Uncover the curses

Pandora's box

oecrDvsi ewn olots dna oecserusr aerdetl ot eht lwdor of cikganh nda grrnmogmpai.

Pandora.
Pandora.
  • PortSwigger Academy

    Free, online web security training from the creators of Burp Suite

    • API
    • GraphQL
    • JWT
    • OAuth
    • Web
  • iso8583.info

    The frontend to online tools around financial transaction messages, data exploring, mining, parsing and simulation

    • Payments
  • Payment Card Tools

    Tools for engineers working in the Payment Card Industry

    • Payments
  • RFIDIOt

    A collection of tools and libraries for exploring RFID technology

    • RFID
  • More is Less: Extra Features in Contactless Payments Break Security

    A paper that investigates how independent extensions to the EMV contactless payment system by various stakeholders (such as Apple, Google, Visa, and Square) introduce vulnerabilities. Through formal modeling and experimentation, the authors reveal critical flaws enabling unauthorized high-value offline transactions and propose fixes developed in collaboration with industry partners

    • Payments
    • RFID
  • SoK: Security of EMV Contactless Payment Systems

    Analyzes security vulnerabilities in EMV contactless payment systems, focusing on Visa and Mastercard. It categorizes attacks across application selection, cardholder authentication, and transaction authorization, replicates them to assess feasibility, and offers protocol evaluations with comparative insights and countermeasures

    • Payments
    • RFID
  • User-space library rootkits revisited

    This manuscript describes the classical approach to build user-space library rootkits, the traditional detection mechanisms, and different evasion techniques (it also includes understandable code snippets and examples). In addition, it offers some guidelines to implement new detection tools and improve the existing ones to the extent possible

    • Linux
    • Malware
  • Mifare Classic 1K and 4K NFC Tags

    In this video series you will learn both Mifare Classic and Mifare Classic EV1 tags. You will understand how access rights, value block works

    • RFID
  • Crunchbase

    Discover and act on private market activity with predictive company intelligence

    • OSINT
  • Starlight

    Full-featured documentation theme built on top of the Astro framework

    • Documentation
    • Programming
    • Web
  • PortSwigger Academy

    Free, online web security training from the creators of Burp Suite

    • API
    • GraphQL
    • JWT
    • OAuth
    • Web
  • iso8583.info

    The frontend to online tools around financial transaction messages, data exploring, mining, parsing and simulation

    • Payments
  • Payment Card Tools

    Tools for engineers working in the Payment Card Industry

    • Payments
  • RFIDIOt

    A collection of tools and libraries for exploring RFID technology

    • RFID
  • More is Less: Extra Features in Contactless Payments Break Security

    A paper that investigates how independent extensions to the EMV contactless payment system by various stakeholders (such as Apple, Google, Visa, and Square) introduce vulnerabilities. Through formal modeling and experimentation, the authors reveal critical flaws enabling unauthorized high-value offline transactions and propose fixes developed in collaboration with industry partners

    • Payments
    • RFID
  • SoK: Security of EMV Contactless Payment Systems

    Analyzes security vulnerabilities in EMV contactless payment systems, focusing on Visa and Mastercard. It categorizes attacks across application selection, cardholder authentication, and transaction authorization, replicates them to assess feasibility, and offers protocol evaluations with comparative insights and countermeasures

    • Payments
    • RFID
  • User-space library rootkits revisited

    This manuscript describes the classical approach to build user-space library rootkits, the traditional detection mechanisms, and different evasion techniques (it also includes understandable code snippets and examples). In addition, it offers some guidelines to implement new detection tools and improve the existing ones to the extent possible

    • Linux
    • Malware
  • Mifare Classic 1K and 4K NFC Tags

    In this video series you will learn both Mifare Classic and Mifare Classic EV1 tags. You will understand how access rights, value block works

    • RFID
  • Crunchbase

    Discover and act on private market activity with predictive company intelligence

    • OSINT
  • Starlight

    Full-featured documentation theme built on top of the Astro framework

    • Documentation
    • Programming
    • Web
  • PortSwigger Academy

    Free, online web security training from the creators of Burp Suite

    • API
    • GraphQL
    • JWT
    • OAuth
    • Web
  • iso8583.info

    The frontend to online tools around financial transaction messages, data exploring, mining, parsing and simulation

