Skip to content
View BokiCiphertext's full-sized avatar
  • Joined Dec 23, 2025

Block or report BokiCiphertext

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Metasploitable2-VAPT Metasploitable2-VAPT Public

    Vulnerability Assessment & Penetration Testing Report

  2. Network-Exploitation-Lab-vsFTPd Network-Exploitation-Lab-vsFTPd Public

    A full lifecycle penetration test demonstrating reconnaissance with Nmap and exploitation of the vsFTPd 2.3.4 backdoor using Metasploit.

  3. Post-Exploitation-Credential-Auditing-Lab Post-Exploitation-Credential-Auditing-Lab Public

    Full cycle penetration testing lab demonstrating root access via vsFTPd 2.3.4 backdoor exploitation, sensitive data exfiltration ( /etc/shadow/ ) and offline password cracking using John The Ripper…

  4. Web-App-Penetration-Testing-Command-Injection. Web-App-Penetration-Testing-Command-Injection. Public

    Exploiting command injection vulnerabilities in a web application to achieve Remote Code Execution (RCE).

  5. Advanced-Password-Cracking-Lab Advanced-Password-Cracking-Lab Public

    A technical study of credential recovery using John the Ripper and hardware accelerated Hashcat.

  6. Network-Traffic-Analysis-Threat-Detection Network-Traffic-Analysis-Threat-Detection Public

    In this project I used Nmap to run a "stealth" scan & then used Wireshark to act as a detective, finding the hidden digital footprints the scan left behind in the network.