Most of my apps are free, and if they've been helpful to you, a donation goes a long way. It's how I keep everything running and continue building new tools. You'll also find more apps scattered throughout the site beyond this list. Want access to everything? A subscription unlocks all the blackjack training, the GC ONE app, analysis software, and more in the secure portal. One thing worth knowing: I have no sponsors and no advertisers. Everything on this site is completely independent, and any suggestions I make are purely my own opinion.
DONATION LINKI sincerely hope these applications serve you and your organization well. To everyone who has sent kind words and encouragement over the years, thank you. It means a great deal to know these tools have been useful to so many people. If you encounter any unauthorized use or distribution, please report it to the site admin. Please note that the tools published here are scaled-down versions of the originals. Most were built for defensive purposes, though a few are aggressive offensive tools intended for red teams and educational use only. Please use them responsibly.
Please view this video prior to downloading and using any apps. Windows security may/will block you from using apps.
YouTube VideoWhen downloading ZIP or executable (.exe) files from our website or other sources on the internet, Windows may prevent these files from running. Depending on your system configuration, you may encounter warnings or be unable to launch the application altogether.
This behavior is a built-in security feature of Microsoft Windows designed to protect your system from potentially harmful software. Files downloaded from the internet are treated as untrusted until verified.
When you attempt to run an executable file, Windows SmartScreen evaluates:
If the file is unsigned or not widely recognized, SmartScreen may display a warning such as "Windows protected your PC", or it may block the file from running entirely.
Additionally, Windows uses NTFS Alternate Data Streams to tag downloaded files with a security marker known as the Mark of the Web (MOTW). This marker is stored in a hidden stream called Zone.Identifier, where a value such as ZoneId=3 indicates the file originated from the Internet zone. Browsers such as Chrome and Edge can also set the MOTW.
Until this marker is removed, Windows will continue to treat the file as potentially unsafe. To unblock the file, you can:
Unblock-File -Path "C:\path\to\file.exe"
These safeguards help prevent accidental execution of malicious software, which is one of the most common methods used to compromise systems through internet downloads.
This is the training center for all OHSA, CAL OSHA, CASINO, MICS, EMPLOYEE, EEOC, NIGC, CARD COUNTING, SURVEILLANCE, CARD COUNTING, COMPLIANCE and other trainings, quizes and tests.
See Web PageMost of these trainings are free to use. Some may require an account to access. If these trainings helps you, please consider donating. Much of this site relies on donations to keep everything running. If you find any of the training useful please consider donating. Thank you.
DONATION LINKThis app is used to investigate files. ADS, MOTW, Signature, Entropy and much more. It also allows you to change zones, ADS and much more. This is a very powerful application and digital forensic tool. SHA 256 hash: FB32B819032931A0A98D5DBB339B6993BD047039C0F5052203459CF56387D390
YouTube Video YouTube Video File Investigation See Web Page Download (ZIP)Excellent investigation tool for system admin, investigators, security, compliance and others to use. You can use the app to find hidden files called ADS (alternate data stream) inside of a file. A lot of virus are hiddened this way. You can also hide files in another file using this tool. The tools allows you to change file zones and other things as well. This is a powerful tool, please use the app responsibly. Remember, NTFS allows ADS but FAT32 does not. If you find it useful please consider donating. Thank you.
DONATION LINKThe THUGON Website Scanner is a desktop-based structural website analysis tool designed to crawl and map publicly accessible website architecture. It builds a structured inventory of reachable pages, linked resources, and exposed files starting from a defined entry URL. This tool was originally built for investigators to analyze websites. SHA 256 hash: D2D1AE03522423F4E011251DD0083B79D53A8A3E998B891AD088FBC588B8E192
YouTube Video See Web Page Download (ZIP)Modern websites often contain hundreds or thousands of interconnected assets. Over time, content accumulates, structures change, and visibility into what is actually exposed to the public becomes limited. The THUGON Website Scanner provides transparency into the real, publicly accessible structure of a website. By rendering pages through a real browser engine and capturing HTTP responses, it produces an accurate structural inventory that reflects how the website behaves in the real world. I used only a single thread when the app crawls a website so that site bot monitoring systems won't ban the app and you from crawling. This will make the crawl look slow but it should get pass site bot monitoring systems. If you find it useful please consider donating. Thank you.
DONATION LINKThis stand alone app is used to secure private keys and files. It can secure them by splitting them or combining them back together. Also known as the RSA3072 Key splitter and combiner. I originally built this app to secure keys and files that are extremely sensitive. There are multiple ways that you can use this app. Deliver or store the splits separately, or together and require more than one person to input in the passwords to reconstruct the file. BACKUP your originals because there is no recovery. SHA256 hash: D842824AA657B94BD32DFE4B5B9E2374E8E7FB0C4C3D5AAC7663C931EEBE4A49
YouTube Video Download ZIPZero tolerance for compromise. AES256 GCM, XOR, passwords, PK100K iterations, SHA2 hash, n of n and more. Stand alone executable so no install. Windows OS only. Available by request only. Last version 2. You can also use it to split files, to secure them from multiple required access/joins and reconstruction that will require more then one person. Individual password requirement for split and reconstructions. Please remember, this is a n of n. Without all the pieces, and passwords, you cannot reconstruct the file. This is not Shamir's system k of n. This is setup for maximum strength and security. If you find it useful please consider donating. Thank you.
DONATION LINKI built this app because deleting sensitive data on your computer is not good enough and those data can still be recovered. This app was designed to securely shred keys, files and directories so even if someone was to recover the files, the data is useless. Audit log available and built in for compliance and auditing. Also known as Crypto Shredder. It was designed with auditing in mind. In secure environments, deletion of any secure files must be logged and documented. This will satisfy most secure file destruction processes. Only custom versions uses key files. SHA256 hash: 97E4A27D625341524CF0DBB365CB9A817FBC4985E95C9CB76461D95500F1D719
YouTube Video 1 YouTube Video 2 Download (ZIP)Overwrite file, random bytes (zeros), encrypt multiple times AES GCM in memory, deletes the file(s)/directory and flush memory. Windows OS only. Key files are only availabled for custom versions (can be unique, hard coded, SHA256 HASH checked) are distributed to authorized users and computers only. The free version does not have key files so you can use it for personal and business uses. This is a must have tool for all. All rights reserved by www.thugon.com. If you find it useful please consider donating. Thank you.
