🎯
Focusing
Woman keeper of compliant technology, kathryn@wkctech.com. All rights reserved.
-
Wilson Key Computer Technology
- Carmel, IN, USA
-
23:42
(UTC -04:00) - https://sites.google.com/student.purdueglobal.edu/wkctech
- in/wkctech
Highlights
Lists (32)
Sort Name ascending (A-Z)
100 Days of Hacking
1 repository
AWS Cloud
1 repository
C++
1 repository
C-Sharp
2 repositories
Console
1 repository
CTFs
1 repository
Cybersecurity for Beginners
2 repositories
Cybersecurity Repos
1 repository
Generative AI
11 repositories
JavaScript
3 repositories
JSON
1 repository
Jupyter
2 repositories
Keras SLTM
1 repository
OpenAPI HTML
1 repository
OWASP
2 repositories
OWASP Top 10 LLM
Outlaw Research Labs shared an article called "Prompt Injection: A Deeper Dive and Mitigation-Part 2" ( https://lnkd.in/eavum72E ). "Bob does an impressive job of mapping these vulnerabilities to CWE, ATT&CK, and ATLAS! If anyone is interested, my repo for this work is: https://lnkd.in/eJhyjQbQ OWASP Top 10 for Large Language Model Applications: https://llmtop10.com/3 repositories
Pen Tests
1 repository
PHP
2 repositories
Power Platform
5 repositories
Power Users
1 repository
Privilege Escalation
1 repository
Python
7 repositories
Recon
1 repository
SCADA Sims
2 repositories
Semantics
1 repository
She'll
1 repository
Tensor
2 repositories
Twitter Stuxnet
1 repository
TypeScript
2 repositories
Util-Linux
1 repository
VS Code
1 repository
Wordlists
1 repository
Stars
3
stars
written in HCL
Clear filter
This is my personal template collection. Here you'll find templates, and configurations for various tools, and technologies.
Terraform module to create Amazon Elastic Kubernetes (EKS) resources 🇺🇦
Shows how the CFT modules can be composed to build a secure cloud foundation