This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT is Inspired by the themes of anonymity and digital protest. Please note that this is purely for educational and artistic purposes.
☆12Sep 25, 2024Updated last year
Alternatives and similar repositories for Defacement
Users that are interested in Defacement are comparing it to the libraries listed below
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆15Jan 29, 2025Updated last year
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Updated this week
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Oct 19, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆35Feb 4, 2026Updated 3 weeks ago
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆13Feb 19, 2026Updated last week
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆82Apr 12, 2025Updated 10 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆42Jan 29, 2025Updated last year
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆12Jan 31, 2025Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆17Oct 3, 2024Updated last year
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Jan 12, 2025Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Feb 11, 2026Updated 2 weeks ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 2 years ago
- ☆12Mar 8, 2025Updated 11 months ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆36Jan 25, 2026Updated last month
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆37Apr 5, 2025Updated 10 months ago
- ☆23Mar 22, 2025Updated 11 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- ☆141Jan 22, 2026Updated last month
- CLI for rendering text with headless chrome.☆11Jul 11, 2020Updated 5 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year