DONATION LINKRSA 3072 KEY GENERATOR APP / RSA 3072 KEY DECRYPTOR APP. These two apps are used to generate RSA public, private keys and decrypt the txt file to restore the submission. End to End Encryption. (The app's core files can be downloaded from the secure login portal.) Key Gen App SHA256 hash: 0D6FF624295DEC442BF87A415825CD9BB4239E6FF90A417CADD4FE8BEA7B462C. Decryption App SHA256: D53CAB220466B53FF73E2ADE35769DFA53B469D284B5AFDB63A76A097A5ACBB2
YouTube Video DEMO SITE DOWNLOAD KEYS GEN ZIP DOWNLOAD DECRYPTOR APP ZIPThe app's core files can be downloaded in the secure login portal. The anonymous/whistleblower portal is recommended to be deployed on the TOR network using only the TOR browser although it can be used on the clear net as well. The apps can be used for the anonymous/whistleblower secure reporting portal. This app is NOT used to generate keys for the Employee Expense Reporting Portal (end 2 end encryption).The Web Login Password and Hash Generator is used in that case. The RSA Key Gen can be used to generate a pair of public and private keys. The RSA decryptor app is used to decrypt the encrypted RSA txt files. For example, in the whistleblower reporting portal, when a user submits a report, the web portal will encrypt the data into a txt file (JSON). When you run the decryptor app, it will ask for the encrypted JSON or TXT file path. Then it will ask for the path to your private RSA key. The app will then use your private key to decrypt the "encrypted" JSON or txt file into readable text. The decryption will extract txt file from the encrypted txt file. It is secured with SHA2 hashing verification. Available by request only. Last version 1. See demo site on clear net. REMEMBER: the RSA public and private keys are generated together at the same time. Regardless if you have the public key, you will probably not be able to regenerate another private key. When RSA keys are created, the system: Picks two large secret prime numbers. Uses them to mathematically generate. The public key contains only partial information. The private key depends on the original secret primes. To recreate the private key, you’d need to reverse the math and recover those primes. That problem is based on integer factorization problem, which is: Extremely hard for large numbers (like 2048-bit RSA). Technically, it’s not impossible in a mathematical sense—it’s just: Computationally infeasible (would take absurd time/resources). Practically impossible with current technology. This property is what makes RSA safe for: HTTPS connections, File encryption, Digital signatures and etc.
This app is used for randomly picking items such as employees, inventory, department or what ever list you may have. It is mainly used for generating random pick reports for auditing, investigation, inspection or other compliance related process. You can use this instead of the SR PEO app. SHA256 hash: D26349D6E8FB1063E3DC314DC92704D74DD37A8D2219D10B8853445DD8D5F18E
YouTube Video Download (ZIP)This app will generate a report of your random pick of items from an excel sheet. You can input your name, title, reason, how many random picks and etc. Uses the Python SystemRandom() function. Tracks your excel file SHA256 (excel file hash changes when opened, no data change is required). Export report for auditing. Date and time stamp. Names or items listed report. Export report hash file for auditing or compliance tracking. If you find it useful please consider donating. Thank you.
SystemRandom() is a class in Python's built-in random module. Unlike the standard random number generator, SystemRandom() pulls its randomness from the operating system itself rather than a mathematical formula.
When you call SystemRandom(), Python reaches out to the operating system's entropy source. On Linux and Mac this is /dev/urandom and on Windows it uses CryptGenRandom. These sources collect unpredictable data from physical system activity such as mouse movements, keyboard timing, network activity, and hardware noise. That data is used to generate the random numbers.
The standard Python random module uses an algorithm called Mersenne Twister. This is a predictable generator, meaning if someone knows the starting seed value they can predict every number it will produce. This makes it unsuitable for security sensitive applications.
SystemRandom() cannot be seeded or predicted because it relies on the operating system, making it cryptographically secure. This is important for things like shuffling cards in a blackjack game, generating session tokens, creating secure passwords, and any situation where predictability would be a vulnerability.
DONATION LINKThis app was designed for public companies that falls under regulatory oversight. It is also used for private companies too. It was built as a proactive approach to meet strict requirements for the US and international companies as well. For the app's core files, you can download them from the secure login portal. The downloads below are supplements to the main app: WEB LOGIN/PHP HASH/TOTP APP is used to generate random passwords or specify passwords and PHP Hash for the Employee/Company Expense Reporting Portal. PRIVATE/PUBLIC KEYS GEN APP DOWNLOAD is used to generate the private and public keys to the app. WEB LOGIN PASSWORD AND HASH GENERATOR APP: Web login app SHA256 hash: CF0898B1A462746D54DFF9E1EDD7EA79E34D5FF3E74F06ABFC4082859E1646BC. Private/public keys app SHA256 hash: C79ED2D24347EC60E97E09CC49D020F4828CCA77CE043A73014125F9F84C4B0D. Decryption app SHA256: D53CAB220466B53FF73E2ADE35769DFA53B469D284B5AFDB63A76A097A5ACBB2
YouTube Video DEMO SITE WEB LOGIN/PHP HASH/TOTP APP DOWNLOAD PRIVATE/PUBLIC KEYS GEN APP DOWNLOAD DECRYPTION APP DOWNLOAD(You can download the app's core files in the secure login portal.) These apps are designed to support the Login and Employee expense reporting portal that was desinged to meet compliance, SOX, FCPA, SEC and etc. This app was also designed to meet international standards such as the US, Singapore, UK, EU and other juristrictions. This app will generate random or user specify password and TOTP keys. This app is used with the WEB LOGIN for the Employee Expense reporting portal online. The login will require a username and password. The login will also require Microsoft or Google Authenticator for mobile device as well. This is part of the 2FA secure login. This app uses BCRYPT. You will also need the RSA KEYS GENERATOR (ANSI AND UNICODE / UTF-8 MODE) to generate the public and private keys. Last version was 1.0.6. The WEBLOGIN PASS GENERATOR version is 4. Decryption app for the expense web form is version 3.0.3. This is unique and should not be used for other decryption process. SPECIAL NOTES: The WEB LOGIN FOR THE EXPENSE REPORTING PORTAL use custom encryption app, decryption app and a password/php hashing app. These are specific and does not work on other processes. Only available by direct request. Last version 1, 2, 3. See demo site. REMEMBER: the RSA public and private keys are generated together at the same time. Regardless if you have the public key, you will probably not be able to regenerate another private key. When RSA keys are created, the system: Picks two large secret prime numbers. Uses them to mathematically generate a pair of keys. The public key contains only partial information. The private key depends on the original secret primes. To recreate the private key, you’d need to reverse the math and recover those primes. That problem is based on integer factorization problem, which is: Extremely hard for large numbers (like 2048-bit RSA). Technically, it’s not impossible in a mathematical sense—it’s just: Computationally infeasible (would take absurd time/resources). Practically impossible with current technology. This property is what makes RSA safe for: HTTPS connections, File encryption, Digital signatures and etc. (Core files are own/copyrighted by thugon.com and it's developer Seng Thao, with exceptions to certain library file(s). All rights reserved.)