    • Payments
  • Payment Card Tools

    Tools for engineers working in the Payment Card Industry

    • Payments
  • RFIDIOt

    A collection of tools and libraries for exploring RFID technology

    • RFID
  • More is Less: Extra Features in Contactless Payments Break Security

    A paper that investigates how independent extensions to the EMV contactless payment system by various stakeholders (such as Apple, Google, Visa, and Square) introduce vulnerabilities. Through formal modeling and experimentation, the authors reveal critical flaws enabling unauthorized high-value offline transactions and propose fixes developed in collaboration with industry partners

    • Payments
    • RFID
  • SoK: Security of EMV Contactless Payment Systems

    Analyzes security vulnerabilities in EMV contactless payment systems, focusing on Visa and Mastercard. It categorizes attacks across application selection, cardholder authentication, and transaction authorization, replicates them to assess feasibility, and offers protocol evaluations with comparative insights and countermeasures

    • Payments
    • RFID
  • User-space library rootkits revisited

    This manuscript describes the classical approach to build user-space library rootkits, the traditional detection mechanisms, and different evasion techniques (it also includes understandable code snippets and examples). In addition, it offers some guidelines to implement new detection tools and improve the existing ones to the extent possible

    • Linux
    • Malware
  • Mifare Classic 1K and 4K NFC Tags

    In this video series you will learn both Mifare Classic and Mifare Classic EV1 tags. You will understand how access rights, value block works

    • RFID
  • Crunchbase

    Discover and act on private market activity with predictive company intelligence

    • OSINT
  • Starlight

    Full-featured documentation theme built on top of the Astro framework

    • Documentation
    • Programming
    • Web
  • PortSwigger Academy

    Free, online web security training from the creators of Burp Suite

    • API
    • GraphQL
    • JWT
    • OAuth
    • Web
  • iso8583.info

    The frontend to online tools around financial transaction messages, data exploring, mining, parsing and simulation

    • Payments
  • Payment Card Tools

    Tools for engineers working in the Payment Card Industry

    • Payments
  • RFIDIOt

    A collection of tools and libraries for exploring RFID technology

    • RFID
  • More is Less: Extra Features in Contactless Payments Break Security

    A paper that investigates how independent extensions to the EMV contactless payment system by various stakeholders (such as Apple, Google, Visa, and Square) introduce vulnerabilities. Through formal modeling and experimentation, the authors reveal critical flaws enabling unauthorized high-value offline transactions and propose fixes developed in collaboration with industry partners

    • Payments
    • RFID
  • SoK: Security of EMV Contactless Payment Systems

    Analyzes security vulnerabilities in EMV contactless payment systems, focusing on Visa and Mastercard. It categorizes attacks across application selection, cardholder authentication, and transaction authorization, replicates them to assess feasibility, and offers protocol evaluations with comparative insights and countermeasures

    • Payments
    • RFID
  • User-space library rootkits revisited

    This manuscript describes the classical approach to build user-space library rootkits, the traditional detection mechanisms, and different evasion techniques (it also includes understandable code snippets and examples). In addition, it offers some guidelines to implement new detection tools and improve the existing ones to the extent possible

    • Linux
    • Malware
  • Mifare Classic 1K and 4K NFC Tags

    In this video series you will learn both Mifare Classic and Mifare Classic EV1 tags. You will understand how access rights, value block works

    • RFID
  • Crunchbase

    Discover and act on private market activity with predictive company intelligence

    • OSINT
  • Starlight

    Full-featured documentation theme built on top of the Astro framework

    • Documentation
    • Programming
    • Web

What is this?

Pandora's box is an indispensable treasure trove, brimming with the tools and resources you will seek in the midst of a security assessment, as you delve into new technologies, or as you strive to bring your own projects to life.

Does it have an API?

Of course, the deities provide their sacred API, granting you the power to summon the curses you seek. They implore you, explore the swagger UI and uncover what awaits.

The Olympus Garden.

Discover the Olympus Garden

This section is not unlocked yet.

Statistics

  • Total curses: 527
  • Number of categories: 106
  • Last update: 25/07/2025

Contribute

Feel free to offer your own curses and ideas to Pandora's box. Let your creations join the chaos, for there are no limits to what may be unleashed.