This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT is Inspired by the themes of anonymity and digital protest. Please note that this is purely for educational and artistic purposes.
☆13Sep 25, 2024Updated last year
Alternatives and similar repositories for Defacement
Users that are interested in Defacement are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆18Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆17Jan 29, 2025Updated last year
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Mar 9, 2026Updated last month
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆18Oct 17, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆38Dec 3, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆32Oct 17, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 8 months ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆37Feb 4, 2026Updated 2 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆15Jan 17, 2025Updated last year
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆14Mar 2, 2026Updated last month
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Apr 12, 2025Updated 11 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆34Jul 13, 2025Updated 8 months ago
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆22Mar 19, 2026Updated 3 weeks ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆22Jan 20, 2025Updated last year
- ☆12Mar 8, 2025Updated last year
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆12Jan 31, 2025Updated last year
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Apr 1, 2026Updated last week
- 🌍 My website☆10Nov 23, 2025Updated 4 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- ☆151Jan 22, 2026Updated 2 months ago
- Telegram Spammer ini digunakan untuk menyepam telegram pelaku penyebar Aplikasi Scamm atau Phising☆12Feb 25, 2024Updated 2 years ago
- this script for spamming Indonesian number☆10Mar 12, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Aug 1, 2023Updated 2 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Website Portfolio V2☆12Sep 26, 2024Updated last year
- ☆12Mar 20, 2022Updated 4 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- ☆11Dec 15, 2022Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago