Skip to content
View Jlavezzi's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report Jlavezzi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jlavezzi/README.md

👋 Hi, I'm Adejare (Jlavezzi)

🎯 Aspiring Ethical Hacker | Cybersecurity Student | Penetration Testing Enthusiast

I am a cybersecurity student focused on ethical hacking and penetration testing, with hands-on experience in web application security, network security, reconnaissance, and vulnerability assessment.

I actively practice in legal, controlled lab environments and document my work using professional penetration testing standards.


🔍 Areas of Focus

  • Web Application Penetration Testing (OWASP Top 10)
  • Network & Service Enumeration
  • Vulnerability Analysis & Exploitation
  • Post-Exploitation & Persistence (Lab-Based)
  • Social Engineering Awareness & Defense
  • Security Reporting & Risk Assessment

🧪 Practice Environments

  • Damn Vulnerable Web Application (DVWA)
  • Metasploitable 2
  • Custom Virtual Lab Setups (Kali Linux)
  • TryHackMe / Hack The Box (Academy-style learning)

🛠 Tools & Technologies

🔎 Reconnaissance & Enumeration

  • Nmap
  • Amass
  • Knockpy
  • TheHarvester
  • Recon-ng
  • enum4linux
  • SpiderFoot

🌐 Web Recon & OSINT Platforms

  • Shodan
  • Censys
  • SecurityTrails
  • DNSDumpster
  • crt.sh
  • Wayback Machine (archive.org)
  • Google Dorking (advanced search operators)

🌐 Web Application Security

  • Burp Suite
  • OWASP ZAP
  • Browser DevTools
  • SQLMap (verification & learning purposes)

🧨 Exploitation & Post-Exploitation

  • Metasploit Framework
  • Netcat
  • Hydra (credential testing – lab environments only)
  • Weevely & Web Shells (educational use)

🎭 Social Engineering (Ethical & Defensive)

  • Phishing awareness techniques
  • Credential harvesting risk analysis
  • Pretexting concepts
  • Human-factor vulnerability assessment
  • Security awareness testing (theoretical & lab-based)

🐧 Operating Systems & Scripting

  • Kali Linux
  • Linux CLI & Bash scripting
  • Basic Python for automation

📄 Reporting & Documentation

  • Markdown (GitHub documentation)
  • Professional Penetration Testing Reports
  • Risk Matrices (Likelihood × Impact)
  • Executive & Technical Summaries

📂 Featured Projects

My repositories emphasize clear documentation and reporting, not just exploitation.

Each security project typically includes: ✔ Defined objective & scope
✔ Structured methodology
✔ Findings with proof of concept
✔ Risk assessment
✔ Mitigation & remediation recommendations

Highlighted work includes:

  • Web application vulnerability assessments (DVWA)
  • Network service exploitation (FTP, SSH)
  • Analysis of real-world vulnerabilities (e.g., CVE-2011-2523 – vsftpd backdoor)
  • Reconnaissance and OSINT-driven attack surface mapping

📈 Current Goals

  • Build a strong, well-documented ethical hacking portfolio
  • Improve manual exploitation and enumeration skills
  • Strengthen social engineering detection & defense understanding
  • Produce reports that reflect real penetration testing engagements
  • Grow a professional online presence (GitHub, LinkedIn, X)

⚠️ Disclaimer

All activities documented in this profile are performed strictly in legal lab environments for educational and research purposes only.


📫 Connect With Me

  • 🔗 LinkedIn: (add your link)
  • 🐦 X (Twitter): @MarvelAdejare
  • 📧 Email: [email protected]

“Technology fails first. Humans fail faster. Security must address both.”

Popular repositories Loading

  1. assesment assesment Public

    just a rough sketch

    HTML 1

  2. portfolio-demo portfolio-demo Public

    This is a demo portfolio page created with bootstrap and css

    JavaScript 1

  3. amplify amplify Public

    a website that can play songs based on the track clicked

    JavaScript 1

  4. todo-list todo-list Public

    a simple to do list

    1

  5. todolist todolist Public

    a simple to do list made with ejs and mongoDB

    JavaScript 1

  6. blog blog Public

    blog with mongodb database

    JavaScript 1