Uncover the curses

Pandora's box

oecrDvsi ewn olots dna oecserusr aerdetl ot eht lwdor of cikganh nda grrnmogmpai.

Pandora.
Pandora.
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • WebHaptics

    Haptic feedback for the mobile web

    • Mobile
    • Programming
    • Web
  • portless

    Replace port numbers with stable, named .localhost URLs. For humans and agents

    • Network
    • Programming
  • EICAR

    A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs

    • AV Bypass
    • Malware
  • Open Security Training

    A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security

    • Multi
  • SYMBL

    Explore symbols, characters, hieroglyphs, scripts, and alphabets

    • Fonts
  • Paged Out!

    A free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics

    • Multi
  • EntraGoat

    A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges

    • Azure
    • Cloud
  • Pico Keys

    A Personal Secure Key with open hardware and software

    • Passkeys
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • WebHaptics

    Haptic feedback for the mobile web

    • Mobile
    • Programming
    • Web
  • portless

    Replace port numbers with stable, named .localhost URLs. For humans and agents

    • Network
    • Programming
  • EICAR

    A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs

    • AV Bypass
    • Malware
  • Open Security Training

    A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security

    • Multi
  • SYMBL

    Explore symbols, characters, hieroglyphs, scripts, and alphabets

    • Fonts
  • Paged Out!

    A free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics

    • Multi
  • EntraGoat

    A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges

    • Azure
    • Cloud
  • Pico Keys

    A Personal Secure Key with open hardware and software

    • Passkeys
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • WebHaptics

    Haptic feedback for the mobile web

    • Mobile
    • Programming
    • Web
  • portless

    Replace port numbers with stable, named .localhost URLs. For humans and agents

    • Network
    • Programming
  • EICAR

    A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs

    • AV Bypass
    • Malware
  • Open Security Training

    A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security

    • Multi
  • SYMBL

    Explore symbols, characters, hieroglyphs, scripts, and alphabets

    • Fonts
  • Paged Out!

    A free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics

    • Multi
  • EntraGoat

    A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges

    • Azure
    • Cloud
  • Pico Keys

    A Personal Secure Key with open hardware and software

    • Passkeys
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • WebHaptics

    Haptic feedback for the mobile web

    • Mobile
    • Programming
    • Web
  • portless

    Replace port numbers with stable, named .localhost URLs. For humans and agents

    • Network
    • Programming
  • EICAR

    A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs

    • AV Bypass
    • Malware
  • Open Security Training

    A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security

    • Multi
  • SYMBL

    Explore symbols, characters, hieroglyphs, scripts, and alphabets

    • Fonts
  • Paged Out!

    A free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics

    • Multi
  • EntraGoat

    A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges

    • Azure
    • Cloud
  • Pico Keys

    A Personal Secure Key with open hardware and software

    • Passkeys

What is this?

Pandora's box is an indispensable treasure trove, brimming with the tools and resources you will seek in the midst of a security assessment, as you delve into new technologies, or as you strive to bring your own projects to life.

Does it have an API?

Of course, the deities provide their sacred API, granting you the power to summon the curses you seek. They implore you, explore the swagger UI and uncover what awaits.

The Olympus Garden.

Discover the Olympus Garden

This section is not unlocked yet.

Statistics

  • Total curses: 699
  • Number of categories: 119
  • Last update: 13/03/2026

Collaborate

Feel free to offer your own curses and ideas to Pandora's box. Let your creations join the chaos, for there are no limits to what may be unleashed.