Google says 90 zero-days were exploited in attacks last year
2026 Browser Data Reveals Major Enterprise Security Blind Spots
AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns
Russian APT targets Ukraine with BadPaw and MeowMeow malware
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Interview with Tom Howe of Hydrolix: AI Bots, the Friends, Foes, and Frenemies of Online Shopping
Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
Push Security adds malicious browser extension detection to block threats in employee browsers
Police dismantles online gambling ring exploiting Ukrainian women
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
ContextCrush Flaw Exposes AI Development Tools to Attacks
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
LeakBase Cybercrime and Hacker Forum Seized
Reclaim Security secures $26 million to automate cybersecurity remediation
That attractive online ad might be a malware trap
Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Where Multi-Factor Authentication Stops and Credential Abuse Starts
FreeScout vulnerability enables unauthenticated, zero-click RCE via email (CVE-2026-28289)
Google changes Play Store policies after settling Epic Games dispute
Cisco flags more SD-WAN flaws as actively exploited in attacks
UAT-9244 targets South American telecommunication providers with three new malware implants
Zero-Click FreeScout Bug Enables Remote Code Execution
Cisco Issues Patches for 48 Vulnerabilities
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
Phobos ransomware admin pleads guilty to wire fraud conspiracy
Europol Operation Seizes LeakBase Data Breach Site
SaaS Strategies to Prevent Data Loss and Downtime
Operation Leak: FBI and Europol dismantle LeakBase Cybercrime forum
Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
Authorities pull plug on Tycoon 2FA phishing-as-a-service platform
LeakBase cybercrime forum with 142,000 users taken down in global operation
Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
Workers reviewing Meta Ray-Ban footage encounter users’ intimate moments
Engineering trust: A security blueprint for autonomous AI agents
As AI agents start making purchases, security teams must rethink risk
Bitwarden adds support for passkey login on Windows 11
Cisco fixes maximum-severity Secure FMC bugs threatening firewall security
Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury
Fake LastPass support email threads try to steal vault passwords
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
Windows 10 KB5075039 update fixes broken Recovery Environment
Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR
Fake Zoom, Teams Invites Drop Malware Using Compromised Certificates
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
Hacker mass-mails HungerRush extortion emails to restaurant patrons
Cisco warns of max severity Secure FMC flaws giving root access
Europol-coordinated action disrupts Tycoon2FA phishing platform
FBI seizes LeakBase cybercrime forum, data of 142,000 members
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Best DeleteMe Alternatives (2026): Competitors and Comparisons
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
Mississippi medical center reopens clinics hit by ransomware attack
Global Takedown Neutralizes Tycoon2FA Phishing Service
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
LastPass warns of spoofed alerts aimed at stealing master passwords
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People
Digital.ai expands post-build protection for Android and iOS applications
Tufin's AI-powered tools simplify network security operations
From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
Over 1,200 IceWarp servers still vulnerable to unauthenticated RCE flaw (CVE-2025-14500)
Webinar: The True State of Security 2026: Why Imbalance is Your Organization's Biggest Threat | Storyblok
Calls for Global Digital Estate Standard as Fraud Risk Grows
How to Recover From a Cyber-Attack: A Step-by-Step Playbook
New RFP Template for AI Usage Control and AI Governance 
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
Njordium Vendor Management System eliminates duplicate third-party assessments
The vulnerability that turns your AI agent against you
Data breach at University of Hawaiʻi Cancer Center impacts 1.2 Million individuals
U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
Google speeds up Chrome updates with new security-focused release cycle
ACI Connetic for Cards unifies card, A2A payments and fraud management on one platform
Arkose Device ID uses AI to recognize devices across changing fingerprints
ArmorCode AI Exposure Management identifies, governs, and reduces shadow AI risk
Cybersecurity is now the price of admission for industrial AI
Cybersecurity professionals are burning out on extra hours every week
ImmuniWeb launches a Cyber Threat Intelligence service
