- Project #1 - SSH login brute forcing
- Project #2 - SHA256 password cracking
- Project #3 - Web login form brute forcing
- Project #4 - Exploiting a SQL injection
- Project #5 - Exploiting a restricted SQL injection
For educational purposes only. Visit TCM Security course page for more details.