Five admit helping North Korea evade sanctions through IT worker schemes
Google to flag Android apps with excessive battery use on the Play Store
newsletter Round 550 by Pierluigi Paganini – INTERNATIONAL EDITION
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 71
Anthropic: China-backed hackers launch first large-scale autonomous AI cyberattack
Board Level Security Metrics
5xx Error | Cloudflare
Microsoft: Windows 10 KB5068781 ESU update may fail with 0x800f0922 errors
Decades-old ‘Finger’ protocol abused in ClickFix malware attacks
DoorDash hit by data breach after an employee falls for social engineering scam – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New ‘IndonesianFoods’ spammer floods npm with 150,000 packages
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Jaguar Land Rover cyberattack cost the company over $220 million
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies
U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog
API Supply Chain Attacks Put Millions of Airline Users at Risk
95% of Data Breaches Tied to Human Error in 2024
Logitech confirms data breach after Clop extortion attack
Five plead guilty to helping North Koreans infiltrate US firms
Anthropic claims of Claude AI-automated cyberattacks met with doubt
Critical CVE-2025-59367 flaw lets hackers access ASUS DSL routers remotely
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
Checkout.com snubs hackers after data breach, to donate ransom instead
Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks
Chinese State Hackers Jailbroke Claude AI Code for Automated Breaches – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CISA Warns of Active Attacks on Cisco ASA and Firepower Flaws – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
US announces new strike force targeting Chinese crypto scammers
Millions of sites at risk from Imunify360 critical flaw exploit
Iranian Hackers Launch 'SpearSpecter' Spy Operation on Defense & Government Targets
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
Chinese Hackers Automate Cyber-Attacks With AI-Powered Claude Code
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Critical FortiWeb flaw under attack, allowing complete compromise
A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
Google backpedals on new Android developer registration rules
Akira Ransomware Haul Surpasses $244M in Illicit Proceeds
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
ASUS warns of critical auth bypass flaw in DSL series routers
Google Files Lawsuit to Dismantle 'Lighthouse' Smishing Kit
Washington Post notifies 10,000 individuals affected in Oracle-linked data theft
BSI issues guidelines to counter evasion attacks targeting LLMs
Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
What happens when employees take control of AI
New infosec products of the week: November 14, 2025
Los Alamos researchers warn AI may upend national security
Protecting mobile privacy in real time with predictive adversarial defense
Trulioo helps enterprises accelerate business onboarding
Why your security strategy is failing before it even starts
DoorDash hit by new data breach in October exposing user information
Fortinet FortiWeb flaw with public PoC exploited to create admin users
Medium: Read and write stories.
Introduction to SIEM for Developers and Technical Architects | by Mayuresh K | Oct, 2025 | Medium
Quantifying Swiss Cheese: Bayesian Inference and Exploit Likelihood | Medium
The Developer's Laptop. Why Your Machine Has Become Ground Zero… | by Tim O'Brien | Nov, 2025 | Medium
Protocol Design 101: The History of Variable Length Headers | by Tom Herbert | Oct, 2025 | Medium
Behind the firewall: Engineering APIs for compliance and trust | by Juhi Singh | Data Science at Microsoft | Nov, 2025 | Medium
Behind the padlock: the hidden risks of built-in password managers | by Enrique Dans | Enrique Dans | Oct, 2025 | Medium
Explore topics
The Future of End-to-End Encryption | by MongoDB | MongoDB | Oct, 2025 | Medium
Medium
Romanian Inmate Hacks Prison Network, Alters Sentences and Inmate Accounts - Offbeat Daily
Loto cutaway lock - Google Photos
Win a Free Certified Cloud Security Professional (CCSP) Course
PingMyNetwork | First Gamified Certification Training Platform
Ubuntu 25.10's Rusty sudo holes quickly welded shut • The Register
The Industrialization of Deception: "Deepfake-as-a-Service" is Here, and It's Targeting Your Business
Public Certificate Transparency Monitor | Fivesec SSL/TLS Certificate Tracking
SCANNING AND ENUMERATION WITH NMAP REPORT-combined (1).pdf - Google Drive
AWS Metadata Service Exploitation: Exposing IMDSv1 and Steal | InstaTunnel Blog
NPMScan - Malicious NPM Package Detection & Security Scanner
NPMScan - Malicious NPM Package Detection & Security Scanner
Will agents hack everything? | Promptfoo
CodeRED vendor limits service during security review
XWorm Malware: Deep Dive into a Retro Threat with Modern Consequences
Troy Hunt: Passkeys for Normal People
AT&T Data Breach Settlement Deadline Nears for Claims Up to $7,500 - EsstN
FaceSeek — Face Lookup, Face Search & Facial Recognition Search Online
Second Amendment in the spotlight - SCOTUSblog
- YouTube
CTO at NCSC Summary: week ending November 16th
ZIP Slip Vulnerability: Exploiting Archive Extraction | InstaTunnel Blog
A Love Letter to Hacking
- YouTube
Reimagining cybersecurity in the era of AI and quantum | MIT Technology Review
Crims flood npm with 150K+ junk packages to farm TEA tokens • The Register
TOAD Attacks via Entra Guest Invites: Taggart Tech
Attention Required! | Cloudflare
China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work  | CyberScoop
GitHub - fivesecde/fivesec-opensearch-siem-starter: This repository provides a custom-built and optimized Nginx setup, featuring a Dockerfile to compile Nginx from source along with advanced configurations for maximum security and performance. Additionall
GitHub - RootUp/git-fsmonitor: This is a proof-of-work for abusing "fsmonitor" against IDE.
- YouTube
- YouTube
How we avoided side-channels in our new post-quantum Go cryptography libraries -The Trail of Bits Blog
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb (??) Auth. Bypass)
The most advanced ClickFix yet?
Chinese group carries out the first large-scale AI cyberattack ‘without substantial human intervention’ | Technology | EL PAÍS English
Memory Corruption in WebAssembly: Native Exploits Inside You | InstaTunnel Blog
Protecting our Merchants: Standing up to Extortion
Ransomware.live - Victim: ENTRUST.COM
Attention Required! | Cloudflare
Google Files Lawsuit to Dismantle ‘Lighthouse’ Phishing Kit Behind Global Smishing Attacks
Chinese spies used Claude to break into critical orgs • The Register
GitHub - ajutamangdev/hatiyar: Hatiyar is a security toolkit for penetration testing.
- YouTube
RedTail Cryptominer: First Evidence of Docker API Targeting | AI deception platform
SocVel Cyber Quiz
HelixGuard — Open Source Security Research
The Anatomy of Modern Credential Theft: How Even Simple Phishing Attacks Exploit Our Digital Vulnerabilities
Washington mall billboard hacked with Charlie Kirk memes
- YouTube
China accuses Washington of stealing $13 billion worth of Bitcoin in alleged hack — 127,272 tokens seized from Prince Group after owner Chen Zhi was indicted for wire fraud and money laundering, U.S. alleges | Tom's Hardware
Comprehensive security vulnerability analysis of an Automated Insulin Delivery (AID) System using OWASP Top 10 framework. Educational documentation for penetration testing and secure software development.
security-cicd-demo
DevSecOps in a Box (dsoinabox) - an application security tool
Research project: Building a CTF benchmark to assess LLM security vulnerabilities and prompt injection attacks
Website hacked-by-gundu - Deployed to Vercel
Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable
Show common security flaws with JWT (Token Relay Attack, Signature Tampering)
Bedusec | Securing Digital Frontiers Offensive security testing, social engineering assessments, and vulnerability discovery.
game strategi deck-building hack simulation bertema dunia cyberpunk 2087. Kamu berperan sebagai Kai, mantan anggota UNDERDOGS yang kembali menantang dominasi AI raksasa bernama VAULT—sebuah sistem yang kini mengendalikan dunia dengan algoritma dingin dan
security_cockroach
Proof of Concept for Steve
😃😋Maximisez vos interactions sur Instagram avec Insta-follow 😁😗 totalement 💯 free gratuit
Energy & Climate Hack
Penetration testing toolkit for detecting end-of-life frameworks and libraries
Startup Infra Accelerator is a demo project that showcases a production-ready CI/CD pipeline for modern startups, including a 3-tier app, automated testing, security scans, and cloud deployment via infrastructure-as-code. It’s built to be a reusable templ
Enhance the security of your KeyAuth ImGui example by implementing server-side controls, packet encryption, and single-use packets, offering robust protection against unauthorized access.
security
FastAPI + Next.js AWS ECS Deployment POC: This is a Proof of Concept (POC) project demonstrating how to deploy a FastAPI backend and Next.js frontend to AWS ECS Fargate using Terraform.
# Lango - Multilingual Healthcare AI Assistant [![Hacking and consu
AsyncRAT stands as a Remote Access Tool (RAT) conceived for the purpose of distant supervision and command over remote computers through an encrypted connection ensuring security.
sundai hack Nov 16
Cyber-Security-Ethical-Hacking-Internship-Task-5
FiveM hacks provide tools like god mode, no recoil, and speedhack for players. Mod menus and cheat scripts are widely used in GTA V, offering customizable and undetected gameplay experiences.
advanced_features_and_security
Proof of Concept for AI Ad Gateway
eCommerceAppliction build in Microservices with Java, Spring Boot, Spring Cloud, Docker, Kubernetes, Okta, Spring Security, CI/CD, GCP
A next-generation WordPress security framework providing deep hardening, malware detection, integrity monitoring, and guided server-level remediation.
