Skip to content
View GauravGhandat-23's full-sized avatar

Block or report GauravGhandat-23

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Reflected-XSS-Vulnerability Reflected-XSS-Vulnerability Public

    This project demonstrates the identification and exploitation of a reflected cross-site scripting (XSS) vulnerability in a web application's search functionality.

    1

  2. Exploiting-and-Mitigating-Web-Vulnerabilities Exploiting-and-Mitigating-Web-Vulnerabilities Public

    This repository contains a Cybersecurity Minor Project focused on understanding, exploiting, and mitigating SQL injection vulnerabilities in web applications. The project includes a hands-on demons…

    1

  3. Advanced-Cybersecurity-Labs-Exploiting-and-Securing-Web-Applications Advanced-Cybersecurity-Labs-Exploiting-and-Securing-Web-Applications Public

    Reflected XSS into HTML context with nothing encoded. This vulnerability exists in the search functionality of a web application, allowing attackers to execute JavaScript code in the user's browser.

    1

  4. Clickjacking-Exploit-with-CSRF-Token-Protection-Analysis Clickjacking-Exploit-with-CSRF-Token-Protection-Analysis Public

    This repository contains the project files and documentation for analyzing and exploiting basic clickjacking techniques with CSRF (Cross-Site Request Forgery) token protection. This project was con…

    1

  5. DOM-XSS-Exploitation-using-Web-Messages DOM-XSS-Exploitation-using-Web-Messages Public

    The project demonstrates a DOM XSS vulnerability in a web application that listens for web messages. The vulnerability allows an attacker to craft malicious messages that are executed without prope…

    1

  6. Secure-User-Access-Management-in-Linux Secure-User-Access-Management-in-Linux Public

    This repository contains project documentation and solutions for managing secure user access in Linux environments. It demonstrates fundamental Identity and Access Management (IAM) concepts and pra…

    1