This app is used to hash files using SHA256. You can find the hash of any file. You can also compare files. SHA 256 hash: 1A96661A1C30F2669552267125AF3D4F26CB9B248CB0AFC9CC316D52C87044F
YouTube Video Download ZipThis app uses SHA-256 to hash files and compare hashes. I built it because I was constantly checking SHA-256 hashes for file downloads and verifications. Now you don't need to remember any command prompt or PowerShell commands. Just run the app and you're ready to go.
Current version: 3
When you download and unzip the file, Windows may silently block the exe from running with no prompt or warning. To fix this, follow these steps:
This happens because of a Windows security feature called SmartScreen, which blocks unrecognized or unsigned executables. Browsers like Chrome and Edge can also flag downloaded zip files the same way. This is known as Mark of the Web (MOTW) and is normal behavior for files downloaded from the internet.
If you find this app useful, please consider making a donation. Thank you.
DONATION LINKThe THUGON Port and Device Scanner is a Windows administrative device monitoring and control utility designed to give system administrators, security professionals, and advanced users full visibility into the devices connected to their system. The tool scans and categorizes hardware devices, tracks USB connection history, and provides the ability to safely enable or disable specific device types directly from an intuitive graphical interface.. SHA 256 hash: EB0DDAA2A73147E0394B79D681E3F1C6A57F9A36EE551279D74E815BE01D6AE1
YouTube Video Website Download ZipThe THUGON Port and Device Scanner queries Windows Plug-and-Play device information and system event logs to build a live inventory of all hardware devices connected to the system. Devices are categorized by type and status, allowing administrators to quickly identify USB devices, storage devices, network adapters, Bluetooth hardware, and other components. When investigating USB devices, it is important to understand that Windows records information about device installation, connections, users, and activity in multiple locations across the system. Pay particular attention to the earlier discussion on “USERS” logging, as it can provide valuable insights during an investigation. Relevant data sources may include registry keys, event logs, system databases, and user-specific metadata. This tool captures only a subset of these data points, offering initial clues rather than a complete picture. Use these clues to guide a more thorough examination of other sources as needed. If you find it useful, please consider donating. Thank you.
DONATION LINKThe primary purpose of the Thugon PC Wireless Disconnect War Screener Tool is to **prevent unauthorized access to your computer and protect sensitive data**. By continuously monitoring network connections in real time, the tool can immediately **disable the wireless connection** whenever suspicious activity is detected, stopping potential data leaks instantly. SHA 256 hash: BE4312714A13D529F42E996FE5B7CEF094844D87DA7B87397303A83F850DBAC8
YouTube Video Website Download ZipThe tool runs locally on your Windows PC with administrator privileges, allowing it to monitor all active network connections. It evaluates connections against configurable rules for: Specific IP addresses VPN traffic thresholds (in MB) Application-specific network activity (process monitoring) When a rule is triggered—such as a connection to a blocked IP, an application sending/receiving excessive data, or other suspicious activity—the tool will **automatically disable your Wi-Fi**, preventing potential data theft from your system. If you find it useful, please consider donating. Thank you.
DONATION LINKThey are all free. These are all of the Google Chrome Web Extension Apps. Yes, I am a Chrome extension developer with an active developer account.
YouTube Video Chrome Web StoreThese are all of the Google Chrome Web Extension Apps. They will work on Google Chrome and Microsoft Edge browsers. If you are running a Chromium based browser, then the extensions may work too. They are all free to use. Some extensions will make Chrome very powerful. Others such as the YouTube extension will make the browser more fun and exciting. These apps are all free. If you find them useful, feel free to donate.
DONATION LINKThese are all of the MICROSOFT EDGE ADDON apps and they are all free. Yes, I am a Microsoft Edge addon developer.
YouTube Video Edge Addon Web StoreThese are all of the Microsoft Edge Addon Apps. They are all free to use. Many of addons will make Microsoft Edge a very powerful and productive browser. Others are to make the browser more fun, such as the YouTube addon. Developing for Microsoft Edge was a very good experience. If you find them useful please consider donating. Thank you.
DONATION LINKThese are all of the MOZILLA FIREFOX ADDON Apps. Yes, I am a Mozilla Firefox addon developer.
YouTube Video Firefox Addon Web StoreThese are all of the Mozilla Firefox Addon Apps. They are all free to use. If you find them useful please consider donating. Thank you.
DONATION LINKHere is the link to the privacy policies of the browsers extensions and addons.
Privacy PoliciesIf you find that any of the browser extensions and addons are helpful, please feel free to donate. This site depends mainly on donations to keep running. All browsers' extenstions are free. There is a small donation link in the introduction.
This is the GC ONE Application. The full download is available in the secure login portal. Also known as the Gaming Commission One or Global Control One application. There are many videos on it in the YouTube Video channel. This application was built for GSOC, Tribal Gaming Commission and Corporate Management team. It meets all NIGC regulations and exceeds beyond. It also can be use by Tribal Council as well (for example: hearing process module). Version 2024, 2025, 2026 and beyond was designed to work on Azure desktop environment. Please contact for download approval. Again, you can search the YouTube video archive to learn more. If you would like download the full version or purchase a registration key for the app, please contact us directly. You do not need a subscription. Although a subscription will allow you to download the full version and other apps.