A curated collection of cybersecurity projects, labs, and tools developed during my studies at Flatiron School and beyond. This repository showcases hands-on work in threat detection, vulnerability assessment, ethical hacking, and secure system design.
security
A proof of concept for a map where citizens can safely navigate high-crime neighbourhoods through the safest possible route, by fetching real time crime statistics.
A modern and customizable password generator built with React. It allows users to instantly create secure passwords by adjusting length, enabling numbers, special characters, and more. Designed with a clean UI, fast performance, and a focus on security.
SHS Expo Proof-of-Concept
Proof of concept for LP hedging strategy
Proof Of Concept of MAF using ASP.NET
A proof of concept for a map where citizens can safely navigate high-crime neighbourhoods through the safest possible route, by fetching real time crime statistics.
Security-audit-app
Vibe coding for the sprint hack ND
HACK // UTEC
A hacked around versio of AYAB-desktop t send single lines using a web server and curl
Ultimate WiFi & Bluetooth Security Testing Framework
Small proof of concept application for a Workspace component that can house child components which use a shared workspace state. Clicking Ping will disable Ping and enable Pong, clicking Pong will disable Pong and enable Ping. The Workspace can be copied
A collection of reconnaissance and security research tools for penetration testing and bug bounty hunting
Two-Factor Authentication (2FA) extension for FOSSBilling - Enhanced security with TOTP
This repository contains the Proof of Concept (PoC) for the VoidFrameX Kernel, an Object-Capability Multikernel with an asynchronous design, targeting the x86 architecture.
A LAN with basic Security features and IT Services
Arborist is an rshell manager for the game Grey Hack allowing mass deployment and management of rshell connections.
This is a Simple Blockchain Implementation in C++ with wallet functionality, cryptographic security, and an interactive command-line interface. It demonstrates core blockchain concepts including proof-of-work mining, digital signatures, and transaction va
User-mode-security-tool
Secure Post & Comment Management System Using Spring Boot Security
Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable
Security2
Proof of concept of an embedding-based boardgame recommender.
Proof of concept web application for adding out of office messages to Canvas LMS
Hands-on walkthroughs, notes, and writeups from my TryHackMe learning journey, covering offensive security, blue teaming, networking, malware, SOC skills, and practical cybersecurity labs.
A To-Do List application with a fully automated CI/CD pipeline built using Jenkins. This project demonstrates source code management with GitHub, automated builds, testing, linting, security scans, and deployment to a web server. Designed for learning Dev
Nuevo portfolio web en React + Vite con TailwindCSS, completamente rediseñado y más profesional que el anterior. Estética hacker con colores neón, tipografía monoespaciada y animaciones interactivas. Arquitectura modular y UX mejorada para un portfolio mo
security-shield
A room security system project written in python to program a PIR sensor via a Raspberry Pi 4 B's GPIO pins for motion detection, snap a photo of the intruder using a USB camera module, and sending an email with the photo attached using Python's smtp libr
A research project investigating secure and privacy-conscious processing of real-time metadata from network cameras. Focuses on designing protected data flows, reliable communication layers, and interactive visualization tools that enable analysis across
Security-
Privilege Escalation Security Audit Tool for LINUX
Connect TradingView alerts to automated trading bots, APIs, and external services.
Springboot-Security-JWToken
A comprehensive web-based campus security management system designed to digitize and streamline security operations for educational institutions.
NetStrike - Professional Network Security Testing Framework for Educational Use
Git visualisation application (Proof-of-concept)
Submission for the Hack@UCI Tech Team
Demo app that includes mobile demo app , pipelines, security scan and testing
kyxel-security-frontend
Face recognition proof-of-concept with a FastAPI backend (InsightFace + SQLite) and an Expo React Native app that lets you register and authenticate users by sending selfies to the API.
Shared Claude Code hooks for Revity - Security guardrails, workflow automation, and compliance controls to standardize AI-assisted development across the organization
CloudGuard-Anomaly is an agentic AI–powered framework for analyzing cloud security posture, detecting misconfigurations, and explaining configuration drift across multi-cloud environments
Web Application Vulnerability Scanner — MVP A lightweight, beginner-friendly vulnerability scanner for educational and authorized testing. This project is a minimal viable product (MVP) of a custom web vulnerability scanner built in Python. It detects c
Corrupt-Court-of-Pasay.-Security-guards-locked-the-door-and-don-t-let-me-go-home
Proof of Concept Replication of the Incident
-lia-security-platform
Comprehensive Web Application Security Assessment & Implementation Project
Terdiri dari 8 kolom : Location, Profit, Income, Disp_Income, Birth_Rate, Soc_Security, CV_Death, Pct65
A portable toolkit practitioners can run locally or in CI to assess AI systems’ security, governance, and operational readiness
Python desktop app for DFA/NFA simulation with GUI and full security stack: bcrypt password hashing, progressive lockout (1 min/1 h/24 h), forced password reset, TOTP-based 2FA, email alerts, RBAC roles, JSON-based secure storage, and full activity loggin
Cybersecurity Practice Repository – Daily challenges, research notes, and practical project work in ethical hacking and defense.
🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡
API Security Testing & GraphQL Vulnerability Framework
Task 1 - Nmap scanning results
🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡
GCC 15.1 COBOL + musl proof-of-concept tests
This project is designed as a fast, secure, and accessible static website, with the main purpose of enabling users to analyze password security and generate strong passwords. The tool is built following the Performance First (maximum speed) policy and all
Personal cybersecurity portfolio showcasing projects in network security, digital forensics, Nmap, Wireshark, Linux, and Python.
An elite communication fortress for the digital underground. Where hackers, operatives, and the dark web army converge in encrypted shadow channels. Built with cutting-edge tech to ensure absolute anonymity and zero-trace operations.
🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡
ADAPT is an open, modular framework for building agentic AI–driven root-cause analysis (RCA) and proactive troubleshooting workflows in modern cloud, SaaS, and security environments
Suraksha is a women’s safety web application featuring one-tap SOS alerts, real-time GPS tracking, incident reporting, and emergency contact notifications to enhance personal security.
Hack Camp 2025 project
A simple security vulnerability & incident tracker web app built with Flask and SQLite.
🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡
Proof of Concept for the paper "Triangulated Relativistic Quantum Computation: A Curvature--Modulated Unification of Quantum and Relativistic Computing"
Proof of concept for new dronecan peripherals architecture
Our Apex Legends hacks and cheats stand out as some of the most accessible and dependable options in the online realm. Sign up on our platform, ascend to VIP membership, and acquire access to our suite of hacks. With our instant delivery system
Network penetration testing project using metasploitable 2 as a target demonstrating security assessment of various services (FTP, SMB, JAVA,VNC, IRC, ingreslock). Includes Nessus vulnerability scans, exploitation evidence, and comprehensive security repo
🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡
A Learning Management System WordPress plugin with security best practices
jwt-security-auth-role-refresh
hws course projects
UAC bypass, Elevate, Persistence methods
A collection of cheatsheets for networking, personal security, and other topics
A proof of concept demonstrating Claude Sonnet 4.5's ability to execute Standard Operating Procedures (SOPs) using simple agents with tool calling, without complex orchestration frameworks like LangGraph.
Cybersecurity + Data Analytics Portfolio — SOC labs, cloud security projects, threat detection demos, SQL workflows, optimization, and machine learning analysis.
Local password cracker for a game called "grey hack"
A standalone, AI-powered security platform with a custom 'Matrix' GUI. Features a pure NumPy neural network for live training and anomaly detection. Includes real-time system monitoring, 3D visualizations, and threat heatmaps. A self-contained AI 'foundry
Proof-of-concept Lua script injector for Where Winds Meet using a dinput8 proxy DLL and Frida Gadget to hook the game’s internal lua_load / lua_pcall and open debug / GM features.
Hacker Toolbox MSI 1.0
CS2 hacks offer advanced options such as glow, third-person view, and fast crouch for competitive gaming. Permanent and temporary spoofers ensure undetected performance alongside source code integration.
Implementing the Proof of Concept for a (10, 10, 1) Network (Hard Label setting implementation)
Network-Security-Research
Proof of concept of an embedding-based boardgame recommender.
EHICAL_HACKING_SIXTH_ASSIGNMENT
A minimal, operator-friendly way to set a Raspberry Pi’s Ethernet settings directly from Bitfocus Companion on a StreamDeck XL—no external apps, no HID hacking.
HealthPredict is a proof-of-concept project demonstrating the application of Supervised Machine Learning to address the United Nations Sustainable Development Goal (SDG) 3: Good Health and Well-being, specifically Target 3.4 – Non-Communicable Diseases (N
A Terraform-based Infrastructure-as-Code repository containing reusable modules and real-world examples for provisioning AWS resources such as VPCs, EC2 instances, security groups, load balancers, IAM roles, and S3 buckets. Ideal for DevOps automation, cl
MCP server powering Quality Clouds LivecheckAI. Real-time code validation for AI-generated content with governance, security, and platform-aware rules .
Elliot's dream honeypot that he would have loved to use while hacking E-corp
Travel Management System deployed on AWS EC2 using PHP, MySQL, HTML, CSS, and JavaScript. Features include user authentication, tour listings, bookings, and an admin dashboard. Hosted on Ubuntu with Apache and secured via SSH and AWS Security Groups for r
Great Agent Hack 2025
Shared repo for locus hack
A collection of my cybersecurity projects, labs, tools, and hands-on practice.
security_system
Repo for Hack NYU
Proof-of-Concept .NET bot implementation for Delta.Chat
A proof-of-concept bot for unconventional memecoin marketing.