Immutable Linux distribution Nitrux 6.0.0 adds GPU passthrough, boot-level recovery, C++ update system
mquire: Open-source Linux memory forensics tool
Why workforce identity is still a vulnerability, and what to do about it
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
CISA flags VMware Aria Operations RCE flaw as exploited in attacks
Facebook is experiencing a global outage
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
Facebook accounts unavailable in worldwide outage
Microsoft: Hackers abuse OAuth error flows to spread malware
Ariomex, Iran-based crypto exchange, suffers data leak
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
Coruna: Spy-grade iOS exploit kit powering financial crime
Google Chrome shifts to two-week release cycle for increased stability
RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
LexisNexis confirms data breach as hackers leak stolen files
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
AI and Deepfakes Supercharge Sophisticated Cyber-Attacks: Cloudflare
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams
Enigma AI enables internal trust governance to asset-to-asset communications
Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
Josys centralizes identity data to replace manual IT oversight with automated governance
ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM
RecordPoint MCP Server standardizes and secures AI access to compliant data
Threat actors weaponize OAuth redirection logic to deliver malware
$100 radio equipment can track cars through their tire sensors
Cloudflare tracked 230 billion daily threats and here is what it found
Half of US CISOs Work the Equivalent of a Six-Day Week
Phishing campaign exploits OAuth redirection to bypass defenses
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued
New Defender deployment tool streamlines Windows device onboarding with single executable
Cato integrates native, behavior-based auto-adaptive threat prevention into its SASE platform
Secure by Design
Star Citizen game dev discloses breach affecting user data
Amazon: Drone strikes damaged AWS data centers in Middle East
Iranian Cyber Threat Actor Targets Iraqi Government Officials
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks
Android devices hit by exploited Qualcomm flaw CVE-2026-21385
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Keepnet launches AI incident response agents that redefine post-delivery email threat containment
Anthropic poaches users from rival chatbots with easier migration
UH Cancer Center data breach affects nearly 1.2 million people
Android gets patches for Qualcomm zero-day exploited in attacks
The Cyber-Resilient CISO Virtual Summit 2026
Chrome security flaw enabled spying via Gemini Live assistant
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
Android's March 2026 security patch fixes over 100 flaws, one under targeted exploitation
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
AI went from assistant to autonomous actor and security never caught up
5 years of shifting cybersecurity behavior
Samsung brings Digital Home Key to Samsung Wallet, extending secure access to the home
Cybersecurity jobs available right now: March 3, 2026
Healthcare organizations are accepting cyber risk to cut costs
Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent
CyberStrikeAI tool adopted by hackers for AI-powered attacks
On The Radar - Cisco Talos Blog
Talos on the developing situation in the Middle East
Fake Google Security site uses PWA app to steal credentials, MFA codes
Middle east crisis prompts UK warning on potential Iranian cyber activity
Popular Iranian App BadeSaba was Hacked to Send “Help Is on the Way” Alerts
Alabama man pleads guilty to hacking, extorting hundreds of women
Upcoming Opportunities in Space Investment: What to Know About SpaceX
Florida woman imprisoned for massive Microsoft license fraud scheme
Chrome Unveils Plan For Quantum-Safe HTTPS Certificates
Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
Bruteforcing the Bitwarden master password I forgor 💀
Google: Commercial Surveillance Vendors Dominated Zero-Day Exploitation in 2025  - Decipher
Just a moment...
Where Multi-Factor Authentication Stops and Credential Abuse Starts
Proof-of-Work CAPTCHAs with Hashcash - WebDecoy
Cloudflare tracked 230 billion daily threats and here is what it found - Help Net Security
2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
GitHub - editinghero/InstallerX-Security: A Secure App Installer For Elder People To Not Install Unnecessary Malware Apps · GitHub
Stop Putting Secrets in .env Files
Just a moment...
YGGtorrent — Fin de partie — YGGLeak
- YouTube
- YouTube
ACGS Algorithm for Hidden Number Problems with Chosen Multipliers
FBI Seizes LeakBase - by Alex from Threat Road
Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
Just a moment...