YouTube Video GC ONE Image Old Surveillance Image Secure LoginFull download is located in the secure login portal (You can download the full version and use it. Registration key purchase is separate but not required.) The original application was built in the early 2000s for the 24/7/365 operation of the Surveillance Department. Over the years, I upgraded it to do much more. It is a very powerful application regardless of what industry you are in. The current version added modules for Surveillance, Compliance, Auditing, Investigations, Gaming Commissioners, Gaming regulatory agencies, Security and many other agencies. There are differrent modes as well. This application was built to manage the entire process of many departments or an organization. The list of things that it can do and manage is very long. Here is short list of what it include, nist standards, rotating pin gen, MFA, encryptions, daily log, shift management, request, access, incidents, auditing, investigations, SDS (OSHA), purchasing orders, messaging system, documents/videos management, alerts, suspect profile tracking, inventory, training, memo, KB, evidence control, Tech, gaming items, visitor, jackpot, slot tracking, certification tracking, payment tracking, dispute tracking, close watch, vehicle search, people search, emergency activation, voice commands, vendor tracking, project tracking, time clock, wellness tracking, disciplinary tracking, improvement process, goals, kpi, reports, metrics and much more. It was built to comply with state, federal, tribal and international laws and regulations. Many other modules such as projects, lean sigma and other tools are bonuses. There are around 12 or more applications that comes with the main application also. For example, SHA2, SHA3, SHA1, Password keeper, Agent Long and many others. In 2024-2026 versions, Lily voice system was added. Lily is a voice assistance that you can activate to listen and run commands for you. She can active emergency protocals such as alerting all users to an emergency. The older voice system used an assistance called Yuna. Version 2024 and later was designed to work on Azure desktop.
IDA stands for Information Database Analysis
IDA App ImageThis was designed for the Macau Taipa Casino Security System. It has been discontinued and is no longer in service.
This application was designed as a Free alternative to large applications such as Cattle Max.
Famous Farm Boss App ImageThis was designed to manage farm animals, medical, health, tags and much more. It has been discontinued and is no longer in service.
This application was designed for the Gaming Commission Backgrounds department. You can download it from the secure login portal. It is used to track employees, vendors and many other regulatory requirements. Designed to meet and exceed NIGC MICS requirements.
Casino Backgrounds Image Secure LoginThis application was designed to meet the strict regulations of the state (CA), NIGC, Tribal Gaming Commission and federal regulatory requirements for a casino's employees and vendors suitability, backgrounds, investigations and other requirements. This application is currently used in the industry. You can download the full version from the secure portal. No registration is required.
Here are some old links and documents from the old site.
Recovering From Damaged DB Importing From One DB To Another SQL Server Version SMS19 SQL Server Version SQL Server Migration MYSQL FILES Surveillance Application SQL Ver Image Agent Long - Decryption App Image Agent Long - Encryption App Image Gaming Commission DB 64 bit Image GC ONE App Image Java Script Dating Code Sample Old Title 31 Link File Investigation App Old Thank You Link DONATION LINK HTML SAMPLESThese are old links incase you are searching for them. The old site should still be active and usable. You can find a link to the old site on the main page. If it is not available, please contact me to see if some old links are still available. SPECIAL NOTE: In Chrome, sometimes, you will need to right click a link and choose the option to SAVE AS.
Full download is located in the secure login portal. I orginal built this to meet federal FINCEN regulation. FINCEN stands for Financial Crimes Enforcement Network. It falls under the Department of Treasury. But the overlap of enforcement is broad. This includes, FBI, IRS, DOJ, BSA and etc. I originally used FINCEN's schema 2.0 to design this application. The original was designed back around 2007. The current updated version was in 2026. This is a FREE software but download is restricted and must be approved. Although, I originally built this for the Indain casinos, the application can also be used for check cashing places too. Please email your request.
YouTube Video Title 31 Image
Before you read on, I want to correct a misconception: Some have stated that I created this software to challenge Konami's SYNK31. That is not true. My Title 31 or T31/MTL was built 12 plus years before Konami's application. Konami's application is NOT free. My Title 31 application is FREE for all casinos. Full download is located in the secure login portal. I have documented this elsewhere on the website:
https://www.thugon.com/title31software.html.
I built the first version around 2007, called the MTL, at a Tribal casino in California. Konami showcased their version around 2019–2020. That's about 12 years a part. I originally built this software for the casino industry using the FINCEN schema. This project started between 2007 and 2009 and was initially called the MTL application (MTL = Multi Transaction Log). It was originally requested by the General Manager and CFO of a Tribal casino and approved by the Gaming Commission. I left the Gaming Commission and continued to design the application. The goal was to create an application that could:
• Track all transactions from multiple locations and departments.
• Meet and exceed FINCEN's Anti-Money Laundering (AML) requirements.
• Run with minimal hardware and be cost-efficient, since many companies do not have advanced server management resources.
• Run on a standard Windows computer, which most people would have.
Between 2010 and 2025, I upgraded the software to meet NIST standards and additional FINCEN AML requirements. There are many videos on the YouTube site demonstrating how to use and set up the software.
What I didn’t expect was that this application would become a very useful tool for:
• Check cashing locations
• Money order services
• Stores falling under Title 31 regulations and required to register as an MSB (Money Service Business)
The reporting requirements for these businesses are very similar. At the time of writing this article, the software is FREE to use without registration. It is the full version, provided AS IS / WHERE IS without any guarantee or warranty. You can support me if you choose to register it.
A short list of features includes:
• KYC (Know Your Customer)
• Training
• Time clock
• SAR (Suspicious Activity Report)
• CTR (Currency Transaction Report)
• MIL (Monetary Instrument Log)
• People tracking
• Incidents
• Memo
• Knowledge base (KB)
• Evidence control
• Admin and supervisor modes
• Lily voice commands
• Shift management
• Etc.
I built this application to help management Hmong weddings and funerals. Although, it did turn out that you can use it for any type of wedding and funeral managment. It is free. There is a github setup for the download as well. I reccommend the website direct download.