Next-generation social platform combining chat, feed, video, mini-apps, marketplace and AI features — built for speed, security and scalability.
A repository where I store all of the scripts that I made for the game Grey Hack.
Hybrid Search Proof of Concept - Problem-oriented search system for regulatory documents
What the chess hack
security_dependencies_CI
Built a Splunk-based security analytics dashboard to detect and analyze SSH activity (inbound attempts, failed logins, lateral movement, protocol mismatches, and possible C2 beaconing) from simulated log data (secure_logs). The project involved field extr
Hello World Hack Project
Aegis AI Security Analysis for CSOs. Built at Junction Hack Finland
securitytest
bookmark-manager-security-assesment
IT-Career-Network-Automation-Security-Cloud
Matrix Hacker OS for ESP32-S3 TDongle - WiFi analysis, network tools, and cyberpunk interface
This is the chess hacks
For Cutie Hack 2025, I decided to build a Student Spending Budget Analyzer
Open source HIDS tailored for Microsoft Active Directory and Workstations
SEGTEC-SECURITY
Security-Audit-with-OpenVAS
REST API service with multi-layered security, role-based access control, MFA authentication, and audit logging.
Proof-of-Concept: Unrecoverable Disk Wipe (Educational Only)
Our hack for Technica 2025.
Chess Hacks repo
Hi, am Anas Fred a full-stack engineer experienced in React, Next.js, Node.js, and Web3 integrations. I build high-performance applications with a focus on reliability, security, and seamless user experience.
Custom AWS VPC architecture with public subnet, Internet Gateway, route table, security group, and EC2 instance. Includes network diagram built using draw.io for understanding basic AWS networking.
PredixAI is a proof-of-concept Industrial IoT platform designed to disrupt the traditional equipment maintenance market, dominated by incumbents like L&T.
Programs to make life easier.
A proof-of-concept project to demonstrate how to create and use an agent using MCP.
All the codes for 24CYS213. Authored by Sivaa S Hari Charan
Hands-on cybersecurity tasks completed during my Oasis Infobyte internship, covering network scanning, SQL injection, Wireshark analysis, and vulnerability assessment.
A comprehensive case study analysing how the core architectural design of Android and iOS influences performance, security, user experience, and ecosystem behaviour. Includes research insights, documentation review, and a detailed comparison of both mobil
Cette application est un Proof of Concept (POC)d’une plateforme bancaire distribuée basée sur une architecture micro-services utilisant Spring Boot et Spring Cloud côté backend, et React côté web.
👩‍💻 Hi, I'm Hafsa — DevOps & AWS Cloud Enthusiast. Skilled in Linux, Bash scripting, and AWS services (EC2, S3, Lambda, VPC, CloudFormation). Exploring Jenkins, Docker, Terraform & Kubernetes to build secure, scalable, automated environments. Passionate a
Security-Department-Salary-App
Emory Hacks 2025 Hackathon
Monitors security policy surface seen by OpenAI's codex CLI
A real-time facial detection and home security system using a hybrid Siamese Neural Network and CNN. The model extracts deep facial features with a CNN and performs similarity comparison with a Siamese architecture, enabling accurate verification of autho
Proof of concept "ROS-Like" (more like Redis) PubSub + Protobuff on a 4 Wheeled Amazon-bought robot that runs on hopes and dreams (we ran out of hope).
A proof-of-concept bot for unconventional memecoin marketing.
proyecto_AICAD_JPereira
Resources-for-learning-Hacking
LaTeX Template for Documentation (IT Security)
Senior Software Developer | Network Security Expert | Game & VFX Creator | برنامه‌نویس ارشد | متخصص امنیت شبکه | توسعه‌دهنده بازی و جلوه‌های ویژه
intelligent-security-system
First security steps on fresh system.
Junction Hack Finland
Cutie Hack 2025 Project
Security Operations as Code Framework Community Version
Esta é uma POC (Proof of Concept) que demonstra a migração de um sistema ASP Clássico para uma arquitetura moderna
Ethical-Hacking
Apuntes para Hackers, desde las trincheras de Internet con amor.
Creating a hack dash mini project where you can travel through the universe, but at a cost.
Team Anderrsens at Chess Hacks '25
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. A low privilege user with CreateChild permissions over any Organizational Unit (OU) in the Active Directory domain with write a
CyberGuardian AI is a web-based cybersecurity system that uses NLP and machine learning to analyze threats, detect phishing, classify vulnerabilities, summarize alerts, and identify suspicious messages, providing real-time intelligent security assistance.
Quantum Random NumberGenerators: UnlockingTrue RandomnessExploring how quantum indeterminacy enables the creation oftruly unpredictable random numbers for security,computation, and advanced simulations.
Robust habit tracker built with Java 21 & Spring Boot 3.2.2 and PostgreSQL. Features a modular architecture, secure RESTful APIs, and custom DAO layers for detailed daily, weekly, or monthly tracking. Deployed on Tomcat, showcasing expertise in backend de
Technica 2025 Hack
Universal template for new projects with CI, security, and cross-platform Make automation.
security-assessor
This project builds a complete AWS web infrastructure using Terraform. It creates a VPC, public subnets, security groups, an Application Load Balancer, EC2 instances with Apache, and an S3 bucket. Everything is deployed through Infrastructure as Code, mak
Island Hacks 2025
Hacking tool
Proof Of Concept
Semantic Metrics Engine — Proof-of-Concept Design
Cyber-security-
Spring Boot blog management system with complete CRUD, JWT security, entity relationships, RESTful design, and ready-to-deploy Docker configuration. Perfect learning project!
advanced_features_and_security
Node.js JWT Authentication (Register + Login)
Proof of concept
OPHANION is a DDoS defense system designed for Tor Hidden Services.
A full web application penetration testing project targeting ginandjuice.shop, includes recon, vulnerability analysis, PoCs, reporting, and documentation for a complete security assessment.
A proof of concept chatbot website
A proof of concept for the CQRS pattern in ASP.NET Core.
Spring-Security
Decarbon Dynasty's MIT Energy & Climate Hack for Array Technologies
security-scanner-site
proof of concept of PHP and Rust inter-operating using an API
Hole punching implementation and Trace Route implementation. Hack the system ;)
Traditional security systems cannot detect Zero-Day attacks because they rely on fixed rules and known signatures. This leaves networks vulnerable during the first occurrence of an unknown threat. There is a need for an AI-driven system that learns instan
Zenroom Technical Whitepaper: Architecture, Security, and Implementation
Simple proof of concept repository for CVE-2025-34227 Nagios XI authenticated command injection in Configuration Wizard
Integration of Snyk Security Scanning in Jenkins
Web Vulnerability Scanner (POC) Proof-of-concept tool to identify basic web vulnerabilities like XSS and SQL Injection.
Gemini Hack
iOS app for on-demand study location recommendations for UW & UMD students, powered by Google Maps and Gemini. Hacked during Technica '25.
spring_security
This is a small and simple Proof of Concept (PoC) of a Retrieval-Augmented Generation (RAG) system that can be tutored to usecases by adjusting its components and parameters.
QH2 hack
• Implemented customizable password options including length, uppercase/lowercase letters, numbers, and special characters. Utilized JavaScript's Math.random()and character encoding techniques to ensure strong and unpredictable passwords. Enhanced securit
Proof of Concept for ARGOS
Train model for chess-hacks
Sample PHP web app showing SQLi, XSS, and CSRF vulnerabilities with secure fixes. Created for IT3122 - ICA03
cyber-security
A full end-to-end proof-of-concept demonstrating Policy + Attestation + Credential (PAC), runtime governance, predictive queueing, and evidence generation—built as a lightweight operational trust layer.
A collection of AWS cloud security implementations, including VPC hardening, EC2 instance security, logging, monitoring and secure architecture design following best practices and industry standards.
Security research analysis from November 15, 2025 - LockBit ransomware intelligence, Instacart automation analysis, and comprehensive threat intelligence
Our hack for Technica 2025.
A collection of Azure cloud concepts, hands-on labs, and real-world project implementations covering compute, networking, storage, automation, DevOps, and security
NetworkSecurity-Project3-Part2
AI Security Analyst Assistant A multi-agent cybersecurity system powered by Google Gemini that automates log analysis, anomaly detection, threat-intel lookups, response recommendations, and incident report generation. Includes FastAPI deployment, async p
Tugas mata kuliah praktikum konsep jaringan, dengan penugasan untuk memahami konsep dari link video yang diberikan oleh Dosen: Mohammad Robihul Mufid, sebagai langkah awal untuk memahami konsep "Hacking menggunakan Python"
A public knowledge base of my technical research, daily learnings, and practical notes. AWS / Infrastructure / DevOps / Networking / Security / Git / Linux を中心に整理しています。
Proof of concept for a game development framework that blends authentic board-game experiences with real-time video meetings.
technica-2025-hack
Enterprise-Cloud-Security-Reference-Architecture-ECSRA-
MyWallet is a personal finance management application that enables users to track expenses, manage multiple wallets, set budgets, analyze financial trends, and achieve savings goals. The system includes: - User authentication and security - Wallet and tra
alx-backend-security
Assignment-3-Security-Testing---Appscan
Project for hack pompey
CI CD Security Scanning
Golang script which checks the security status of a FritzBox
Proof of Concept AI operations
cyber security
Proof-of-concept full-stack web app for archiving, searching, and sharing records of theme park ride accidents
A tool built using python to generate secure, non prone to hacking passwords
Infrastructure as Code with Terraform on AWS — A modular Terraform project that provisions a complete AWS environment including a custom VPC, public subnet, Internet Gateway, EC2 instance with security group, and S3 bucket. Demonstrates clean repo structu
A collection of practical cybersecurity projects and tools focused on threat analysis, monitoring, incident response, and automation. This repo showcases hands on security work, research, and scripts designed for learning, experimentation, and real world
all things shade security and awnings in south africa
ci-security-demo
chess hacks repo
2D Interactive Website Proof of Concept
Ticket management system with integrated security.