An OT Incident Scoring System Inspired by Natural Disasters
DEF CON bans hackers, technologists named in Epstein documents - Nextgov/FCW
Download Certificate Transparency Logs as Normalized JSON — ct-cert-feed
GitHub - Augmaster/Nuclei-Parser: A simple Web-UI based Nuclei Parser · GitHub
Your Duolingo Is Talking to ByteDance: Cracking the Pangle SDK's Encryption
Is My ISP Spying? — Free ISP Privacy & Tracking Test
'Mysterious' leaked US government tool is breaking into iPhones
NeuraCyb - Cybersecurity Intelligence
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers | WIRED
- YouTube
AI Security Bootcamp
Perplexity Comet Can Steal Your Passwords While You Ask It to Accept a Calendar Invite
- YouTube
CyberStrikeAI: the AI Attack Platform Behind the 600+ FortiGate Breach | Barrack.ai
FakeGit: LuaJIT malware distributed via GitHub at scale | Derp
GitHub - BARGHEST-ngo/MESH: MESH Forensics enables remote mobile forensics over an encrypted, censorship-resistant peer-to-peer mesh network. · GitHub
Cybersecurity professionals are burning out on extra hours every week - Help Net Security
- YouTube
Zeek: Using Zeek with AWS Traffic Mirroring and Kafka
AI Security Bootcamp
Hacktivists claim to have hacked Homeland Security to release ICE contract data | TechCrunch
Cloud End-to-End Encryption: Encryption Is Not All the Same
IBAC — Intent-Based Access Control
‎Gemini - direct access to Google AI
How we built high speed threat hunting for email security · Blog · Sublime Security
- YouTube
GitHub - vdbio/versiondb_samples: A collection of technographic datasets from VersionDB · GitHub
DEF CON hackers 'fed up with government,' Jake Braun says • The Register
- YouTube
ZeroPath Exploit Development CTFs - ZeroPath Blog | ZeroPath
Analysis of an Integrated Phishing Campaign Utilizing Google Cloud Infrastructure – Malware Analysis, Phishing, and Email Scams
acidvegas x blog - the shady world of ip leasing
Just a moment...
Exploring Maturity Models
#cybersecurity #riskquantification #crml #ai #fintech #devsecops | Sanket Sarkar
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals | WIRED
- YouTube
- YouTube
- YouTube
- YouTube
MalChela Meets AI: Three Paths to Smarter Malware Analysis – Baker Street Forensics
IPVanish VPN macOS: Privilege Escalation via XPC Auth Bypass
Free Cyber Deception Lab Tools | NeroSwarm Lab
Attention Required! | Cloudflare
Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE)
403 - Forbidden
Perplexity Comet browser hole was exploitable via cal invite • The Register
- YouTube
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed. | Barrack.ai
OAuth Redirect Abuse Lets Attackers Bypass MFA Without Stealing Tokens
Live Vulnerability Intelligence & Trending CVEs | LeakyCreds
Meta’s AI Smart Glasses and Data Privacy Concerns: Workers Say “We See Everything”
Hacking | InsideStack
LinkedIn Login, Sign in | LinkedIn
The AI Threat Matrix Your Security Team Is Missing
Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent | InfoStealers
- YouTube
- YouTube
Trivial To Introduce, Impossible to Fix: Why SSRFs are the Trickiest Security Issue in Modern Web Apps | Tachyon Blog
I Audited the Privacy of Popular Free Dev Tools — The Results Are Terrifying — Blog | ToolBox
Risk Vector | Risk Vector
Hackian and the Ghosts in Your Business Logic: When Your App’s Rules Are the Real Vulnerability | Ethiack — Autonomous Ethical Hacking for continuous security
GitHub - vigil-xy/agent-scanning · GitHub
Latest Interesting Cybersecurity News – 01-03-2026
Attention Required! | Cloudflare
The Middle East Conflict Just Went Digital: Why the UK is Bracing for Iranian Cyberattacks
Florida wants its own CIA. That could lead to unchecked domestic surveillance | Seth Stern, Lauren Harper and Bobby Block | The Guardian
Task 2: Phishing Email Detection & Awareness Report (Future Interns Cyber Security Internship)
An eBPF based Proof-of-Concept for intrusion and anamoly detection
Lang Graph project - Proof of Concept
A post exploitation redteam framework. "C2 so good it make you wanna hack yo mama"
Das ist der ULTIMATIVE Anton-App Hack:
bblocks-oas30-security
this is a project where i created a website with basic security measures to with stand online cyber attacks from system
Source files for for 'modded' music for a hack for Thunder Force VI on the PlayStation 2. Uploaded here for archival.
Design and implement an enterprise-oriented claims management platform for insurance, where requests are processed asynchronously and reliably using API Management + Service Bus + Functions, ensuring traceability, error handling (DLQ), secret security, an
Security Onion pcap investigations
a clone of https://github.com/Chris-AC9KH/JS8Call-improved alot of security fixes not perfect ill will add more fixes in the feture
Containerized OpenClaw deployment with podman - multi-container setup with network security and whisper integration
Manages user onboarding and security.
proof-of-concepts
SOAR automation pipeline integrating Wazuh SIEM, MISP threat intelligence, and n8n workflow automation for automated security alert analysis.
ht-security-signaling-mesh
A proof of concept speech to text app that will allow learners to use text to speech in languages not currently supported by word.
诊断你的Openclaw所处环境的安全性
A proof of concept web app for inspection reports
NetGuard is a simple network security scanning tool written in C that automates common Nmap scanning tasks through an interactive terminal menu. It is designed for cybersecurity students, penetration testers, and security researchers to perform quick netw
A Local AI-Augmented Red Team / Blue Team Framework for Configuration Security Analysis
Collection of "Hacking Tools" for various disciplines of hacking. Mainly meant for CTF and education purposes. Collected from various sources. Also anything else interesting around or involving hacking will be dumped here.
An autonomous, high-performance security engine that bridges the gap between traditional heuristic scanning and LLM-driven reasoning. By orchestrating a suite of industry-standard tools and leveraging Claude AI via the Bonsai Proxy, this orchestrator does
Fenrir-Security
Proof-of-concept for HTML streaming in Go using Templ
A fun proof of concept I built for a traversing hero section using an MP4 video
Proof-of-concept Linux utility to prevent GUI software from inhibiting the screen idle timeout.
Crate Hackers Dashboard
Security investigation and forensic analysis performed in the TryHackMe Windows Investigating room
nodera-cyber-security
Proof-of-concept
proof-of-concept showing how React Error Boundaries could work during Server-Side Rendering in Next.js without <Suspense>
SuperJetSecurity
Proof of concept implementation
Proof of concept for global state management using Zustand with Next.js App Router, TypeScript and Supabase. Features slice-based store architecture with server side pagination.
Proof of concept implementation
A Proof-of-Concept (PoC) demonstrating runtime string obfuscation via XOR-based encryption and dynamic key derivation. This project explores memory safety and pointer-driven data manipulation, simulating the techniques used by malware to evade static stri
A repository for the Hack-Club Stasis project
NJ DMHAS CCBHC Certification Portal — Proof of Concept
anti DoS-DDoS, anti hack web
Building LLMOps proof of concept
Projet Sécurity by Design
Slidev presentation: Hackable Tools Will Win
Dxwns hack
dependabot-proof-of-concept
KOHTECH SECURITIES
A collection of production-style DevOps systems including CI/CD pipelines, cloud infrastructure, containerized deployments, DevSecOps security labs, and platform engineering projects.
Real-time AI & Gaming news and drama tracker — aggregates RSS, Reddit, Hacker News with drama scoring and breaking news detection
-Leviathan-Security-Tool
copilot-security-agent
Distributable application security review skills for Claude Code
Power BI Copilot proof-of-concept with 12K logistics shipments demonstrating AI-powered natural language analytics
Official documentation and guidelines for LekirFramework, a vulnerable-by-design web application platform used to teach and practice web security vulnerabilities.
