You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates how file extension spoofing can be used to evade detection.
Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advanced obfuscation and session management, making it ideal for simulating real-world attack scenarios and assessing system security.
CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable endpoints, targeting various types of vulnerabilities such as XSS, SQL Injection, and more.
An innovative application designed to help pharmacists and pharmacy students quickly research FDA-approved drugs by retrieving relevant information from drug labels and adverse event datasets, and providing AI-generated summaries to streamline the learning process
DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was developed in response to community requests for a tool focused on this region.
ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API queries, and user detail endpoints to find usernames. Ideal for security assessments, this tool supports configurable timeouts and concurrency.
This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT is Inspired by the themes of anonymity and digital protest. Please note that this is purely for educational and artistic purposes.
PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual deception, clipboard poisoning, and file‑format spoofing to trick users into downloading and executing malicious code.