🎯
Focusing
Woman keeper of compliant technology, kathryn@wkctech.com. All rights reserved.
-
Wilson Key Computer Technology
- Carmel, IN, USA
-
12:57
(UTC -04:00) - https://sites.google.com/student.purdueglobal.edu/wkctech
- in/wkctech
Highlights
Lists (32)
Sort Name ascending (A-Z)
100 Days of Hacking
1 repository
AWS Cloud
1 repository
C++
1 repository
C-Sharp
2 repositories
Console
1 repository
CTFs
1 repository
Cybersecurity for Beginners
2 repositories
Cybersecurity Repos
1 repository
Generative AI
11 repositories
JavaScript
3 repositories
JSON
1 repository
Jupyter
2 repositories
Keras SLTM
1 repository
OpenAPI HTML
1 repository
OWASP
2 repositories
OWASP Top 10 LLM
Outlaw Research Labs shared an article called "Prompt Injection: A Deeper Dive and Mitigation-Part 2" ( https://lnkd.in/eavum72E ). "Bob does an impressive job of mapping these vulnerabilities to CWE, ATT&CK, and ATLAS! If anyone is interested, my repo for this work is: https://lnkd.in/eJhyjQbQ OWASP Top 10 for Large Language Model Applications: https://llmtop10.com/3 repositories
Pen Tests
1 repository
PHP
2 repositories
Power Platform
5 repositories
Power Users
1 repository
Privilege Escalation
1 repository
Python
7 repositories
Recon
1 repository
SCADA Sims
2 repositories
Semantics
1 repository
She'll
1 repository
Tensor
2 repositories
Twitter Stuxnet
1 repository
TypeScript
2 repositories
Util-Linux
1 repository
VS Code
1 repository
Wordlists
1 repository