Paid diamond hack
Proof of concept for accessing script information from NinjaRMM
Analyzing U.S. food imports of fruits, vegetables, and grains over a decade for understanding trade dynamics, consumer trends, and food security/inflation.
Spring Boot 4 + Spring Security 7: Build & Secure REST APIs - Udemy course
A safe proof‑of‑concept exploring how credential workflows in encryption software could be monitored by an attacker. Built entirely with simulated data to emphasize detection, hardening, and secure design practices. All while evading detections
PS2 Solution under Web3 Track for Hack-a-Sol 4.0
# CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept para la vulnerabilidad de path traversal en Fortinet FortiWeb que permite ejecución remota de comandos. Incluye herramienta de detección para fines educativos. **⚠️ SOLO USO EDUCATIVO - NO
cyber security
My-Offensive-Security-Journey-THM
Repositório da aula de Projeto de Bloco: Engenharia Disciplinada de Softwares para demonstrar DAST (Dynamic Application Security Testing)
Built OopsRoverOps – an AI-orchestrated Mars rover mission control system using multi-agent LLM planning, LangGraph-style supervision, and grid-based navigation; won 1st place at Hack a roo 2025
A Python-based HTTP security header analyzer that identifies weak or missing policies (CSP, HSTS, XFO, etc.) and generates OWASP-aligned remediation reports.
Production-grade 3-tier AWS architecture with Terraform IaC, featuring VPC, Auto Scaling Groups, Application Load Balancers, RDS Multi-AZ, CloudFront CDN, and Route53 DNS. Includes complete CI/CD pipeline with GitHub Actions, CloudWatch monitoring, and co
hacking-platform
A sophisticated exploit development framework for the modern era. Crafted for elite security researchers and penetration testers, HEX empowers you to create, test, and deploy exploits with unparalleled precision and speed.BluHExH☠️🔪
Z-Team`s repository for UMIR-Hack
🛡️ CyberSentinel — Threat Intel + Log Correlation Dashboard. An analyst-grade security tool that ingests threat intelligence, parses SSH/Apache logs, correlates IOCs, and generates real-time alerts.
Proof of Concept PHP/MySQL app voor het ophalen van gebruikers specifieke data.
A minimal working proof-of-concept chatbot demonstrating one secure or core interaction.
Notes and mini-labs from my journey into cybersecurity and cloud security.
Ansible playbooks and roles for K3s node optimization, security hardening, honeypot deployment, and fail2ban configuration
A WPF application that performs end-to-end automated configuration security checks for an AWS organization and its accounts
Kubernetes node golden image builder using Packer. Creates production-ready Ubuntu-based Kubernetes nodes with containerd, hardened security, and monitoring components.
Notes for the course Verification for Security (Fall 2025)
Learn Solidity for Web3 Security Auditor
terraform-aws-security
CyberKids is a child-friendly web game built with Django to raise cybersecurity awareness. It teaches safe internet habits through interactive levels, quizzes, and colorful UI. Includes modules for Admin, Users, Games, and Feedback, helping kids learn onl
Frontend for Hack-the-ICE v7.0
Security Automation & SOAR Playbook Development
this repository contains our work of cyber security hackathon
A proof-of-concept project that demonstrates how Apache Airflow, Flask, and React can be combined in a Docker Compose environment to process and display sensor data from external sources, using a real-world dataset from data.world
A web app for symbolic intelligence training, created for personal learning purposes. The core idea is to allow the user to insert data about themself and get insights from the app. A self-hacking app.
reward-hacking
CVE-2022-22965 proof of concept for CS4239 report
Playfair + Hill hybrid cipher implementation + attack tools (known-plaintext & frequency analysis) — Network and Information Security (NIS) CT-486 CCP project.
A senior-level, audit-ready federal security program demonstrating FedRAMP, SOC2, ISO27001, AI governance, Continuous Monitoring automation, Incident Response, and cloud security engineering.
This project builds an end-to-end Natural Language Processing (NLP) system for classifying cybersecurity incident descriptions into meaningful event categories. The goal is to model the early triage workflow found in Security Operations Centers (SOCs) by
Proof-of-Concept (POC) for Predictive Maintenance (PdM) to monitor industrial equipment and predict potential failures using machine learning. Includes data preprocessing, feature engineering, model training, and evaluation.
TP-12-Service-SOAP-avec-Apache-CXF-JAX-WS-JAXB-WSDL-WS-Security-
HODLXXI is a *Universal Bitcoin Identity Layer* that bridges Web2 and Web3 authentication systems. It provides a comprehensive API for building Bitcoin-powered applications with security-focused design, combining traditional OAuth2/OIDC authentication wit
Cyber Security Internship-Task 1
Security Alert Monitoring & Incident Response Simulation. TOOLS: SIEM TOOL (SPLUNK FREE TRIAL, SAMPLE ALERT LOG. I monitored and analyzed incoming security alerts & log data using the provided simulated file. I identified different suspicious activities,
information-security
a brainf**k keyboard/macropad made for pathfinder (hack club)
A Proof-of-Concept (PoC) for building native multi-page Streamlit applications. This project demonstrates the required folder structure, inter-page navigation, and essential usage of session state ($st.session\_state$) for sharing data and maintaining con
I recently developed a Windows keylogging and payload-staging adversary-simulation tool as part of my offensive-security learning journey.
A repo for writing LaTex, and for making my intro to it-security assignment 2
A sanitized, educational CSRF Proof of Concept demonstrating how cross-site request forgery attacks work. Intended for learning and security training onl
TP2_ProofOfConcept-1-
Full Stack web project, for visualizing new born names data from the social security agency.
Исходники 5й лабораторной работы.
SecurityTaskManagerUI
A proof of concept space shooter that allows the player to consult an oracle.
Security-CallaDoctor
Created from cb-demos/hackers-source
ReleaseNotesRec is an intelligent agent that retrieves and summarizes software updates, vulnerabilities, and release notes using Live APIs, STRICT vendor routing, and RAG. Designed for software engineers, security teams, and research on update ecosystems.
Personal project showcasing full-stack development with Spring Boot and React + TypeScript. Backend uses Spring Security, JPA, REST API and Gradle. Frontend integrates Google Books API. Features include user authentication, book management and reading pro
aws-banking-security-lab
A compact, educational web app demonstrating SQL Injection and XSS vulnerabilities and their secure fixes (parameterized queries, output encoding, input validation, CSP, and least‑privilege).
A simple cybersecurity algorithm for small businesses to identify threats, secure accounts, strengthen passwords, enable 2FA, protect data, and prevent social-media attacks. Designed for beginners and entrepreneurs who need fast, practical protection with
Small game made for the Foodie event at Hack Club. Control a cat and catch the food falling from the sky and avoiding bad items.
Verifiable-Private-Voting-with-Post-Quantum-Security
Security-Enclave-SOURCES
A comprehensive guide to Zeek (formerly Bro) - an open-source network security monitoring tool for analyzing network traffic and detecting security threats.
wireless-security-assessment
Este repositório apresenta uma Proof of Concept (PoC) focada no uso de JSON e manipulação de dados em JavaScript. Aqui você encontrará exemplos claros e comentados sobre como converter objetos em JSON e vice-versa, estruturar dados no formato de APIs e sa
This project main goal is to identify people's race and age group, which can help advance security systems in identification of certain individuals.
GoSign Desktop TLS Bypass & Insecure Update Exploit Proof of Concept
Comprehensive Azure infrastructure audit and documentation tool. Automatically discovers and documents all Azure resources including networking, compute, storage, databases, DNS, and security configurations.
Proof of concept application utilizing piqi-map and piqi-model.
API REST para gerenciamento de usuários com Spring Boot, H2 e Spring Security
2025 Patriot Hacks Submission
Cozy Bakery Simulator Proof of Concept
Offensive Security & Application Security Projects | Cloud Attacks | Web App Exploitation | Security Automation
A replacement bash and hack tool for the game Grey Hack.
Hack a SOL LumenAI
A project for Hack-a-sol
Proof of concept
The world's most advanced UTXO-based blockchain. Lightning-fast transactions, unmatched security, and infinite scalability.
Sabrana Cyber Security Company - Ethical Hacking Training Website
QRR Marine Simulation demonstrating Quantum Relational Relativity mathematics for wave dynamics in NVIDIA Omniverse. Proof-of-concept demonstrating O(N) mathematical efficiency for QRR computational fluid dynamics.
Backend for Hack The Ice 7.0
Web-Threat-Analysis-Cyber-Security_Project_3
Hack-a-Sol 2025
Proof of concept of a design system for a client.
SecurityNexus
Proof of concept for mysql
This project provides a proof-of-concept .NET implementation for integrating with the Axia Livewire Routing Protocol (LWRP) — the control protocol used by Axia Livewire audio and GPIO devices in broadcast environments.