YouTube Video Download ZIP GitHub Download LinkThis is a free software. You can use and distribute it freely. There are many YouTube videos on how to use it. If you run a wedding service or a funeral service, it can help manage your operation for you. I originally built it to help families, manage their weddings and funerals. This is a gift from me to the world. It is a free software. There is a registration part that can be purchased but not required. The application does a lot of things: daily, schedule, purchase order, financial planning, documentations, positions, guest tracking, registry, reports, brochures and etc. Some modules are based on the legal requirements. There is a great section called the knowledge base section also. You can keep a history of all your family's procedure and or traditional process there as well. If you find the database useful please consider donating. Thank you.
DONATION LINKThis app is to track your business invoices, orders and other processes.
Image LinkThis is a free software. You can use it to track all your invoices, orders and payments. There is a code repository or knowledge base that I use to track notes and design codes. It was retired in 2025 but there may be some free versions floating around.
I original built this for the dark web. It was part of the whistle blower and anonymous reporting program for companies but it can also be used for other purposes. It is simple, serverless and text based. You can download and purchase the core files in the secure login portal. I use it on this site to provide tech support, info, sharing, running selenium, running bots and many other things. You can join us in the chat to just chat.
YouTube Video Chat Room Demo Site Disclaimer Secure LoginThis app can be purchased and downloaded in the secure login portal. You can deploy this on the clear web or dark web. All you need is a web hosting server such as Godaddy. There are many YouTube videos that shows how it works. Admin commands: password, clear, find, XSS protection, session cookie and much more. Run bots to post, achrive and etc. Deploy it on the dark web using TOR xampp or appache/php with TOR expert bundle service or to the regular clear web. Mobile or desktop modes. The core idea of this app was to provide a truely free place for chatting, whistle blower, anonymous reporting and many other purposes. The motivation was due to expensive services that others like it may cost. Thus I built it as a free expression, easy and inexpensive tool. You can see the demo with the link above. I used to have an onion site that runs it 24/7 but didn't have time to keep it running. Furthermore, this chat room is serverless, text based. Designed to hold only 1gb of text (prevents flooding and maxing out your hosting space). Searchable using your browser's find command. No dependency on any wordpress, database or other software and services. Fast, dependable and easy to deploy. Password access control if you like. Full download in the secure login portal. If you need help deploying it as a whistle blower or company chat app, let us know and we can help you set it up. Easy to operate.
You can access all (full) blackjack trainings in the secure login portal. I designed this back in the early 2000s for the surveillance department. It was updated in 2026. This training is online. There is a login. You can contact me to sign up for an account. This is available for private parties also. The BJ Play Tracer software is also available for download in this section as well. This is a comprehensive training on blackjack, basic strategy, card counting, shuffle tracking and much more. This is a core training program that I have designed for surveillance, compliance, gaming regulatory agencies, table games departments and private card teams.
YouTube Video Secure Login Demo SiteYou can access all (full) blackjack trainings in the secure login portal. The motivation of this training was to train surveillance agents beginning and advance table games strategies particularly blackjack. The training offers: card counting training, basic strategies, shuffle tracking, betting strategies, money management, card training, advance card counting, group play, casino strategies and much more. There are timed quizes, print outs and more. You will need a login to use the training. I built this for the casinos in California but it was taken to Vegas and other areas over the years. Today, it is still being used in casinos. The original CD/DVD were also used for private player group training also. I believe there are a few YouTube videos show how it works.
This excel app is downloadable in the Blackjack Advance Training portal also. (Last version update in 2024) You can use the full app. If you like to register the app, you can purchase a registration key but it is not needed. This is a powerful tool that is still being used. I originally designed this system in the early 2000s for casino surveillance operations, building it within Excel to meet real-world investigative needs. The tool is used to “run down” a player’s strategy by capturing and analyzing gameplay in detail or also called a "strip sheet". It automatically generates charts, graphs, and analytical outputs that break down player behavior and decision patterns. This allows surveillance teams to clearly understand why a player is winning—and, just as importantly, why a blackjack table may be losing even when no card counting is detected.
YouTube Video Secure LoginThis is purchase only app. You download the full version in the secure login portal. Unlimited use. To register the app, you must purchase a key but it is not required to use the app. Because this software is actively used in casino environments, it is not publicly available for download. You can download this app in the secure login portal. Training materials are available through the YouTube video archive. This system was originally developed during my time as a Surveillance Manager and Director. At the time, available commercial solutions often exceeded $100,000 and did not fully meet our operational needs—particularly in analyzing blackjack play. As a result, I built a solution tailored specifically to real-world surveillance workflows, focusing on flexibility, accuracy, and practical usability.
This is a database application that is used by companies to random pick employees for drug testing. Full download in the secure login. Full version. If you like you can purchase a registraion key or use it as is.
YouTube Video Secure LoginThis database application was designed so that companies that needs a tracking database application to track and run random pick employees for drug testing purposing can meet the company's goals. Stand alone Microsoft Access db. Logging, documentation tracking. Randomize how many employees you would like to pick. Update information. Exclude certain employees. The original design was for Tribal government agencies. Download the full version from the secure login. No registration is required.
These two apps are used to store passwords that are "not sensitive". They obscure passwords only. This is not encryption. You can use these apps to store passwords and or informations. You can download the full version in the secure portal.
YouTube Video Secure LoginFull version download in the secure portal. You can visit the youtube video site to view the how to use video. The Agent Long apps have many different versions. They will obscure text in different formats. There is one utility that was designed to decode all codes based on the "encryption" or "key" used. This app will decode/store all korean hangul and etc. The password keeper db and the agent long apps uses key file verification to run. Without the key files, the apps will not run at all. This is a security feature. There are other versions as well.
This database was created as part of the OSHA/CAL OSHA requirement. I designed this during my OSHA certification many years ago. It allows employees to submit and report issues. It is currently used in many different industries. You can download the full version in the secure login portal. This database was designed to meet OSHA's anonymous and employee safety reporting.
YouTube Video Secure LoginYou can deploy this on any work station/pc or on a network. Admin will be able to generate reports and categorize what issues are being reported the most and concerns from employees. This is an OSHA requirement. This database just simplify the process. You can visit the YouTube site to view the training video. The full version is available for download in the secure login portal. Make sure you place the key file on all machines that you would like to be able to open the database. This is an application security.
This is a small training app that I designed to demonstrate how codings can be used to hack and cheat slot machines. It is located for download in the secure login portal.
