DISCLAIMER

All projects were completed in controlled, educational environments using intentionally vulnerable systems.


They DO NOT involve unauthorized access to real-world systems or people, created purely for demonstration purposes only.