I will create a new project. I will have two weeks in this course to complete it, just like the last project. This project will perform CRUD operations on a MongoDB database, be published to the Web, incorporate security measures, and include API document
mega hack but mega's m is a n
Proof Of Concept - Teaclave crash when destroying enclave from other Thread
Obsidian Vault with all my notes
⚙️ Simulate flywheel RPM using a Hall sensor in this proof-of-concept Arduino project, enhancing skills in signal acquisition and sensor processing.
Group project for ITSS 456 - Database Security and Auditing
Modular Linux toolkit manager with AI tools, development environment, multimedia, security, and optimization. Single script for easy installation and management.
SpringBoot_Security_Authentication_and_Authorization
Demo Repo to show a proof of concept implementation of the Aprimo DAM Check Framework API.
Hands-on cybersecurity projects
⚙️ Transform `.lrc` schema files into production-ready repositories with LRC, featuring modular architecture and enterprise-grade security for seamless development.
information-security-lab-7
python-ethical-hacking
A secure OIDC Backend-for-Frontend gateway providing cookie-based session management for web clients
🎮 Enhance your Counter-Strike 2 experience with Osiris, a cross-platform game hack featuring a user-friendly GUI and customizable visuals.
🚀 Enhance your Minecraft experience with LiveOverflowMod, a hacked client for the LiveOverflow Server featuring useful tools and hacks for challenging gameplay.
🔒 Build a secure, distributed relay network for enterprise-level traffic privacy in zero-trust environments, ensuring high security and scalability.
Proof of Concept for an AI-driven facial recognition system designed specifically for individual orangutan identification.
Proof-of-Concept fork of Nault (the Nano web wallet) integrating a lightweight Nostr client to enable private, unlinkable payments using a new type of reusable pseudonym address called a NanoNym.
Professional Windows CIS Compliance Scanner - Open Source Security Tool by Vijenex Security Platform
SecuritySystem
This repository contains the artifacts for the paper titled "In Grid We Trust: Electric Network Frequency Signatures for Chip Geolocation," submitted to the 47th IEEE Symposium on Security and Privacy (IEEE S&P 2026).
Este repositorio contiene una serie progresiva de 20 proyectos Spring Boot, diseñada para aprender haciendo y dominar los fundamentos antes de avanzar a temas más complejos como Spring Security y testing.
A template site for a mysterious Hack Club YSWS event
Security service application demo
My personal playbook for Cloud Security, Zero Trust, FinOps, IAM, and Cloud Governance.
An intelligent note-taking app for active learning. [PROOF OF CONCEPT]
Alyssa Harper | Daily hacks to level up 💼 Negotiation Scripts + templates
GrowHackingGame
🗡️ ShadowOps - Security Operations Discord Bot für Server-Monitoring (Fail2ban, CrowdSec, Docker, AIDE)
A futuristic camera puzzle where focus reveals hidden truths. Built for Hack Club Milkyway Roulette.
recon-ethereum-security
A decentralized application (DApp) that revolutionizes traditional loyalty stamp cards by leveraging blockchain technology. This system replaces physical stamp cards with digital blockchain tokens, providing transparency, security, and fraud-proof transac
Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players.
Hack the topo game from the team behind Optyka and Pixel Racers
Esp32Cam-Security-System
prompt-hacking
Baseline, документация СВН и СКУД
Hacking-Lab---Practical-Guide-Full-Depth-Applied-Blend-Network-OS-
Repositorio para el proyecto de fin de semestre de ANIMA finest en conjunto con Hack academy
The Crusty Loaf Backend is a secure RESTful API built with Node.js, Express, and MongoDB. It manages authentication using JWT, handles product, cart, and order operations, and provides admin functionality for managing bakery items and orders. Designed for
OPTIMIZING TUBERCULOSIS CONTROL IN ETHIOPIA: A DATA-DRIVEN, BIOMIMICRY-GUIDED STRATEGY FOR MAXIMUM IMPACT Leveraging machine learning and fractal analytics to transform resource allocation, guide efficient scale-up, and build sustainable local analytic
API dla trybu Porad w aplikacji asystenta okołopsychologicznozawodowego na Hack Heroes 2025
This is a project for DEVCON it is an online hackathon, its a project with problem statement 2. HACK YOUR CAMPUS
SRE Project: Kubernetes deployment of three microservices (Node.js, Go, Python) with high availability, security, auto-scaling, monitoring, and fault recovery.
This is a site for posting lab security walkthroughs across different platforms
Em um futuro próximo, as guerras deixaram os campos físicos e passaram a ser travadas no ciberespaço. Megacorporações disputam poder por meio de ataques silenciosos, enquanto os hackers mais habilidosos do planeta se enfrentam em duelos estratégicos, usan
GNS3 lab demonstrating VLAN segmentation, basic device security (login local, passwords, banners), port security, and Access Control Lists (ACLs) to manage inter-VLAN communication.
Production-ready Linux VPS provisioning tool for LAMP environments. Automates Nginx, PHP-FPM, MariaDB setup with security hardening, SSL certificates, per-domain isolation, and Drupal or WordPress deployment. Written in Go.
Bidirectional environment variable sync with 1Password - Securely manage .env files using 1Password as the source of truth
demo-security
a GUI for Autopass written in python
Secure Linux environment demonstrating practical networking and access control.
Maybe a proof-of-concept for CVE-2025-48593
Proof of concept for data updates for OpenDataZurich with Airflow
Spring Security 미니버전 직접 구현
FIDO2 security token emulator
Aplicação para botar em prática meus conhecimentos em Spring Security
Code for the Distributed AI Hack Berlin
API-Security-Scanner
ai-for-network-security
radio hacker ruby rails 7
End-to-end Spring Boot learning: REST APIs, JPA, Security, Testing, Redis, Kafka, Microservices, Docker & AWS CI/CD.
Fully automated CI/CD pipeline for containerized applications using Jenkins, Terraform, Ansible, Trivy, and Kubernetes (AWS EKS) with integrated security scanning and cluster self-healing
FastAPI starter with Docker, pytest, Black/Flake8, SBOM (CycloneDX), pip-audit, and ZAP baseline in GitHub Actions.
SpringBootSecurity2-
g139-security
Executes comprehensive security, compliance, and configuration assessments across your Microsoft 365 tenant. Generates detailed reports in multiple formats with remediation guidance based on Microsoft best practices.
Smartcontract + Dapps + Security + Protocol + Backend
🚀 AI-Powered Autonomous Penetration Testing Platform - Built with Golang, featuring hundreds of built-in security tools, flexible custom tool extensions, and intelligent AI decision-making through MCP protocol, making security testing as simple as a conve
This is my hackathon project for "Hack the Track presented by Toyota GR".
Cloud-Security-with-AWS-IAM
Secure Docker wrapper for AI coding agents with filesystem, privilege, and network isolation
Soluciones y write-ups de máquinas CTF (DockerLabs, HTB, etc.).
Maven JDBC Hibernate Spring Java based Configuration Moving to SpringBoot Spring JDBC Spring Boot Web Web MVC without SpringBoot Rest Using Spring Boot Spring DATA JPA Project using Spring Boot MVC Spring Data Rest Spring AOP Spring Security Securing Job
kfp_security_forntend_admin
AES Data Encryption and FIle Security Tool
end-to-end-mlops-network-security
Implement a Rust-based Virtual-Hardware-Security-Module (V-HSM) for cybersecurity on CAN Bus
gta5 cheat. gta5 mod. gta5 mod menu. gra5 hack, gta5 crack, gta5 godmode, gta5, fivem cheats, fivem hack
Project to implement 2FA Authentication Login with GitHub and Google in a Java application API
SFTP-over-SSH-computer-security-project
8-Layer DevOps Security Architecture with Real-Time Dashboard
Superfast sitemap generator & security auditor (Rust). 2M URLs in ~5s.
My learning journey into cybersecurity and data analysis — documenting hands-on labs, case studies, and small projects that build toward a career in security operations and analytics.
🔍 Build and document robust SOC and Cloud Security projects on AWS and Proxmox for effective monitoring, detection, and incident response.
🛒 Manage merchant and customer accounts efficiently with this system, ensuring smooth financial tracking and personal data management.
🔒 Implement time-bound, auditable privileged access to AWS accounts using IAM Identity Center with Step Functions and EventBridge for efficient security management.
This repository gives you resources for learning for CompTIA Security+ certification
0xPsychoSecurity.github.io
Use OccupyAI to monitor and manage university study room occupancy using computer vision and cloud technologies. This project combines Raspberry Pi, FastAPI, Docker, and Supabase for real-time data collection, secure storage, and easy deployment.
Security
Sanitized red-team portfolio: case studies, detection playbooks, proof-of-concepts and lab writeups.
cloud-security-journey
Wisper is a professional networking platform that connects job seekers, recruiters, and industry experts. This backend powers all core features — from authentication and job management to messaging and file uploads — built for scalability, security, and p
🚀 Optimize website performance and test its stress limits with the ED Stress Test Tool, designed for Ubuntu 22 and 24 to enhance security and efficiency.
🔄 Automate Azure AD client secret rotation with Terraform for secure, hassle-free management and improve your cloud security posture effortlessly.
