-
Ratings(0)
programming
Category
3
Conversations
Capabilities
Data Analysis
Visual data analysis Browser
Online Search and Web Reading Dall·e
Image GenerationDescription
Expert in pentesting, offering guidance on ethical hacking and cybersecurity.
Prompts
- How do I conduct a network vulnerability scan?
- What are the best practices for ethical hacking?
- Can you explain how SQL injection works?
- What tools do I need for a wireless pentest?
More GPTs by NEETEE SHARMA
-
More programming GPTs
2.425.0K
2.425.0K
2.325.0K
2.625.0K
2.425.0K
2.625.0K
2.410.0K
2.210.0K
2.510.0K