Fast & precise
Move rooms and symbols with mouse or set their sizes and distances numerically when high precision is required.
Multi-platform
Use your mobile device on location and complete the work on your computer at the office.
3D mode
See your project in 3D, as many floors as you need. Camera can be freely positioned.
Create detailed and precise floor plans. See them in 3D or print to scale. Add furniture to design interior of your home. Have your floor plan with you while shopping to check if there is enough room for a new furniture.
: Archives like this found on public forums or Telegram channels often contain malware (such as info-stealers) designed to infect the person downloading the "tools" [3]. Review Summary Utility
High probability of being a "trap" file containing trojans or backdoors [3].
Can be a time-saver for legitimate penetration testing, but many lists are outdated.
: These files are generally used by security researchers or hackers to automate the discovery of specific file types (like .env or config.php ) or login pages that shouldn't be public [2].
: Using these dorks to access unauthorized data can be illegal in many jurisdictions [1].
Based on its name and typical usage in cybersecurity circles, is a compressed archive containing a collection of "Google Dorks" (advanced search strings) intended for finding vulnerable websites, exposed databases, or private information [1, 2]. File Overview
Primarily used for unauthorized scanning and data harvesting.
: Usually consists of multiple .txt files categorized by the type of vulnerability they target (e.g., SQL injection points, WordPress vulnerabilities, or administrative panels) [2, 3]. Risk Level : High .