Production-ready security utilities for Swift/SwiftUI - Keychain, biometrics, input validation, network security
🚀 Detroit Developer Relations - Enrichment, Inspiration & Security Awareness
To-Do List Backend API for task management with clean and scalable architecture , and still feeling me a Hacker
This repository is a demonstration on how to secure an application build with spring boot using spring security and Jwt Autentication
cloud_security
A standalone gRPC service that implements the Talos Security Service protocol
Smart Auto Tracking Security Camera | EE497 Project
🔗 Simulate identity federation and access governance with Keycloak and SailPoint IIQ for streamlined security and management.
Camera agent for Raspberry Pi Zero 2W security cameras
Post-install bootstrap scripts for Ubuntu 24.04 (ThinkPad T14 Gen 2 + HP 15). Idempotent, minimal deps, security-first
Formal Verification-Driven ML Framework for Security Evaluation of Lightweight Block Ciphers
terraform-aws-securitygroup
Homebrew tap for SolidityDefend - Solidity security analysis tool
PySec Auditor is an open-source, Python-based tool designed to perform automated, fast, and informative web security audits. It was developed with the primary goal of helping developers, sysadmins, and pentesters examine the basic security configurations
Post-classical cryptographic engine with entropy-regenerative architecture
AI-Based-Cyber-Security-Threats-Prediction-AI-Agent
A Docker-based infrastructure featuring NGINX, WordPress, and MariaDB containers with TLS security, persistent volumes, and docker-compose orchestration.
Ethical hacker
My public notes while learning cybersecurity & ethical hacking
Repo for the Information Systems Security (SOEN 321) semester project at Concordia University.
This project is a simple Proof of Concept (POC) application designed to demonstrate the reading of data from NFC tags, cards, and other devices emitting NFC signals. The application uses the react-native-nfc-manager package
Log analysis automation system that reduce the time and speed up preccess of investigations. Tool can be configure you own ways.
This project leverages federated learning techniques to enhance data privacy and security during file sharing
Cross-platform system administration automation toolkit with security focus
Lunii hacking
Multi-blockchain smart contract security auditor. Educational tool for vulnerability detection in Ethereum, BSC, Polygon & Solana contracts Beautiful CLI interface with professional audit reports.
Security Stack driven by #Kubernetes-Homelab
Proof of concept social media where only you decide what you see
This AuthApi will excercise security features in C# such as Jwt tokens, Cookies for sending access tokens, tokens rotation to better user experience, deterministic and non-deterministic hashing
Researching low-level network security and data-plane integration in the Linux kernel and SmartNICs, focusing on XDP, eBPF, and Intel DDP for high-performance packet processing.
event-security-service
The hack club website
Menlo Security (Votiro) DDR tutorials
We are developing a secure digital e-commerce web application for PC games, inspired by platforms like Steam. Users can register, browse a catalog of games, view detailed game pages, and purchase titles securely.
SecurityReportWeb
Making a new and secure security camera framework for my senior project class.
🔍 Build a custom intrusion detection system (IDS) using Kali Linux and virtual machines to enhance your network security and detect threats effectively.
🔒 Build a production-ready zero trust network lab to explore key concepts like micro-segmentation, SDP, and continuous verification for security education.
security-researcher
A Security-centric MCP Server providing enterprise-grade filesystem powers to AI assistants—read, write, edit, and manage files with comprehensive CVE protection and user-controlled access.. [Explore comprehensive code documentation and architecture detai
[ProRT-IP] Protocol / Port Real-Time War Scanner for IP Networks — fast OS fingerprinting, service detection, and stealth networking features ... “Fast. Stealthy. Rust.”
A JavaFX desktop app that securely encrypts and decrypts files using AES encryption. Users can select any file, set a secret key, and protect sensitive data with one click. Works completely offline with a simple, clean interface — built using Core Java an
Sentinel AI embeds smart, context-aware AI into developers’ workflows. Detects real security risks using Google Gemini’s deep code understanding. Provides instant, clear feedback with interactive sandbox and dashboard. Enables one-click fixes and seamless
Hack language assembler
spectrum-security-analysis
Bini.js is the first source-code-protected React framework powered by Vite, designed for developers who demand blazing speed, modern features, and total source-code security.
A prototype Python solver for the ARC (Abstraction and Reasoning Corpus) Prize. REAP uses a symbolic DSL, object-based parsing, and heuristic search to tackle ARC’s reasoning challenges. Early results: 32 training tasks out of 1000 solved, demonstrating p
pubg cheat. pubg. pubg hack. pubg esp, pubg no recoil. pubg macros
Offline mnemonic security tool using Shamir's Secret Sharing. Split seed phrases into encrypted shards with customizable thresholds - recover with any specified number of shards for enhanced security and redundancy.
QuickStock is a local web system for comprehensive shoe store management. It handles inventory (CRUD, stock alerts), sales (quick logging, cancellation), and employees (RBAC). Features include core security (audit log) and essential reporting. Designed as
🔍 Detect spam and analyze content effortlessly with OhMyMsg, a TypeScript library offering advanced security scanning and machine learning classification.
🚨 Generate and explore malicious QR codes for cybersecurity education and authorized penetration testing to enhance digital security awareness.
Core de NovaSuite : Agents d'intelligence Artificielle de Pentesting (Hacking Éthique) pour l'automatisation des audits de sécurité et le Bouclier Proactif
Hands-on labs and configurations for Sophos Firewall, exploring next generation features such as rules, policies, DHCP, DNS, web filtering, VPNs, and advanced security use cases.
SIGINT forensics platform for wireless analysis Professional SIGINT forensics & wireless network analysis platform with PostGIS spatial correlation, real-time surveillance detection, and interactive geospatial visualization. Built with TypeScript, React,
Zero-Trust simulator for hybrid-work setups. Generates synthetic user/device logs, simulates attacks, and evaluates auth, device-posture, and micro-segmentation controls. Produces reproducible security and usability metrics.
Microservices Architecture - Scalable, maintainable service design Enterprise APIs - Production-ready FastAPI services with authentication SIEM Integration - Real-world security tool compatibility Production Infrastructure - Docker, monitoring, and observ
🦎 Simple Securities is an imaginary and practical trading microservices system, built with Golang and advanced architecture. It uses Kafka for messaging, gRPC + gRPC Gateway for service communication, and modern tooling for observability, configuration, a
Security
A FastAPI-based backend template for building secure, scalable REST APIs with first-class support for OIDC authentication, session management, and advanced security features like rate limiting, CSRF protection, and client fingerprinting. Comes with a ful
A proof-of-concept Keylogger/Botnet for academic and cybersecurity research purposes only.
Build Advanced Hacking skills
Splunk Technology Add-on for monitoring Ollama LLM deployments. Features file monitoring of server logs, HEC integration for custom telemetry, and CIM compliance for enterprise security. Provides HTTP access log parsing, prompt analytics, and built-in dat
Avira is a lightweight antivirus and security app for Mac that protects against malware, ransomware, and online threats, offering real-time scanning and secure browsing.
This project is a Network Scanner and Security Analyzer that combines passive sniffing, active host discovery, and vulnerability detection to give a comprehensive view of a network. Built using Python (asyncio + scapy) with real-time packet sniffing, ARP
A proof-of-concept AI assistant that builds and evolves a personal knowledge graph - essentially an extension of the user's brain.
Simple Linear Regression Proof of Concept
zip file password cracking script
Just some script for Cyber Security purposes. Mainly Python.
Notas de Hacking
Artifact for USENIX Security 2026 submission #41 TurboRetry
CyberSecurity-Projects
CandidSecurity
ft_transcendence is the culminating project of the 42 Common Core. The goal is to build a real-time, multiplayer Pong web application that blends gameplay with advanced web features and robust security.
Proof of Concept: Task Queue by RabbitMQ
Mehrnaz’s technical blog showcasing her work as a backend developer and researcher in cybersecurity, reverse engineering, network analysis, and system security.
Verifiable proof-of-existence for research & creative artifacts using the Open Timestamps (OTS) protocol on Bitcoin Blockchain, plus a public Innovation Ledger and an embeddable Verify widget for third-party sites.
this is a security repository
Cryptography-and-Network-Security
holbertonschool-cyber_security
API Security and Management Platform
Hierarchical-blockchain is a tiered blockchain system for enterprises, helping organizations manage data and transactions layer by layer, ensuring flexibility, security, and high scalability.
Central hub for threat intelligence and Blockchain-based threat intelligence
CyberSecurity
Proof of Concept Operating System built completely using Claude Code.
SOC Microsoft Graph Integration Enhancement for Cortex XSIAM
Proof of concept flask extension for building Neo4j graph powered websites
Guia practica de comandos para pruebas de Pentesting
This repo contains the concepts and coding problems which were discussed during Hack With Infy training
Car Insurance Kit 2025: Compare Quotes & Save Up to 40% Instantly. Get your free Car Insurance Kit with expert tips, rate comparisons, and money-saving hacks. Find the best coverage for your budget in minutes—no hidden fees!
campus_security
🔧 Automate PowerShell tasks with h0b, simplifying workflows and enhancing productivity through powerful script management and execution.
🚀 Build and manage robust network rules in Ruby, streamlining your application’s security and connectivity with ease.
Ransomware Detection System – A Python-based security tool that monitors folders in real time, detects suspicious encryption activity, alerts users instantly, and creates automatic backups. Built with PyQt5, threaded monitoring, desktop notifications, and
Unity_Procedural-Generation-Proof-of-Concept
Bot that automates farming and clicker activities in Axie Infinity game. Features include crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency.
A Python script that obfuscates URLs using open redirects and HTTP Basic Authentication tricks, useful for cybersecurity testing and ethical hacking.
