Skip to content
View vshaliii's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report vshaliii

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vshaliii/README.md

Hi there 👋, I am Vaishali ❤

Penetration Tester

About

  • Learning : OSCP
  • Skills : Kali Linux || Vulnerability Assessment and Penetration Testing || Ethical Hacking || Web Application Penetration Testing || OWASP || Nessus || Python || C/C++ || JavaScript || Cloud computing (Microsoft Azure)
  • Hobbies : Painting || Art || Dance

Pinned Loading

  1. SQL-Injection SQL-Injection Public

    SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL…

    1 1

  2. Authorisation-Bypass Authorisation-Bypass Public

    Authorization bypass is a type of security vulnerability where an attacker gains access to resources, functionality, or data they should not be authorized to access. It happens when an application …