I am a cybersecurity student focused on ethical hacking and penetration testing, with hands-on experience in web application security, network security, reconnaissance, and vulnerability assessment.
I actively practice in legal, controlled lab environments and document my work using professional penetration testing standards.
- Web Application Penetration Testing (OWASP Top 10)
- Network & Service Enumeration
- Vulnerability Analysis & Exploitation
- Post-Exploitation & Persistence (Lab-Based)
- Social Engineering Awareness & Defense
- Security Reporting & Risk Assessment
- Damn Vulnerable Web Application (DVWA)
- Metasploitable 2
- Custom Virtual Lab Setups (Kali Linux)
- TryHackMe / Hack The Box (Academy-style learning)
- Nmap
- Amass
- Knockpy
- TheHarvester
- Recon-ng
- enum4linux
- SpiderFoot
- Shodan
- Censys
- SecurityTrails
- DNSDumpster
- crt.sh
- Wayback Machine (archive.org)
- Google Dorking (advanced search operators)
- Burp Suite
- OWASP ZAP
- Browser DevTools
- SQLMap (verification & learning purposes)
- Metasploit Framework
- Netcat
- Hydra (credential testing – lab environments only)
- Weevely & Web Shells (educational use)
- Phishing awareness techniques
- Credential harvesting risk analysis
- Pretexting concepts
- Human-factor vulnerability assessment
- Security awareness testing (theoretical & lab-based)
- Kali Linux
- Linux CLI & Bash scripting
- Basic Python for automation
- Markdown (GitHub documentation)
- Professional Penetration Testing Reports
- Risk Matrices (Likelihood × Impact)
- Executive & Technical Summaries
My repositories emphasize clear documentation and reporting, not just exploitation.
Each security project typically includes:
✔ Defined objective & scope
✔ Structured methodology
✔ Findings with proof of concept
✔ Risk assessment
✔ Mitigation & remediation recommendations
Highlighted work includes:
- Web application vulnerability assessments (DVWA)
- Network service exploitation (FTP, SSH)
- Analysis of real-world vulnerabilities (e.g., CVE-2011-2523 – vsftpd backdoor)
- Reconnaissance and OSINT-driven attack surface mapping
- Build a strong, well-documented ethical hacking portfolio
- Improve manual exploitation and enumeration skills
- Strengthen social engineering detection & defense understanding
- Produce reports that reflect real penetration testing engagements
- Grow a professional online presence (GitHub, LinkedIn, X)
All activities documented in this profile are performed strictly in legal lab environments for educational and research purposes only.
- 🔗 LinkedIn: (add your link)
- 🐦 X (Twitter): @MarvelAdejare
- 📧 Email: [email protected]
“Technology fails first. Humans fail faster. Security must address both.”