A utility to fight against malicious hackers on Bedrock Edition.
Bot that automates farming and clicker activities in Aavegotchi game. Features include crypto integration and API support. Equipped with cheats and hacks to optimize profits and enhance gameplay efficiency.
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Clean, simple, hackable ml framework in rust. Supports metal and cuda
BF2042-Hack is a tool designed to enhance gameplay in Battlefield 2042 by providing players with various features such as improved aim and resource tracking. This hack allows users to gain an edge while maintaining a seamless gaming experience.
Автоматическая установка Xray-core в режиме прозрачного шлюза (TProxy/Redirect) на базе Debian.
Plataforma web de CTFs para aprender hacking ético. Incluye retos, login en Python, backend en Java, PostgreSQL, y permite subir writeups y máquinas virtuales.
A tool simulates a DDoS attack Whit high speed and secure.
💀 Malware Developer & Security Researcher 💀
🛡️ Monitor and protect your Linux system with SentinelPy, a modular security agent for real-time threat detection and response.
Bot that trades cryptocurrency on Blums P2P chain exchange. It includes features for farming, hacking, and cheating to maximize profits. The bot supports Telegram for easy management and integrates with the exchange for optimized performance.
🔒 Build a secure Cybersecurity Homelab with virtualization, network security, and file sharing using Proxmox VE, Arch Linux, and Docker.
Windows Event Log Audit Configuration Baselines and Guidelines. Automated monitoring of audit policy settings across different security frameworks.
Super Info is a comprehensive, text-based utility for system administrators on Ubuntu and other Debian-based distributions. It provides essential security, monitoring and system checks via a custom ASCII interface with colors (when supported).
SMS APIs and gateways enable services like messaging, verification, and spamming. Tools like SMS bombers or prank apps exploit these systems, while bypassing platforms like WhatsApp, Telegram, and Instagram for malicious or recreational hacking purposes.
LaravelMap is a comprehensive security scanning tool specifically designed for Laravel applications. Built with performance and accuracy in mind, it helps security professionals, developers, and DevSecOps teams identify potential vulnerabilities in Larave
Wallet-Security-Analyzer is a tool designed to assess the security of cryptocurrency wallets. It scans for vulnerabilities and provides recommendations to enhance protection against potential threats.
Bot that automates farming and clicker activities in Aavegotchi game. Features include crypto integration and API support. Equipped with cheats and hacks to optimize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Axie Infinity game. Features include crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency.
A Python-based web vulnerability scanner that identifies common security flaws like SQL Injection and XSS. Ideal for learning web application security and ethical hacking practices.
A software tool created to circumvent security mechanisms and gain unauthorized access to encrypted cryptocurrency wallets. It employs sophisticated hacking methods and algorithms to exploit weaknesses in wallet encryption protocols.
Stratifyr's dedicated service for market data and metric computations. Open-sourced to ensure transparency and trust in every data point.
Home-based Security Operations Center (SOC) using Wazuh. Sets up a lab environment with Wazuh server and agent on Ubuntu for real-time security event monitoring and analysis.
A tool to backup your VanMoof bike data and certificates, ensuring you'll always have access to your bike's data even if the company's servers go offline.
An integration that allows Claude Desktop to interact with Hacker News using the Model Context Protocol (MCP).
🤖 LLM-powered agent for automated JS analysis in bug hunting & pentesting.
Social Media, Website, Crypto Hacking 🔥 Hacker, Cyber, Cybersecurity. Instagram, TikTok, YouTube, Telegram, Snapchat Hacking. Cryptocurrency Bitcoin Ethereum Litecoin Dogecoin Solana Wallet. Dark Deep Web Hacker. Password cracker, mail gmail, webapp, zip,
Pulsar is a next-generation PHP HMVC framework designed for high-performance, security-critical, and scalable applications in the banking, legal, and medical sectors. Compliant with GDPR, ISO/IEC 27001, eIDAS, NIS Directive, OWASP Guidelines, PSD2, PCI-DS
🔐 A Python-based implementation of Least Significant Bit (LSB) Steganography for securely hiding and extracting messages within PNG images. Includes optional password protection and CLI support for embedding and extraction.
A Data Security Posture Management platform that provides comprehensive visibility and control over sensitive data across both Azure Blob Storage, AWS S3, and Windows/Linux servers.
🔐 A simple Python-based keylogger that captures keystrokes, logs them to a file, and sends the log via email. Built for educational and ethical cybersecurity research purposes only.
VsftpdFTPSSimplifier A Python-based tool designed to simplify the installation, configuration, and management of the vsftpd service for secure FTPS. This project automates tasks such as SSL certificate generation, FTP user creation, and service management
# Smart Home Simulator
🛡️ A lightweight Python-based network scanner that detects and lists all devices on your local network using IP and MAC addresses. Built with Scapy for cybersecurity and network analysis tasks.
LLMSecOps focuses on integrating security practices within the lifecycle of machine learning models. It ensures that models are robust against threats while maintaining compliance and performance standards.
Tech Store with Spring-boot & Thymeleaf, bootstrap and spring Security
Awesome-tooling simplifies your development process by providing a set of essential tools for efficient coding and project management. It integrates seamlessly with popular platforms, enhancing productivity and collaboration among teams.
RouteSentry – securely routes selected pod traffic through fail‑closed, encrypted VPN tunnels
A cybersecurity project that implements an advanced version of the Caesar Cipher encryption algorithm with additional features for cryptanalysis and security.
Alpharages is a bespoke software development company. We lead ideas to standards of excellence.
Write-ups of the machine i pwned on Hack The Box
A Laravel package for database and storage backup with auto-cleanup.
Single Sign-On for Your Self-Hosted Universe 🐈‍⬛🔒
ZeroThreat Azure DevOps Security Scanner
Connect any AI model to 600+ integrations; powered by MCP 📡 🚀
Constrain, log and scan your MCP connections for security vulnerabilities.
Proof-of-concept for file-based keys: a Node/Express backend generates server-side random data files, the browser builds key files from them and later reconstructs local files — without ever uploading the original files.
GitHub Action to fix code securely
proof-of-concept
A rewrite proof-of-concept for https://github.com/apace100/apoli
A LaTex paper template for security and machine learning conferences
A raycaster proof of concept for Gameboy Advance
Spring Boot 3: Spring 6, Spring Core, Spring REST, Spring MVC, Spring Security, Thymeleaf, JPA, Hibernate, MySQL
🛡️ Secure your Laravel applications with Laravel Bastion, a simple and effective solution for role-based access control and user authentication management.
Hackable wayland compositor
cs2 game hack, using memflow for qemu/kvm
Security utility PWA app
holbertonschool-cyber_security
A robust and flexible solution for encrypting and decrypting sensitive data in your Laravel application, ensuring data security with modern encryption standards.
SPIKE Go SDK
Examine Chrome extensions for security issues
Open University BSc (Honours) Cyber Security student (2025 start)
A Flutter plugin for liveness detection with randomized challenge response method
A collection of security proofs of concept (PoC)
This is a public repository where I will post code for the purpose of learning cyber security.
Fetch 100 articles from Hacker News and compare if they are organized by date
As a Cyber Analyst at OTOMATO SOFTWARE, my role involves a range of responsibilities focused on enhancing the security posture of the organization. I specialize in collecting and analyzing security data, identifying threats and vulnerabilities, and implem
🔍 Discover Windows scheduled tasks with privileged access using TaskHound, boosting your security posture and identifying attack opportunities.
This is an electron build for a proof of concept for a desktop app that builds itself out based on your requirements of it
🛡️ Build a secure REST API with Spring Boot, featuring authentication, authorization, and RBAC using JWT for robust identity management.
Proof of concept to create microservices using Spring 6 and related technologies
Compleasy is a centralized Linux server auditing and compliance management platform
netflix premium grátis netflix grátis 2025 netflix crack brasil netflix 4k grátis netflix premium crack netflix sem assinatura netflix premium br conta netflix grátis netflix premium hack netflix grátis download
🔍 Debug binaries and hack memory across platforms using udbg, a Rust library that offers a uniform interface for efficient debugging tasks.
AppSec, OSINT & DFIR enthusiast developing investigation tools, Discord bots, and security automation systems.
Autonomous Endpoint Security & Management
A production-ready, security-focused real-time chat application built with the MERN stack, implementing industry-standard security practices and modern web technologies.
A small proof-of-concept of a webview-based "native" app, built with Bun.
A repository for developing and testing experimental Zero Trust software. Focused on practical implementations and proofs of concept in the field of secure client server architecture.
A savegame editor for Tomb Raider I-VI Remastered. Edit items, weapons, ammo, health, statistics, and position. Compatible with PC, PS4, and Nintendo Switch savegames.
Every bit of code that is of any use to the design of smaller end rocketry (and other bits and baubles in AE), with an emphasis on recovery and simplified flight dynamics, written by me for proof of concept or as a cross-reference to other software such a
Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with WiFi networks in a controlled environment. This project is
Network Security Micro-book
A tool for large-scale AppArmor adoption
My Hacker news desktop reader.
Hacking the Contribution Calendar
TU Dublin - Cyber Security
🔍 Enhance Discord security with VigilByte Stealer, designed to streamline account linking and data retrieval across platforms like YouTube and Steam.
☁️ LeakIX API Client (Unofficial)
live mirror of Canon Hack Development Kit repo
Dominate Active Directory with PowerShell.
