top of page

Achievements Gallery

GLC Students have made real-world contributions as shown below. 

Cybersecurity Conference Papers

GLC students authored a cybersecurity conference paper on modeling the links between reconnaissance techniques and using statistical algorithms to analyze the interactions between the techniques. GLC students also authored a second cyber security conference paper on reconnaissance on industrial control systems (ICSs).

Bug Bounty Recognition

GLC students earned spots on the Hall of Fame for Drexel University's bug bounty program. Search for E. Cohen, E. Deitz, and Jordana W.  GLC students have also received private recognition form organizations for ethically hacking into things like data center cooling systems, autonomous shipping vessels, network attached storage devices, and satellite communication terminals. 

Google Hacks

GLC students have authored many new Google Hacks. Google Hacks represent unique Google searches that can be used to find ethical hacking targets. A full list GLC hacks can be found here.

Penetration Testing Modules

GLC students have used ChatGPT to create their own Python-based penetration testing modules with the help of ChatGPT. Check out one GLC's student's modules here and another student's modules here

CVE Entry in the National Vulnerability Database

GLC students authored a critical Common Vulnerabilities and Exposures (CVE) entry in the National Vulnerability Database (NVD). The NVD is used world wide by cybersecurity experts and a wide variety of cybersecurity tools. The CVE entry focuses on software used to control network-connected key boxes.

bottom of page