YouTube Video Secure LoginPlease view the YouTube video. It offers the training along with the application. You can use this to train regulators and investigations on how easily codings can compromise a slot machine and also how difficult it can be to detect. I used some real historical examples in this training. I also coded cheating codes into the application to simulate how malicious codings can compromise a slot machine. It is a valuable, hands on training for all casino employees. This app is downloadable in the secure login section. You may still be able to find free versions of it on the website also.
This is known as the "Surveillance Random Pick Employees Observation" or in short SR PEO (aka: Senor PEO). This application was designed for the surveillance and investigation department. Although it was built for the casino industry, it can be used for any industry especially highly regulated industries such as fin tech, crypto, banks and etc. Download is available in the secure login portal.
YouTube Video Secure LoginThe application is actually a database system that you can import in your employee list and randomly pick employees for investigations. This approach is very fair and can cover employees that you may not have suspected of wrong doing. It is still being used in different industries so the download is only available in the secure login portal. If you would like to use it, please send a request for approval. It is a valuable tool for all organizations concern about a proactive approach in security and investigation process. SPECIAL NOTE: There is a new exe utility that functions similarly to the SR PEO application. You can find that in the software list.
This is an article I wrote about the AI limitations. Many people told me that they had a terrible time locating the article so I placed another link here.
Web LinkThis article is about the limitations of AI and it's dependency. It is written in a scientific format.
AI THAT TESTS EVERYTHING ARTICLE. I wrote this AI article as a research and conceptual article for a white paper design. You can read it with the link below. Unfortunately, I was told that the article was very hard to find on the website site so I listed it here as well.
Web LinkThis article is a research paper that I wrote. It is a a conceptual white paper. As a software programmer, I detailed my experience and the benefits of an AI that can adjust to environmental changes and code adaptations that can revolutionize coding and the world. It is a project that I have been working on for many years. I hope that it will enlighthen you.
It is important that before you use our chat room, you should read our disclaimer.
Web LinkThis is the the chatroom disclaimer. It can and will be changed at anytime without notification. All users agrees to this disclaimer prior to using our chat room. Keep in mind that the chat room can be locked, cleared and etc at any time without notification.
This is the link to the github site.
Web LinkYou can find some softwares that were released on the github site here. Use the link above to redirect to the githup site.
This is the SHA 1 hashing app that goes with the GC ONE APP.
Secure LoginThis app requires a key file. Full download in the secure login portal. This is a complimentary app that goes with the GC ONE app and or the Title 31 application. V3.
This is the SHA 3 hashing app that goes with the GC ONE app and/or Title 31 app.
Secure LoginFull download in the secure login portalThis app requires a key file. You cannot download it without approval. This is a complimentary app that goes with the GC ONE app and or the Title 31 application. V3. This application will also require python. Currently, Windows 11 does not have the sha3 library.
This application was designed to extract passwords of an access db.
Secure LoginThis application was used to extract passwords tables from an access db. It is used in the GC ONE and Title 31 applications in the event of a system lockout only. The last test of this application was in early 2025. Most of the access db password tables are encrypted now. Passwords are not recoverable. This application is not allowed to be downloaded without prior approval.
These applications were built for the GC ONE and Title 31 applications. Full downloads in the secure login portal. Included in the packages only.
Secure LoginThese were built to randomly rotate a new login pin number for the GC ONE and Title 31 applications. These apps also requires key pins to be used. The calculation of the daily PINs are documented inside of each application in the developer's section. These applications are packaged and available in the secure login portal.
This application was designed for the GC ONE application and the Title 31 app. Packaged with the apps.
Secure LoginThis is a supplemental application to the GC ONE app. It calculates and generates projections to improve employee wellness. It performs the projection and calculations based on the current status of the employee wellness data. It is an excellent tool that is used in the GC ONE wellness tracking section. This is normally only available to supervisors and admins only. This application does all the math and calculation so that the user does not have to manually calculate the projections, improvement rates or goals. You can search the YouTube video archive for training videos. This is key file required. Full download in the secure login portal and packaged with GC ONE app.
This application was designed for the GC ONE application and the Title 31 app.
Secure LoginThis was created for the GC ONE application. It is used to generate unique passwords for locking down applications and logins. This application was last update in the middle of 2025. There are other applicatons that can replace this application although, it is still used in the GC ONE app. This is key file required. There are two version, secured pim required and free version. Full download in the secure login portal.
RECOMMENDED VERSION PYTHON-3.13.0-amd64.exe. This is the python version designed for the GC ONE application and the Title 31 app.
Secure LoginRECOMMENDED VERSION PYTHON-3.13.0-amd64.exe. Version python version 3.11.2 can/may be used if you can't find 3.13.0. You can download python from their official site. https://www.python.org. Currently, in 2026, this is the correct python version for the GC ONE and Title 31. If you choose to use/run the Lily voice command assistance in the GC ONE and Title 31 apps, you must make sure that you are using the correct version of python. Do not use the latest python version because some wheels will not work on the latest python version. I've included the full install codes here to make the installation as easy as possible so that you will have the correct versions (INSTALL THE CORRECT PYTHON VERSION FIRST BEFORE YOU RUN THE CODES BELOW). Full download in the secure login portal.
pip install audioop-lts==0.2.1 certifi==2025.4.26 cffi==1.17.1 charset-normalizer==3.4.2 colorama==0.4.6 comtypes==1.4.11 idna==3.10 PyAudio==0.2.14 pycparser==2.22 pyodbc==5.2.0 pypiwin32==223 pyttsx3==2.98 pywin32==310 requests==2.32.3 sounddevice==0.5.2 SpeechRecognition==3.14.3 srt==3.5.3 standard-aifc==3.13.0 standard-chunk==3.13.0 tqdm==4.67.1 typing_extensions==4.13.2 urllib3==2.4.0 vosk==0.3.45 websockets==15.0.1
This training is intended for educational and professional development purposes only. This training provides a first-hand look from an attacker’s perspective, demonstrating how usernames, passwords, and verification codes can be captured and used to gain unauthorized access to accounts. It show how attackers can exploit the weakest link in a cyber security infrastructure to gain access to an account.