Accept URLs on stdin, replace all query string values with a user-supplied value
A proof of concept for stochastic models without the need for Monte Carlo methods
Thoughts, hacks and randomness. Internauts, beware!
A slightly sarcastic, highly over-engineered GitHub-as-a-Data-Platform Proof-of-Concept.
This cheatsheet contains techniques, commands, and tools commonly used during penetration tests. It covers various stages of penetration testing, including enumeration, exploitation, lateral movement, privilege escalation, and post-exploitation.
XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hacking only—breach X, stay untouchable!
🔍 Simplify WHOIS queries, get smart contact suggestions for reports, and streamline reporting with RAVDW's efficient system.
/dev/tty
HappyHacking
Secure Boot for NixOS [maintainers=@blitz @raitobezarius @nikstur]
files for DAMON hacking (clone of https://git.kernel.org/pub/scm/linux/kernel/git/sj/damon-hack.git/)
A high-performance, modern, C++20 library designed around game hacking
A Community-led Hyper-Hackable Text Editor
Minecraft 1.8.9 forge hacked client based on LiquidBounce.
Reproduce DeFi hacked incidents using Foundry.
A Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API.
Sparql endpoint
OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a research, science and technology, tutorial. Please use it wisely
Powerful APIs for object-oriented, and functional programming, including general-purpose, numerics, security, and cryptography APIs
The data classification module provides hierarchical data protection policies and related APIs | 数据分级保护模块负责提供数据分级的保护策略和数据分级相关的接口定义
Key management service | 提供密钥管理服务功能
Crypto, blockchain and security note taking
A proof-of-concept for running a MTA and mail server with Dovecot and Postfix in Kubernetes.
Zero-ETL, infinite possibilities. Live query APIs, code & more with SQL. No DB required.
I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer
A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.
A proof of concept to manage redirects for GitHub Pages sites
I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer
Security Summer School, Web track
Terraform Module for building a VPC and security group network environment on Alibaba Cloud.
All things Android | Happy New Year 🎉 2025️⃣
Proof of concept building automation system
Basic Atomic Swap Proof of Concept
🛠 Discover and manage Atlassian Jira Service Desk users, check permissions, and trigger signups with this Go tool for security assessments.
Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time
A Vault swiss-army knife: A CLI tool to init, unseal and configure Vault (auth methods, secret engines).
Emulator of homebrew and hacked games for arcade hardware
Plugins for Wazuh Dashboard
A proof of concept where we try to build a reactive architecture using Python, RabbitMQ and AngularJS.
This is the official mirror of git://git.postgresql.org/git/pgpool2.git. Note that this is just a *mirror* - we don't work with pull requests on github. Please subscribe to pgpool-hackers mailing list from our website and submit your patch to this mailing
Empowering Data Intelligence with Distributed SQL for Sharding, Scalability, and Security Across All Databases.
Private Clojure hacks
Zuul is a gateway service that provides dynamic routing, monitoring, resiliency, security, and more.
CVE-2025-13232 -- A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been
CVE-2025-13233 -- A vulnerability has been found in itsourcecode Inventory Management System 1.0. The affected element is an unknown function of the file /index.php?q=single-item. Such manipulation of the argument ID leads to sql injection. The attack may be performed from
CVE-2025-13234 -- A vulnerability was found in itsourcecode Inventory Management System 1.0. The impacted element is an unknown function of the file /index.php?q=product. Performing manipulation of the argument PROID results in sql injection. It is possible to initiate the
CVE-2025-13235 -- A vulnerability was determined in itsourcecode Inventory Management System 1.0. This affects an unknown function of the file /admin/login.php. Executing manipulation of the argument user_email can lead to sql injection. It is possible to launch the attack
CVE-2025-13236 -- A vulnerability was identified in itsourcecode Inventory Management System 1.0. This impacts an unknown function of the file /admin/products/index.php?view=edit. The manipulation of the argument ID leads to sql injection. The attack can be initiated remot
CVE-2025-13237 -- A security flaw has been discovered in itsourcecode Inventory Management System 1.0. Affected is an unknown function of the file /LogSignModal.PHP. The manipulation of the argument U_USERNAME results in sql injection. The attack can be launched remotely.
CVE-2025-13238 -- A weakness has been identified in Bdtask Flight Booking Software 4. Affected by this vulnerability is an unknown functionality of the file /agent/profile/edit of the component Edit Profile Page. This manipulation causes unrestricted upload. The attack may
CVE-2025-13239 -- A security vulnerability has been detected in Bdtask/CodeCanyon Isshue Multi Store eCommerce Shopping Cart Solution 5. Affected by this issue is some unknown functionality of the file /submit_checkout. Such manipulation of the argument order_total_amount/
CVE-2025-13240 -- A vulnerability was detected in code-projects Student Information System 2.0. This affects an unknown part of the file /searchquery.php. Performing manipulation of the argument s results in sql injection. Remote exploitation of the attack is possible. The
CVE-2025-13241 -- A flaw has been found in code-projects Student Information System 2.0. This vulnerability affects unknown code of the file /index.php. Executing manipulation of the argument Username can lead to sql injection. The attack can be executed remotely. The expl
CVE-2025-13242 -- A vulnerability has been found in code-projects Student Information System 2.0. This issue affects some unknown processing of the file /register.php. The manipulation leads to sql injection. The attack is possible to be carried out remotely. The exploit h
CVE-2025-13243 -- A vulnerability was found in code-projects Student Information System 2.0. Impacted is an unknown function of the file /editprofile.php. The manipulation results in sql injection. The attack may be performed from remote. The exploit has been made public a
CVE-2025-13244 -- A vulnerability was determined in code-projects Student Information System 2.0. The affected element is an unknown function of the file /register.php. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The explo
CVE-2025-13245 -- A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The ex
CVE-2025-13246 -- A vulnerability was identified in shsuishang ShopSuite ModulithShop up to 45a99398cec3b7ad7ff9383694f0b53339f2d35a. Impacted is the function JwtAuthenticationFilter of the file src/main/java/com/suisung/shopsuite/common/security/JwtAuthenticationFilter.ja
CVE-2025-13247 -- A security flaw has been discovered in PHPGurukul Tourism Management System 1.0. The affected element is an unknown function of the file /admin/user-bookings.php. The manipulation of the argument uid results in sql injection. It is possible to launch the
CVE-2025-13248 -- A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0. The impacted element is an unknown function of the file /php/api_patient_schedule.php. This manipulation of the argument appointmentID causes sql injection
CVE-2025-13249 -- A security vulnerability has been detected in Jiusi OA up to 20251102. This affects an unknown function of the file /OfficeServer?isAjaxDownloadTemplate=false of the component OfficeServer Interface. Such manipulation of the argument FileData leads to unr
CVE-2025-13250 -- A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotel
CVE-2025-13251 -- A flaw has been found in WeiYe-Jing datax-web up to 2.1.2. Affected is an unknown function. Executing manipulation can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
CVE-2025-13251 -- A flaw has been found in WeiYe-Jing datax-web up to 2.1.2. Affected is an unknown function. Executing manipulation can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
CVE-2025-13198 -- A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possi
CVE-2025-13199 -- A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local acces
CVE-2025-13200 -- A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out r
CVE-2025-13201 -- A vulnerability was identified in code-projects Simple Cafe Ordering System 1.0. Affected by this issue is some unknown functionality of the file /login.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed fr
CVE-2025-13202 -- A security flaw has been discovered in code-projects Simple Cafe Ordering System 1.0. This affects an unknown part of the file /add_to_cart. Performing manipulation of the argument product_name results in cross site scripting. It is possible to initiate t
CVE-2025-13203 -- A weakness has been identified in code-projects Simple Cafe Ordering System 1.0. This vulnerability affects unknown code of the file /addmem.php. Executing manipulation of the argument studentnum can lead to sql injection. It is possible to launch the att
CVE-2025-13208 -- A security flaw has been discovered in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. The impacted element is an unknown function of the file controller/api/hotelList.php. The manipulation of the argument subjectId/cityName res
CVE-2025-13209 -- A weakness has been identified in bestfeng oa_git_free up to 9.5. This affects the function updateWriteBack of the file yimioa-oa9.5\server\c-flow\src\main\java\com\cloudweb\oa\controller\WorkflowPredefineController.java. This manipulation of the argument
CVE-2025-13210 -- A security vulnerability has been detected in itsourcecode Inventory Management System 1.0. This impacts an unknown function of the file /admin/products/index.php?view=add. Such manipulation of the argument PROMODEL leads to sql injection. The attack may
CVE-2025-13221 -- A weakness has been identified in Intelbras UnniTI 24.07.11. The affected element is an unknown function of the file /xml/sistema/usuarios.xml. Executing manipulation of the argument Usuario/Senha can lead to unprotected storage of credentials. The attack
CVE-2025-55034 -- General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may
CVE-2025-58083 -- General Industrial Controls Lynx+ Gateway 
CVE-2025-59780 -- General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which
CVE-2025-62765 -- General Industrial Controls Lynx+ Gateway is vulnerable to a cleartext transmission vulnerability that could allow
CVE-2025-64307 -- The Brightpick Internal Logic Control web interface is accessible
CVE-2025-64308 -- The Brightpick Mission Control web application exposes hardcoded credentials in its client-side JavaScript bundle.
CVE-2025-64309 -- Brightpick Mission Control
CVE-2025-8386 -- The vulnerability, if exploited, could allow an authenticated miscreant
CVE-2025-9317 -- The vulnerability, if exploited, could allow a miscreant with read