Skip to content
View Elysia1104's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Elysia1104

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. end-to-edn-encryption end-to-edn-encryption Public

    Python 1

  2. Hydra-Update Hydra-Update Public

    Successfully performed an automated credential-guessing attack using Hydra. Demonstrated the ability to identify service vulnerabilities and adapt attack vectors when encountering protocol-specific…

    1

  3. Metasploitable2-Exploitation-Lab Metasploitable2-Exploitation-Lab Public

    "A technical case study on gaining Root access via the vsftpd backdoor, performing post-exploitation forensics, and implementing anti-forensics log sanitization."

    1

  4. SubHunt-Recon-Tool SubHunt-Recon-Tool Public

    An automated DNS enumeration tool built in Python for identifying hidden subdomains and expanding the attack surface during reconnaissance.

    Python 1

  5. Telnet_Cleartext_Sniffing Telnet_Cleartext_Sniffing Public

    Used Wireshark to perform packet analysis on a Telnet session. Demonstrated the vulnerability of unencrypted protocols by intercepting login credentials (msfadmin:msfadmin) in cleartext using TCP S…

    1

  6. Burpe-suite Burpe-suite Public

    Identified a Reflected XSS vulnerability in a web application. Demonstrated how lack of input sanitization allows an attacker to execute arbitrary JavaScript in the user's browser context