Skip to content
View Wisdomajoku's full-sized avatar

Block or report Wisdomajoku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
WisdomAjoku/README.md

Hi, I'm Wisdom πŸ‘‹

Cybersecurity Professional β€” SOC analyst, penetration tester, and bootcamp instructor (4 cohorts). Currently specializing in AI/LLM application security.

πŸ”’ Current focus

  • AI red team & LLM security β€” OWASP LLM Top 10, MITRE ATLAS, prompt injection
  • Building public writeups of LLM red team engagements
  • Tools: NVIDIA Garak, Microsoft PyRIT, Burp Suite, Promptfoo

πŸ‘¨β€πŸ’» Technical Projects

πŸ“ Case Studies

🀳 Connect

Pinned Loading

  1. ai-redteam-journey ai-redteam-journey Public

    Notes, attack writeups, and red team engagement reports as I specialize in AI/LLM application security β€” OWASP LLM Top 10, MITRE ATLAS, prompt injection.

  2. Ivanti-VPN-Attack-Case-Study Ivanti-VPN-Attack-Case-Study Public

    Case study on the Ivanti VPN authentication bypass β€” root cause, exploitation, and defensive lessons.

  3. Login-Analysis-and-Visualization-Dashboard-using-Splunk-Siem Login-Analysis-and-Visualization-Dashboard-using-Splunk-Siem Public

    Splunk SIEM dashboard for analyzing login events, detecting brute-force patterns, and visualizing authentication anomalies.

  4. Malicious-Email-Simulation Malicious-Email-Simulation Public

    Simulation and analysis of phishing emails β€” headers, payloads, and attacker techniques.

  5. trustwallet-phishing-analysis trustwallet-phishing-analysis Public

    OSINT-driven analysis of a Trustwallet phishing campaign β€” infrastructure, lures, and indicators of compromise.

  6. Web-Traffic-Analysis-using-Splunk-Siem Web-Traffic-Analysis-using-Splunk-Siem Public

    Splunk SIEM analysis of web traffic logs to detect suspicious activity and surface threat indicators.