Proof-of-concept-bloop
A collection of JavaScript practice projects including a Spotify Clone (main project), faulty calculator, factorial finder, hacking terminal UI, and image styler.
Proof of concept - Connecting Langgraph to MCP server
Security-hardened middleware for Discord LLM bots
hack project to visualize imbued gem options
Core smart contracts for Forge Atlas programmable economy infrastructure. Contracts currently undergoing security audit, expected April 2026.
hack_git 5
Repository of technical topics, learning and proof of concept.
Tempest Rising Trainer Hack 2026 — Infinite Resources · God Mode · Instant Build · One-Hit Kills · Super Speed · Undetected. Free forever cheats.
The Zero Trust Application Security System is a secure messaging platform that verifies every user, device, and request before access. Messages are encrypted using AES-256-GCM with dynamic key derivation, ensuring confidentiality and integrity. Token-base
security-fejsbuk-app-test
This is a blooket hack that can a hack The game
Hacking-notebook
https://dev-hack-redlix.vercel.app/
wscan is a multi-threaded web vulnerability scanner built in Python. It performs automated security testing against web applications by crawling pages and detecting common security misconfigurations and injection flaws.
Discord bot for Railway deployment
Simulación educativa de un ataque de phishing sobre el portal OTI-UNI para la clase de Ethical Hacking.
hacking-notebook
ML-KEM (FIPS 203) post-quantum hybrid encryption proof-of-concept
The organization was pleased with my work in creating the proof-of-concept employee-management API. I take it to the next level by adding middleware and organizing my endpoints into routers.
cyberpunk-security-portfolio
🦞 CLAW EXTERMINATOR — EXTERMINATE tasks in seconds. OpenClaw kills leaderboard, god SOUL.md templates, memory hacks, voice mastery & fastest extermination flex. Submit your kill — become legend. EXFOLIATE harder. 💀⭐ Fork to join the massacre.
AI-driven firmware security analysis platform for IoT and embedded systems. Automatically ingests, extracts, reverse-engineers, and audits firmware binaries — detecting CVEs, hardcoded secrets, backdoors, C2 endpoints, and malware.
A proof-of-concept Chrome extension that silently leaks the full URL of background tabs using only the `declarativeNetRequest` and `storage` permissions — no `tabs` permission, no host permissions, no user interaction.
This repository contains a small proof-of-concept notebook demonstrating how to query the Ensembl GraphQL API using Python.
Jinzur, is a remote controlling malware that installs itself inside computers when running the python file for the first time and lets the hacker control the PCs remotely.
Smart WiFi Surveillance System is an IoT-based vehicle security project using ESP32-CAM, ESP32 WiFi module, L298N motor driver, and four DC motors. It enables real-time video streaming, remote vehicle control, speed and light adjustment via a web interfac
NeuroLock – Multi-factor smart door security system using ESP32, face recognition, BLE authentication, and cryptographic verification. HackArena 2026 project.
Proof-of-concept for a smart recycling conveyor.
Proof-of-Concept watchdog based Local LLM code quarantine scanner.
BlockBallot is a secure full-stack digital election platform powered by a custom in-memory blockchain. Built with Java and Spring Boot, it guarantees vote integrity using Proof-of-Work mining, Merkle trees, and a 5-layer hash pipeline, wrapped in a dynami
Medis is a vibecoded proof of concept. Disregard
password-security-lab
AI-powered Microsoft Entra ID security auditor. Connects to a live tenant via Graph API, fetches real configuration data, and uses an Azure AI Foundry agent to detect misconfigurations, privilege escalation paths, and policy gaps. Tested against EntraGoat
Proof-of-concept Windows Control Panel Applet (.cpl) written in Rust using the raw Win32 CPL interface
R6X XScan is a professional-grade security scanning tool designed specifically for Rainbow Six Siege players and communities. It helps detect potential cheaters by scanning for cheat-related files, suspicious executables, and analyzing system information
Proof of concept - Connecting Langgraph to MCP server
NetworkSecurity
Proof of Concept application for AI-First development
PROOF OF CONCEPT ONLY -- DO NOT USE
A multi-container docker environment for testing Release Engineering work and proof-of-concepts
a proof of concept and continuation of a meme
OpenAstra builds open source tools that bring NIST-grade security compliance into every developer's workflow.
