Skip to content
View metalfury's full-sized avatar
♟️
change the process, change the outcome
♟️
change the process, change the outcome

Block or report metalfury

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
metalfury/README.md

$ whoami

From a young age, I've had a passion for IT. I am particularly interested in cybersecurity, especially penetration testing. I took part in personal and group projects in programming and aim to advance my skills by combining my interests in both programming and cybersecurity.

echo s0ci4l

LinkedIn

cat flag.txt

MTMzNwoKaSBuZXZlciBmb3JnaXZlLgoKaSBuZXZlciBmb3JnZXQu

Pinned Loading

  1. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python 1

  2. pentest-book pentest-book Public

    Forked from six2dez/pentest-book

    1

  3. CTF-tools CTF-tools Public

    This document includes commonly used tools and their basic usage in Capture The Flag (CTF) competitions.

  4. xsshunter-express xsshunter-express Public

    Forked from mandatoryprogrammer/xsshunter-express

    An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!

    JavaScript