RISC-V Online Assembler using Emscripten, Gnu Binutils
Pandora's box
oecrDvsi ewn olots dna oecserusr aerdetl ot eht lwdor of cikganh nda grrnmogmpai.
RISC-V Online Assembler VMkatz Extract Windows credentials directly from VM memory snapshots and virtual disks
RISC-V ISA Specification Documentation of RISC-V ISA
rvcodec.js RISC-V instruction encoder/decoder
VulHunt A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.
WebHaptics Haptic feedback for the mobile web
portless Replace port numbers with stable, named .localhost URLs. For humans and agents
EICAR A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs
Open Security Training A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security
SYMBL Explore symbols, characters, hieroglyphs, scripts, and alphabets
RISC-V Online Assembler RISC-V Online Assembler using Emscripten, Gnu Binutils
VMkatz Extract Windows credentials directly from VM memory snapshots and virtual disks
RISC-V ISA Specification Documentation of RISC-V ISA
rvcodec.js RISC-V instruction encoder/decoder
VulHunt A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.
WebHaptics Haptic feedback for the mobile web
portless Replace port numbers with stable, named .localhost URLs. For humans and agents
EICAR A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs
Open Security Training A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security
SYMBL Explore symbols, characters, hieroglyphs, scripts, and alphabets
RISC-V Online Assembler RISC-V Online Assembler using Emscripten, Gnu Binutils
VMkatz Extract Windows credentials directly from VM memory snapshots and virtual disks
RISC-V ISA Specification Documentation of RISC-V ISA
rvcodec.js RISC-V instruction encoder/decoder
RISC-V Online Assembler RISC-V Online Assembler using Emscripten, Gnu Binutils
VMkatz Extract Windows credentials directly from VM memory snapshots and virtual disks
RISC-V ISA Specification Documentation of RISC-V ISA
rvcodec.js RISC-V instruction encoder/decoder
VulHunt A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.
WebHaptics Haptic feedback for the mobile web
portless Replace port numbers with stable, named .localhost URLs. For humans and agents
EICAR A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs
Open Security Training A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security
SYMBL Explore symbols, characters, hieroglyphs, scripts, and alphabets
RISC-V Online Assembler RISC-V Online Assembler using Emscripten, Gnu Binutils
VMkatz Extract Windows credentials directly from VM memory snapshots and virtual disks
RISC-V ISA Specification Documentation of RISC-V ISA
rvcodec.js RISC-V instruction encoder/decoder
VulHunt A unified platform for vulnerability detection, malware analysis, and more. Working from a single source of truth across multiple representations including disassembly, intermediate representation (IR), and decompiled code.
WebHaptics Haptic feedback for the mobile web
portless Replace port numbers with stable, named .localhost URLs. For humans and agents
EICAR A computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus programs
Open Security Training A community-driven, non-profit initiative providing free, high-quality, open-licensed training materials for computer security
SYMBL Explore symbols, characters, hieroglyphs, scripts, and alphabets
What is this?
Pandora's box is an indispensable treasure trove, brimming with the tools and resources you will seek in the midst of a security assessment, as you delve into new technologies, or as you strive to bring your own projects to life.
Does it have an API?
Of course, the deities provide their sacred API, granting you the power to summon the curses you seek. They implore you, explore the swagger UI and uncover what awaits.
Discover the Olympus Garden
This section is not unlocked yet.
Statistics
- Total curses: 703
- Number of categories: 119
- Last update: 20/03/2026
Collaborate
Feel free to offer your own curses and ideas to Pandora's box. Let your creations join the chaos, for there are no limits to what may be unleashed.