Project for CyberSecurity Bachelor
☆16Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for metamorphReborn
Users that are interested in metamorphReborn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Oct 18, 2022Updated 3 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Mar 16, 2023Updated 3 years ago
- Nina is a tool disigned to perform basic recon from domains and their subdomains.☆19Feb 19, 2024Updated 2 years ago
- A Game platform to spread awareness among school and university students about various cyber attacks.☆15Oct 21, 2018Updated 7 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Oct 3, 2021Updated 4 years ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆37Sep 11, 2023Updated 2 years ago
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated 11 months ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection☆41Sep 3, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A platform for running CTFs☆35May 28, 2016Updated 9 years ago
- List of questions, answers and random notes for security interviews☆72May 7, 2021Updated 4 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Feb 2, 2017Updated 9 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Jul 22, 2025Updated 8 months ago
- I'm uploading dorks here.☆53Nov 7, 2015Updated 10 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆46Jan 20, 2025Updated last year
- Dorks Hacking Database for educational proposal☆86Jan 8, 2021Updated 5 years ago
- A python script to perform dorks using DuckDuckGo search engine.☆91Jan 11, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- In depth guide for cybersecurity interviews☆149Jul 19, 2022Updated 3 years ago
- Summer-Research-Internship-Programs☆64Dec 12, 2021Updated 4 years ago
- Free courses☆72Apr 1, 2023Updated 2 years ago
- Dorks for Google, Shodan and BinaryEdge☆140Mar 3, 2020Updated 6 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- Nice list of google dorks for SQL injection☆136May 12, 2018Updated 7 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆113Feb 22, 2022Updated 4 years ago
- A simple capture the flag framework.☆126May 28, 2017Updated 8 years ago
- A platform to develop, run and administer CTF competitions. This is the online echoCTF.RED platform source code☆146Mar 19, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Top disclosed reports from HackerOne☆162Apr 15, 2021Updated 4 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆233Oct 8, 2024Updated last year
- - Crawler on tor network sites, searching for keywords.☆170Jul 25, 2023Updated 2 years ago
- Android Bug Hunting☆210Sep 6, 2024Updated last year
- Dorks for Bug Bounty Hunting☆186Jul 16, 2024Updated last year
- Github Hacking Database - My personal collection of Github Dorks to search for Confidential Information (Yes, it's a Github version of Go…☆242Nov 24, 2025Updated 4 months ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year