This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT is Inspired by the themes of anonymity and digital protest. Please note that this is purely for educational and artistic purposes.
☆12Sep 25, 2024Updated last year
Alternatives and similar repositories for Defacement
Users that are interested in Defacement are comparing it to the libraries listed below
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆16Jan 29, 2025Updated last year
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Mar 9, 2026Updated last week
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Apr 12, 2025Updated 11 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 8 months ago
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆20Nov 24, 2025Updated 3 months ago
- ☆12Mar 8, 2025Updated last year
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆12Jan 31, 2025Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Feb 11, 2026Updated last month
- 🌍 My website☆10Nov 23, 2025Updated 3 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 10 months ago
- ☆147Jan 22, 2026Updated 2 months ago
- Telegram Spammer ini digunakan untuk menyepam telegram pelaku penyebar Aplikasi Scamm atau Phising☆12Feb 25, 2024Updated 2 years ago
- this script for spamming Indonesian number☆10Mar 12, 2025Updated last year
- ☆15Aug 1, 2023Updated 2 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Website Portfolio V2☆12Sep 26, 2024Updated last year
- ☆11Dec 15, 2022Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- ☆23Mar 22, 2025Updated last year
- A collection of challenges I made for CTF competitions☆17Jan 28, 2026Updated last month
- ☆13Jul 11, 2024Updated last year