Skip to content
View VVVI5HNU's full-sized avatar

Block or report VVVI5HNU

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
VVVI5HNU/README.md

Vishnu Nair

Security Researcher and VAPT Tester with hands-on experience in identifying and exploiting security vulnerabilities across web applications, mobile applications, APIs, and network infrastructures. Passionate about offensive security, secure architecture, and helping organizations improve their security posture.


🔐 What I Do

  • Web Application Security Testing
  • Mobile Application Security Testing (Android & iOS)
  • API Security Testing
  • Network Security Testing
  • Source Code Security Review

📫 Connect With Me


Pinned Loading

  1. Aircrack-ng Aircrack-ng Public

    Wi-Fi handshake capture and cracking process using Aircrack-ng

  2. CVE-2025-55182 CVE-2025-55182 Public

    Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.

    Python 1

  3. frida-ssl-pinning-bypass-script frida-ssl-pinning-bypass-script Public

    A Frida-based script designed for authorized mobile application security testing to analyze and bypass SSL/TLS certificate pinning mechanisms during VAPT engagements. Intended for research and diag…

    JavaScript 1 1

  4. Installing-ADB-Frida Installing-ADB-Frida Public

    Frida is Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. Dynamic instrumentation is the process of modifying the instructions of a binary program while …

    1

  5. windows-password-bypass windows-password-bypass Public

    Step-by-step methods to bypass or reset local Windows passwords using Sticky Keys, Utilman replacement, and Kali Linux Live Boot. For ethical hacking, recovery, and cybersecurity learning.

    1

  6. XSS-Cross-Site-Scripting XSS-Cross-Site-Scripting Public

    Most useful payloads to prove the vast majority of Cross Site Scripting (XSS)

    1