YouTube Video Secure LoginThe training site is available in the secure login portal, where employees can interact with and observe how attackers capture credentials and authentication codes in real-world scenarios. This hands-on experience reinforces awareness and strengthens defensive practices. Let me know if the site is down. It is normal for the test site to show blank because my hosting provider scans files often and will automatically remove suspicious files. I will reload the test site.
This is the secure login training portal. An annual subscription is needed. You can purchase this through the BUY NOW button. Please watch the YouTube video so that you will get an idea of what is available in the portal. ALL SALES ARE FINAL. Thank you for supporting us.
YouTube Video Secure LoginOnce you purchase an subscription, you will receive a login by email. Training made for gaming commission, regulators, surveillance, private party and other agencies. Advance blackjack, card counting, BJ Tracer, basic strategy, shuffle tracking, casino training, downloads and other trainings. New accounts may take up to 24 hrs to activate. Important: subscription means that you subscribe to access information only. Independent software purchase such as registration keys and software keys are different and are not included in subscription fees. Some applications are purchase only but free to use as is. Please remember everything is AS IS and WHERE IS. All users' assumes all risks, liabilities and releases the developer of all liabilities. Thank you for supporting us.
This is a fun javascript web that I created for fun. Feel free to send it to people. Video shows the old version. The new version has music. If you get a date feel free to donate. LOL
Facebook Video Web LinkThis is a just a fun web development. From time to time, I do design fun things too. The video shows the old version. Over time, I had changed it and added new things to it. You can sent the link to anyone to ask them to a date. Java script will help you. They won't say NO. Literally. Very fun, with music too. Link above. I hope you are get that date! If you get a date with this web app, consider donating.
DONATION LINKThis is a Chrome and Edge extension/addon. It is free. This is a powerful app. It gives you insights on website that are very beneficial. Delete cookies and trackers from websites, find out what country that website resides in and more. You can download it from the links below.
YouTube Video Chrome Link Edge LinkThis extension is very power. You can watch the YouTube video. COOKIE BOSS DETECTOR - DANGEROUS WEBSITE DETECTOR is a Chrome extension that helps users identify websites hosted in certain countries and detect tracking or cookie activity. It provides an at-a-glance warning when you visit a website from a country you consider risky, giving you more control over your online safety. You also have the ability to delete the cookies from each tab. This extension does NOT track, send, or sell any of your personal information; all data is processed and stored locally on your computer. Key Features: Country Detection: Automatically determines the country of the website you are visiting using its IP address. Dangerous Country Warnings: Highlight websites from countries you mark as dangerous. A large red “!” appears in the popup, and a badge is displayed on the Chrome toolbar for instant alerts. Cookies & Tracking Detection: Lists all cookies set by the website, categorizing them as Tracking, Analytics, Essential, or Unknown, and highlights potential tracking cookies in red. Export Reports: Export a full report of the current website, including IP, country, and cookie/tracking information, to a .txt file for review or record-keeping. Cookies & Tracking Removal: Allows you to remove those cookies and tracking of each website or tab. Custom Dangerous Country List: Maintain your own list of countries to flag, easily editable in the extension popup or options page. Searchable Country List: Quickly find countries to mark as dangerous. User-Friendly Popup: Displays IP, country, cookie status, cookie list, cookie removal, export list info and a clear warning icon. Red “!” icons blink for dangerous sites for better visibility. If you fine the app useful please consider donating. Thank you.
DONATION LINKThis is a Chrome and Edge extension/addon. It is free. This is a powerful app. Similar to Edge's vertical menu. This app can do more. It allow your to create a vertical tabs menu, save, export, import and much more. This makes your tabs more productive.
YouTube Video Chrome Link Edge LinkThis extension is very power. You can watch the YouTube video. Key Features: Vertical Tab List with Active Highlight – Easily see all open tabs and quickly access the active tab. ORDER Tabs Alphabetically – Organize your tabs from A-Z, including numeric site names. OPEN Tabs - Open tabs by clicking the vertical tab buttons to bring the tab forward in the browser. CLOSE Tabs - Close the tab from the vertical list. EXPORT Tabs – Save all your current tabs to a human-readable .txt file with site names, URLs, tab count, and timestamp. RESTORE TABS – Import a previously exported tab file to reopen all sites in your browser automatically. Top Utility Buttons – Access the Privacy Policy or www.thugon.com website directly from the extension. Professional, Animated Interface – Smooth animations and modern design for easy navigation even with dozens of tabs. If you find the app useful please consider donating. Thank you.
DONATION LINKThis is a Chrome and Edge extension/addon. It is free. This is a very useful app with multiple purposes. This is used by investigators and researchers too. You can use this to grab prices, list them, print, save and so much more. It's a great tool if you buy from places like craigslist, amazon, zillow, homes facebook market place and etc. Compare prices, links clickable and much more. Great app to make a buy list or if you are price flipper.
YouTube Video YouTube Video YouTube Video YouTube Video Chrome Link Edge LinkThis extension is very power. You can watch the YouTube videos. Ever want to shop smarter, research more efficiently, or make better purchasing decisions? Compare It helps you do just that. This app lets you take snapshots of web pages and browser tabs, capture visible prices, and add items to your COMPARE IT! tab. Some sites may block price capture, but you can still see prices on the screen. Place a movable "Add to Compare" button on your screen. Add snapshots and links to your COMPARE IT! tab. Organize your items by drag-and-drop, or sort by price (lowest to highest or highest to lowest). Zoom in and out to view your list comfortably. Export your organized list to PDF for sharing or record-keeping. Clear the list and start over, or restore your list on your next browser session. For shoppers: Build shopping lists, compare items from multiple sites, and see everything in one tab to save money. For researchers: Collect and organize snapshots with links, export for reports, and track your sources efficiently. For investigators or presenters: Capture snapshots, organize them visually, and export for reference or reporting. If you find the app useful please consider donating. Thank you.
DONATION LINKParty time! This is a Chrome and Edge extension/addon. It is free. This is a super fun app. It turns the YouTube videos site into a party. It adds lights, bars and circles. It simply makes the videos look cooler and you can go full video mode for a party atmosphere. Youtube music site too!
