InfoSec - Note
InfoSec - Note can't reiterate this enough: Do not go looking for vulnerable servers and exploits on systems you don't own without the proper approval. __∧_∧__ ~~~~~ /(*´O`)/\ /| ̄∪∪ ̄|\/ ...
InfoSec - Note can't reiterate this enough: Do not go looking for vulnerable servers and exploits on systems you don't own without the proper approval. __∧_∧__ ~~~~~ /(*´O`)/\ /| ̄∪∪ ̄|\/ ...
Course - Learning Path Cyber Security Career path Cloud GCP AWS ALI Security Security Course ...
养安全资产:用 LLM-KB 方法论驱动代码安全扫描器 Table of contents: 养安全资产:用 LLM-KB 方法论驱动代码安全扫描器 The Core Problem 只做扫描 vs 养安全资产 5-Layer Framework Applied to Security Scanning ...
Karpathy LLM Knowledge Base — Obsidian Implementation Table of contents: Karpathy LLM Knowledge Base — Obsidian Implementation Overview Why Not RAG 3-Layer Architecture ...
Vibe Coding — Mastering Case Challenges with AI Table of contents: Vibe Coding — Mastering Case Challenges with AI Overview Skill Case Challenge Overview ...
Deploy a Flask Demo App to the Web Deploy a Flask Demo App to the Web Overview Pre-deployment — required code changes 1. Fix app.run() 2. Add gunic...
LLms Paper - Sallm Security Assessment of Generated Code LLms Paper - Sallm Security Assessment of Generated Code Abstract 1 Introduction 2 Background and Motivation ...
Methodology for incident response on Gen-AI workloads Components of a Gen-AI workload Prepare for incident response on Gen-AI workloads Methodology for incident response o...
Large Language Model for Vulnerability Detection: Emerging Results and Future Directions ABSTRACT 1 INTRODUCTION 2 PROPOSED APPROACH ChatGPT and In-Cont...
JaCoText: A Pretrained Model for Java Code-Text JaCoText: A Pretrained Model for Java Code-Text Pretrained transformer-based models have shown high performance in natural language g...
Can Generalist Foundation Models Outcompete Special-Purpose Tuning? Case Study in Medicine Abstract 1 Introduction 2 Background 2.1 Foundation Models on...
OWASP Top 10 for LLM Table of contents: OWASP Top 10 for LLM Overview OWASP Top 10 for LLM Top 10 ref: https://arxiv.org/abs/231...
LLMs in Cybersecurity Table of contents: LLMs in Cybersecurity Benefits of LLMs in Cybersecurity Debugging and Coding Analysis of Threat Patterns ...
AI Security Table of contents: AI Security Overview AI tools AI Security AI pipeline risk AI Observability 可观察性 Secure AI Framewor...
LLM - Prompt engineering Table of contents: LLM - Prompt engineering prompt engineering Prompt History of prompt engineering why is prompt eng...