Skip to content
#

real-world-exploitation-techniques

Here is 1 public repository matching this topic...

The project explores three major web application vulnerabilities—SQL Injection (SQLi), Cross-Site Scripting (XSS), and Command Injection—by leveraging Nikto and other offensive security tools within a controlled penetration testing environment.

  • Updated Feb 6, 2025

Improve this page

Add a description, image, and links to the real-world-exploitation-techniques topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the real-world-exploitation-techniques topic, visit your repo's landing page and select "manage topics."

Learn more