This repository contains various penetration testing techniques and exercises that I have worked on. These techniques aim to demonstrate common vulnerabilities and methods used for ethical hacking and system exploitation in a controlled environment.
- Kali Linux
- Metasploit
- John the Ripper
- Nmap
- ExploitDB
- And other penetration testing tools and utilities
- Demonstrate common vulnerabilities in various systems.
- Showcase different exploitation techniques.
- Explore privilege escalation, service exploitation, and password cracking.
- Understand the importance of security measures in preventing unauthorized access.
To replicate the penetration testing exercises in this repository, follow these steps:
-
Clone this repository:
git clone https://github.com/secured-git/exploits.git
-
Set up a controlled, isolated environment with virtual machines like Kali Linux and Metasploitable.
-
Follow the instructions provided in each respective directory or file for specific exercises and techniques.
Disclaimer:
The content in this repository is intended for educational purposes only. Unauthorized use of these techniques on systems without explicit permission is illegal and unethical. Always perform penetration testing in controlled, authorized environments.
If you'd like to contribute, feel free to open an issue or submit a pull request with your suggestions or improvements.