-
Ratings(0)
programming
Category
3
Conversations
Capabilities
Data Analysis
Visual data analysis Browser
Online Search and Web Reading Dall·e
Image GenerationDescription
Expert in pentesting, offering guidance on ethical hacking and cybersecurity.
Prompts
- How do I conduct a network vulnerability scan?
- What are the best practices for ethical hacking?
- Can you explain how SQL injection works?
- What tools do I need for a wireless pentest?
More GPTs by NEETEE SHARMA
-
More programming GPTs

2.425.0K

2.425.0K

2.325.0K

2.625.0K

2.425.0K

2.625.0K

2.410.0K

2.210.0K

2.510.0K