CyberPhoenix-0 / metamorphRebornView external linksLinks
Project for CyberSecurity Bachelor
☆16Mar 9, 2022Updated 3 years ago
Alternatives and similar repositories for metamorphReborn
Users that are interested in metamorphReborn are comparing it to the libraries listed below
Sorting:
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Mar 16, 2023Updated 2 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection☆41Sep 3, 2025Updated 5 months ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Free courses☆72Apr 1, 2023Updated 2 years ago
- - Crawler on tor network sites, searching for keywords.☆165Jul 25, 2023Updated 2 years ago
- Top disclosed reports from HackerOne☆161Apr 15, 2021Updated 4 years ago
- Dorks for Bug Bounty Hunting☆187Jul 16, 2024Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆347Jun 17, 2023Updated 2 years ago
- ☆417Jan 13, 2026Updated last month
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- ES6 Türkçe kaynak listesi☆427Mar 4, 2021Updated 4 years ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- i will upload more templates here to share with the comunity.☆568Apr 17, 2024Updated last year
- Web App bug hunting☆577Nov 26, 2025Updated 2 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆777Oct 16, 2025Updated 3 months ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Jun 23, 2023Updated 2 years ago
- A small tool that extracts relative URLs from a file.☆767Sep 23, 2020Updated 5 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆802Jul 4, 2023Updated 2 years ago
- Tool to search secrets in various filetypes.☆1,030Apr 25, 2023Updated 2 years ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,192Jan 24, 2026Updated 2 weeks ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,442Feb 7, 2026Updated last week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,431Mar 5, 2024Updated last year
- Asset inventory of over 800 public bug bounty programs.☆1,517Feb 14, 2025Updated 11 months ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,396Sep 13, 2024Updated last year
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,749Sep 29, 2025Updated 4 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,483Jan 29, 2021Updated 5 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,648Oct 7, 2025Updated 4 months ago
- All-in-One malware analysis tool.☆1,938Updated this week
- Collection of methodology and test case for various web vulnerabilities.☆6,999Jun 25, 2025Updated 7 months ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,665Sep 10, 2025Updated 5 months ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,857Dec 8, 2025Updated 2 months ago
- A curated list of amazingly awesome Cybersecurity datasets☆1,918Mar 2, 2024Updated last year
- ☆1,867Feb 3, 2026Updated last week
- A simple script just made for self use for bypassing 403☆2,029May 30, 2024Updated last year
- An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19…☆2,050Sep 1, 2022Updated 3 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,175Aug 15, 2024Updated last year