Uncover the curses

Pandora's box

oecrDvsi ewn olots dna oecserusr aerdetl ot eht lwdor of cikganh nda grrnmogmpai.

Pandora.
Pandora.
  • blueTag

    JTAGulator alternative & a hardware hacker's multi-tool for Raspberry Pico development boards

    • Hardware
    • Scanner
  • Studio

    A suite of random, mostly weird, generative art tools

    • Design
    • Web
  • Detail

    A collection of small details that make big difference

    • Design
    • Web
  • COBE

    The 5KB WebGL globe

    • Programming
    • Web
  • rtk

    CLI proxy that reduces LLM token consumption by 60-90% on common dev commands. Single Rust binary, zero dependencies

    • AI
  • VMkatz

    Extract Windows credentials directly from VM memory snapshots and virtual disks

    • Passwords
    • VM
    • Windows
  • rvcodec.js

    RISC-V instruction encoder/decoder

    • Reversing
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • blueTag

    JTAGulator alternative & a hardware hacker's multi-tool for Raspberry Pico development boards

    • Hardware
    • Scanner
  • Studio

    A suite of random, mostly weird, generative art tools

    • Design
    • Web
  • Detail

    A collection of small details that make big difference

    • Design
    • Web
  • COBE

    The 5KB WebGL globe

    • Programming
    • Web
  • rtk

    CLI proxy that reduces LLM token consumption by 60-90% on common dev commands. Single Rust binary, zero dependencies

    • AI
  • VMkatz

    Extract Windows credentials directly from VM memory snapshots and virtual disks

    • Passwords
    • VM
    • Windows
  • rvcodec.js

    RISC-V instruction encoder/decoder

    • Reversing
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • blueTag

    JTAGulator alternative & a hardware hacker's multi-tool for Raspberry Pico development boards

    • Hardware
    • Scanner
  • Studio

    A suite of random, mostly weird, generative art tools

    • Design
    • Web
  • Detail

    A collection of small details that make big difference

    • Design
    • Web
  • COBE

    The 5KB WebGL globe

    • Programming
    • Web
  • rtk

    CLI proxy that reduces LLM token consumption by 60-90% on common dev commands. Single Rust binary, zero dependencies

    • AI
  • VMkatz

    Extract Windows credentials directly from VM memory snapshots and virtual disks

    • Passwords
    • VM
    • Windows
  • rvcodec.js

    RISC-V instruction encoder/decoder

    • Reversing
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting
  • blueTag

    JTAGulator alternative & a hardware hacker's multi-tool for Raspberry Pico development boards

    • Hardware
    • Scanner
  • Studio

    A suite of random, mostly weird, generative art tools

    • Design
    • Web
  • Detail

    A collection of small details that make big difference

    • Design
    • Web
  • COBE

    The 5KB WebGL globe

    • Programming
    • Web
  • rtk

    CLI proxy that reduces LLM token consumption by 60-90% on common dev commands. Single Rust binary, zero dependencies

    • AI
  • VMkatz

    Extract Windows credentials directly from VM memory snapshots and virtual disks

    • Passwords
    • VM
    • Windows
  • rvcodec.js

    RISC-V instruction encoder/decoder

    • Reversing
  • VulHunt

    A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.

    • DFIR
    • Malware
    • Reversing
    • SAST
    • Threat Hunting

What is this?

Pandora's box is an indispensable treasure trove, brimming with the tools and resources you will seek in the midst of a security assessment, as you delve into new technologies, or as you strive to bring your own projects to life.

Does it have an API?

Of course, the deities provide their sacred API, granting you the power to summon the curses you seek. They implore you, explore the swagger UI and uncover what awaits.

The Olympus Garden.

Discover the Olympus Garden

This section is not unlocked yet.

Statistics

  • Total curses: 708
  • Number of categories: 119
  • Last update: 27/03/2026

Collaborate

Feel free to offer your own curses and ideas to Pandora's box. Let your creations join the chaos, for there are no limits to what may be unleashed.