These are real vulnerabilities that I discovered in production. I compiled the discoveries into reports, and disclosed them to their owners.
I created intentionally vulnerable VMs to learn about software vulnerabilities and practice using ethical hacking tools.
A distributed honeypot system that detects and deceives hackers, containerized with Docker.
An improvement to Arp-Scan that includes hostnames in a tabular output, identifying your network's devices with ease.