YouTube Video YouTube Video YouTube Video Chrome Link Edge LinkThis extension is very fun app. You can watch the YouTube videos. YouTube Party Lights is a fun, lightweight Edge extension that transforms YouTube into a vibrant, dark-mode party experience. It is free. It automatically switches YouTube to dark mode and adds animated sparkles and floating lights across the screen, making every video session more festive. The extension is designed to enhance visuals without impacting performance or privacy. Built for music videos on the YouTube websites. YouTube music and video sites. Key Features: Automatically enables dark mode on YouTube. Interactive floating party lights for a fun viewing experience. Lightweight with minimal impact on performance. Privacy-friendly: does not collect personal data or modify website content. Turn on or off. This extension is purely cosmetic and enhances YouTube’s appearance for entertainment purposes. If you find the app useful please consider donating. Thank you.
DONATION LINKThis is a Chrome and Edge extension/addon. It is free. Power app. Displays current browser proxy mode, your public IP, PAC script, and warns if traffic is routed through a proxy. I use it to monitor if my ip suddenly changes.
YouTube Video Chrome Link Edge LinkI never have to try and figure out what my public ip is anymore. It's right there. Proxy Detector is a lightweight extension created to quickly determine how the browser is routing network traffic and what public IP address websites see. The extension helps answer questions like: What is my IP address? Is the browser using a proxy? Great for vpn users. Did my public IP change? Is a PAC (Proxy Auto-Configuration) script active? Did enabling/disabling a VPN affect my connection? Features: Displays the current proxy mode (direct, system, auto_detect, pac_script, fixed_servers). Shows proxy host and port if manually configured. Displays PAC script usage. Shows public IP address retrieved from https://api.ipify.org. Detects network/routing changes using a local baseline IP. Warns when traffic appears to be routed through a proxy. If you find the app useful please consider donating. Thank you.
DONATION LINKThis is a Chrome and Edge extension/addon. It is free. This app is a health and safe app that I designed for companies. It is used to help computer users time their screen time and act as a reminder to take breaks.
YouTube Video Chrome Link Edge LinkScreen Time Alert is a browser extension designed to help users monitor time spent on active browser tabs and optionally display visual on-screen alerts at user-defined intervals. When you set an alert from the menu, a robot will appear and warn you with a message based on the time interval that you had set. More smoke will appear as well. It is a fun app that is great for screen time monitoring. All rights reserved www.thugon.com and Seng Thao. This extension operates entirely within the user’s browser environment. If you find the app useful please consider donating. Thank you.
DONATION LINKThis is an Edge addon. It is free. This app allows you to turn just about everything that have an url into a qr code. It's a very powerful app. Save the qr code. Export it. Scan it with your phone. Phone number, emails, sms and more. Sorry, I couldn't get it to pass Chrome's approval process. Only on Microsoft Edge. If you really want it on chrome, there is full manual download of it in the secure login portal. You can manually add the extension to your Chrome browser. I have it on mine. Extremely useful. A great tool for any power user.
YouTube Video YouTube Video Edge LinkOne the reason I created this app was because when I'm on my pc and need to call a business or email someone, I have to manually dial the number. Thus I created this app so I can just turn the phone number, email, sms to a qr code and scan it with my phone to call. Generate QR codes for any link instantly. Right-click on a URL or web link to create a QR code locally in your browser — safe, fast, and easy to use. This extension makes Edge extremely powerful. Smart phones, tablets, cameras and smart systems can scan the QR code and open the URL/Links from just about any web sites. It bridges desktop PC and Laptops to smart phones, tablets, cameras and everything else with a smart camera. I designed the URL to QR Code Magic Button app for the Edge browser. Many times, I am searching the web on my desktop and need more features then what Edge have to offer. I see a phone number that I like to call, email link that I like to email to but I'm not on my regular PC and videos that I like to share or just links. I could manually type it in to my phone but there should a faster and better way. So I created this app so that I can quickly pull up the QR code and scan it with my phone to make the call, email, sms, save video for later, save links for later, download files or etc. It is extremely usefully. Edge has it's internal QR code generator but it does not do that for all links. That's where the URL to QR Code Magic Button can be super handy. Turn the Magic Button ON. Right click on any links. Generate a QR CODE on the screen. Scan with your device. Save It. Click on the SAVE AS IMAGE or SAVE AS IMAGE AND LINK (PDF) buttons to save the QR code to your downloads folder. No more typing phone numbers, typing emails, taking pictures of links and then trying to transfer it to my phone from different pcs. Turn the MAGIC BUTTON on and generate the QR codes, hit go and done. When you like to restore your right click or don't want to use it anymore, just click the TURN OFF button. I hope it helps you as it has been super useful for me to have in my tool box. If you find the app useful please consider donating. Thank you.
DONATION LINKIt is free. Sorry I couldn't get it to pass Chrome's approval. It's only available for Microsoft Edge and Mozilla Firefox. Feed The Bugs is a fun visual experience that lets animated bugs crawl across any webpage and slowly “eat” it away. With one click, colorful bugs appear and move across the page, gradually turning the content black. When the process is complete, the bugs magically transform and float away in a whimsical animation. There is a suprise at the end.
YouTube Video Firefox Link Edge LinkI use this as an intermission app (time killer) while's I'm downloading an update or download. Instead of just staring at the screen, I run this app for fun. With one click, colorful bugs appear and move across the page, gradually turning the content black. When the process is complete, the bugs magically transform and float away in a whimsical animation. Features: One-click activation on any webpage. Crawling bugs animation. Click anywhere on the screen to stop the effect instantly. No data collection or tracking. Runs only when you activate it. Feed The Bugs is meant purely for entertainment and visual fun — a playful way to interact with your browser without affecting your browsing data. It can also be used as a short screen-time intermission while downloading files or updating your PC. If you find the app useful please consider donating. Thank you.
DONATION LINKThis training was made free in 2026. You will learn blackjack basic strategy, shuffle tracking and betting strategies. I designed this for the casino.
Web LinkI designed this for the casino industry many years ago. You will learn what I have taught the casinos for decades. As a former casino surveillance manager/director, I designed these trainings to teach the casino's employees. Basic strategy, shuffle tracking and betting strategies are the basic foundations of a strong blackjack player. Shuffle tracking is extremely effective. It is sometimes considered more effective than card counting. This training does not include the card counting training modules. You can locate all the card counting trainings in the secure portal. If you find the trainings helpful, please consider donating to the site.
DONATION LINK