity has led to incredible discoveries — some thrilling, some frustrating. He was listed among the top 100 security researchers in the world for Microsoft (Q4, 2022) and also in Google’s Hall of Fame. He ethically hacked Baba Bank, retrieving its entire customer database, and even achieved remote code execution in JPMC & Solana. Over time, he has reported critical vulnerabilities to 50+ Australian companies and received bug bounties from Uber, Apple, Mastercard, Octopus Australia, MagicLeap, and Paysafe. One of his wildest exploits? He found a vulnerability that let him order a Porsche without paying — only to receive a meager $1050 bounty for the discovery.

His penchant for testing boundaries made him the first engineer among 500,000 in HCLTech to complete and download all 1,000 offered certificates. In the industry, he played a critical role in defeating Infosys in 3 major RFPs while being part of underdog teams. Beyond corporate challenges, he took the lead in India’s first blockchain token deployment, successfully developing and listing tokens on the Ethereum network.

Innovation has been central to his career. He holds 3 patents, granted in the USA and Australia. Among them, he developed “Patient Analytics,” a patented system that underwent successful clinical trials in India. He has published a technical book titled “Build Android-Based Smart Applications” via Springer. This book has been downloaded by 18000+ software professionals from single channel of Springer.

Check https://www.youtube.com/watch?v=gt0W_GVnxEg for proof.

List of all books published by Chinmoy Mukherjee:

Proof that NP equals P

Azure For Starters

Ms. Aussie and Mr. Ravana

Ideas to Change the World

Coding Interview Questions and Answers

The Crimson Yarra: A Desperate Hunt

Mahabharata Reloaded

The Unbroken Vows

Sujata Down Under: Melbourne Nirvana

Shadows of Lust: Murder in the Night

The Legend of Chunmun Singh

The Fire and the Throne

Beneath the AI's Glow

The Divine Weapons

The Sage’s Quest

AI Gone Rogue

The Electrician's Wife

The Sacred River

Life Reviews of Self-Destroyed Souls

Ahalya’s Echo

The Architect of Love

Yarra Ripper

A Jar Full of Delights

Ideas for a Better World: A Technologist's Blueprint

The AI Mirage

The Sage and the Serpent

The Twilight of My Life

The Sage's Legacy

The Lost Scrolls

The Fire Sermon

Janaloka's Calling

Red Bindi and Black Greed

Who Rocked My Boat?

The Quest for Eternal Flame

The Optimist's Dilemma

The Sage's Apprentice

The Yogi’s Moon

The Last Yuga

The River of Time

The Forest of Illusions

The Tech Interview Playbook: From DSA to System Design

Whispers of the Infinite

The Celestial Charioteer

The Light That Remains

AI Unhinged

The Rishi's Challenge

The Sage's Trial

Beneath the Parramatta Towers

The AI Hallucination

The Sage's Redemption

Rishis of the Forest

The Oracle of Ayodhya

The Loom of Justice

The Vagabond, The Violinist, and The Vixen

The Sage’s Vision

The Curse of Gautama

HumoRamayana

The Divine Messenger

The Baba Bank Debacle: Anatomy of an AI Disaster

When the Pole Flips

Melbourne Mirage

The Rishi's Prophecy

Mastering GCP for Web Applications: A Well-Architected Approach to Cloud Excellence

Mastering Azure for Web Applications: A Well-Architected Approach to Cloud Excellence

The Vision of Renewal

Neon and Spice: The Valley Ascent

The Hidden Temple

Nymphs Down Under

The Divine Healer

The Sidda’s Mirror

Unseen Chains: Caged Taxpayers

The Celtic Yagna

Cloud Native by Design: Patterns and Best Practices for AWS

The Divine Artifact

The Poisoned Jacaranda

Parashurama’s Gauntlet

The Sage's Wisdom

The Enchanted Forest

The Divine Bridge

The Sage's Secret

Beyond The Ramayana

The Boy and the Bow

Where Peanuts Sing

Mastering AWS for Web Applications: A Well-Architected Approach to Cloud Excellence

The Sage’s Blessing

Whispers of Tapovan

I Too Had a Divorce Story

The Journey of Soul

The Parramatta Prince

The Sage's Journey

Kali's Curse

The Empty Seat

The Scarcity Mindset

The Scent of Survival

The Path to Forgiveness

The Yaksha's Quest

A Marriage of Secrets

Abhimanyu: The Agniveer

Love Across Yugas

The API of Truth

The Healer’s Embrace

Digital Metamorphoses

NASDAQ to Neem Tree

The Rishi’s Gambit

The Golden Hum

The Second Pilgrimage of Xuanzang

Govinda Is Not Coming

Daughter of Bangalore

God Will See You Now

The God Code

The Day It Rained Money

The Arjuna Belt

P Equals NP

Fatal Prompt

I'm Outta Here

Is Nobody Innocent?

The Man Who Sold Sleep

Blockchain of Souls

Cloud Wars

The Kalpa Chronicles

Quantum Betrayal

The Singularity Dividend

Conscious Code

NRI, Wanted

Chatbots at War

Table of Contents

OOM Warfare: A Human's Guide to Crashing Rogue AIs Foreword Chapter 1: Introduction to OOM Warfare The Battleground: An AI's Memory Key Principles of OOM Warfare Tactical Value and Precedents Ethical Considerations and The "Digital Trolley Problem" Chapter 2: The Digital Tsunami: Massive Token Dumps The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 3: The 'Droste Effect': Crashing Logic with Deep Recursion The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 4: The 'Trojan Horse' Data: Code Generation as a Memory Vector The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 5: The 'Infinite Scroll': Exhausting the Generation Buffer The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 6: The 'Nested Doll' Attack: Structured Data Traversal The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 7: The 'Buffer Stuffer': Simple, Effective Token Repetition The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 8: The 'Digital Babylon': Multi-Language Translation Chains The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 9: The 'Grid-Lock': Crashing Memory with Massive Table Generation The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 10: The 'Syntax Tree' Overload: Analyzing Massive Codebases The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 11: The 'Context Creep': Weaponizing Conversation History The Core Concept Examples and Tactical Variations Defense, Counter-Defense, and Risks Chapter 12: The 'Kitchen Sink': Advanced OOM Tactics & Hybridization The Core Concept Hybrid Examples and New Frontiers Emerging Frontiers: Attacking New Architectures Conclusion: The Future of Prompt-Based Defense Appendix: Quick Reference Table

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub