This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT is Inspired by the themes of anonymity and digital protest. Please note that this is purely for educational and artistic purposes.
☆13Sep 25, 2024Updated last year
Alternatives and similar repositories for Defacement
Users that are interested in Defacement are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆19Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆18Jan 29, 2025Updated last year
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆19Mar 9, 2026Updated 2 months ago
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆19Oct 17, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆38Dec 3, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆33Oct 17, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆11Jul 24, 2025Updated 9 months ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆39Feb 4, 2026Updated 3 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆16Jan 17, 2025Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆85Apr 12, 2025Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆83Oct 17, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆25Mar 19, 2026Updated 2 months ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆23Jan 20, 2025Updated last year
- ☆12Mar 8, 2025Updated last year
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆12Jan 31, 2025Updated last year
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆11May 7, 2026Updated 2 weeks ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17Aug 1, 2023Updated 2 years ago
- Telegram Spammer ini digunakan untuk menyepam telegram pelaku penyebar Aplikasi Scamm atau Phising☆12Feb 25, 2024Updated 2 years ago
- this script for spamming Indonesian number☆10Mar 12, 2025Updated last year
- ☆12Mar 20, 2022Updated 4 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 6 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆36May 8, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- ☆24Mar 22, 2025Updated last year
- Handy scripts and one-liners to make life easier☆38Mar 6, 2023Updated 3 years ago
- ☆13Jul 11, 2024Updated last year
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated last year
- ☆157Feb 3, 2025Updated last year
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago