Projects using Kali Linux
Projects using Kali Linux
Sign Up
Post a job
Sign Up
Log In
Filters
1
Projects
People
1
Dragos Moruz
Cybersecurity Dissertation Consultation – Research Direction
1
22
0
Ahmed Khan
I discovered a stored cross-site scripting (XSS) vulnerability in a practice web application's comment section that allowed me to inject malicious JavaScript that would execute in any user's browser. By submitting a comment containing a script payload, I successfully stole session cookies from other users and could have hijacked their accounts, performed actions on their behalf, or defaced the website. This finding was documented in a comprehensive report including proof-of-concept screenshots showing cookie theft, CVSS risk scoring of 6.5 (Medium), and step-by-step remediation guidance including input sanitization and output encoding. This assessment demonstrates my ability to find client-side vulnerabilities that can compromise every user visiting the site.
0
1
0
Dimitris Pallis
Penetration Tester
0
20
0
Muhamed Ali
Training project , Enhancing Security Awareness: Understanding t
0
7
0
Md Tahmid Bin Rashid
Penetration Testing | PenTest for Web Application
0
4
0
Ajay P
Application Security Assessment & Exploitation Review
0
3
0
Sunny Saini
Vulnerability Assessment and Penetration Testing (VAPT) for Star
0
10
0
brian John
Artificial intelligence
0
3
0
Nitin Yadav
Pen-Test for Real Estate Marketing Platform
0
0
0
Ahmed Khan
I discovered a SQL injection vulnerability in a practice web application that allowed me to bypass the login system and access the entire user database without any credentials. By inserting a simple payload into the username field, I successfully logged in as the first user in the database and extracted sensitive information including usernames, password hashes, and user email addresses. This finding was documented in a detailed report with proof-of-concept screenshots, risk analysis showing potential data breach impact, and step-by-step remediation guidance including parameterized queries and input validation. This assessment demonstrates my ability to find critical database vulnerabilities that could expose thousands of customer records.
0
1
0
Muhamed Ali
Onsite Network Pentest
0
7
0
Ajay P
Phishing Simulation & Endpoint Hardening Evaluation
0
2
0
Nirjhar Banik
Securing Flagship Products: P0 Bug Fixes, API Rate-Limiting
0
6
0
Nitin Yadav
Security Assessment of Satellite Comm GUI System
0
0
1
Dragos Moruz
Free Vulnerability Scanning Demo - Instant Security Insight
1
23
0
Ahmed Khan
During a security assessment of a practice web application, I discovered an exposed FTP directory with directory listing enabled, revealing multiple sensitive files including a password database, backup configurations, compiled source code, and error logs. After finding a clue in robots.txt, I navigated to the /ftp directory and documented over ten exposed files with their associated risks. My final report included an executive summary, detailed findings with screenshots, risk ratings for each exposed file, and step-by-step remediation guidance including disabling directory listing and removing sensitive data. This finding highlights how simple misconfigurations can lead to critical data exposure.
0
10
Explore projects