Skip to content
#

ethical-hacking

Here are 124 public repositories matching this topic...

Hands-on Vulnerability Assessment & Pentesting Lab using DVWA hosted on Metasploitable and attacked from Kali Linux. Simulates OWASP Top 10 web vulnerabilities like SQLi, XSS, CSRF, and more using real-world tools such as SQLmap, Hydra, Burp Suite, and manual exploitation. Includes report, screenshots, and attack walkthroughs.

  • Updated Jun 8, 2025
  • HTML

I'm creating a safer digital world. Every vulnerability I find is one less threat to someone’s data, privacy, or business. I’m building bridges of trust in a world full of uncertainty, and turning risks into resilience. My work might be behind the scenes, but its impact protects millions.

  • Updated Jul 31, 2025
  • HTML

Improve this page

Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."

Learn more