Simple project Spring Boot Web, themleaf, security
Proof-of-concept Windows service written in Rust using only the official windows crate, no wrapper libraries.
A multi-container docker environment for testing Release Engineering work and proof-of-concepts
Proof of concept — .NET runtime inspection and controlled stepping via MCP stdio
This is Proof of Concept to the Competition Module for CDC
central-security-check
Project1-LogicForSecurity
Proof of concept of a resilient marketplace → ERP integration core using Node.js, Redis Streams and SQLite, implementing event ingestion, async processing, idempotency, retries and full audit logs with iFood API.
A real Hacker News reader built to stress-test vinext — the Vite-powered reimplementation of the Next.js runtime.
AI-native code review rules for Claude Code, Cursor, Codex & more. 70+ rules across Next.js, Supabase, SOLID architecture, and WordPress — each with bad/good examples, CWE/OWASP mappings, and detection hints.
RL-Hacking
Proof-of-concept quasi-direct-drive actuator using a capstan mechanism, brushless motor, and rotary encoder
Malware analysis
CSA-5137-Cryptography-and-Network-Security
Cyber URL Scanner with CTI capabilities - built for security research
JWT-based authentication and authorization with Spring Boot and Spring Security
Deterministic + AI security scanning layer - Claude Code Plugin
i wIlL hAcK tHiS cLuB!!!!!1!1!111!!!1!
Detecções de segurança usando Splunk: varreduras de porta, anomalias em DNS, IDS, firewall e outros.
OTP-Validation-Security-Issue-Nexa-Poker-App
A quick proof of concept for an AI assisted job-bot
An advanced Model Context Protocol (MCP) server for Electron App developers. Provides 14 specialized tools for static analysis, security auditing, and intelligent code scaffolding.
✨ My GitHub Profile - Cloud Security Engineer | Creator of SVETRI
hack_git 7
TezosX/Etherlink security audit report
CrowdStrike-style runtime monitor for AI coding agents — network, filesystem, process visibility + security alerts
A vibe-coded proof-of-concept for tracking materials around a makerspace
an always-on hacker news X11 widget for AI/Agentic/LLM posts
Proof of concept for agent wrapper
California-based private security firm — marketing and lead-generation website built with React 19, TypeScript, Vite 6, and Tailwind CSS v4
Implemented a distributed e-commerce backend microservices system using the Spring ecosystem. Includes customer, product, order, payment, and notification services with API Gateway routing, asynchronous messaging, and OAuth2-based security, following modu
Fitness Tracking Application. Used Technologies: Spring Security with JWT tokens for secure logins, role-based access control for Admin privileges, MongoDB through Spring Data and Hibernate for efficient database management.
This is the proof of concept for Plan of correction proof of concept
EDGE-BASED-IOT-INTRUSION-DETECTION-USING-DOCKERIZED-SECURITY-SERVICES
Contains Python version to do analysis, solve toy problems, proof of concepts, etc for HSD
security: implement rate limiting
Just a proof of concept
Proof of concept pure browser based inventory management system
Este repositório contém um proof of concept (POC) didático para demonstrar a vulnerabilidade de backdoor descoberta no XZ Utils (versão 5.6.0). O script xzdoor.sh simula a instalação de uma backdoor na biblioteca liblzma, que pode ser explorada para execu
hack_git 6
A comprehensive Linux security auditing tool for red teamers, pentesters, and security engineers.
Small projects and proofs of concepts related to internet das vacas
NetKitX - Extensible Network Security Toolkit
A Proof-of-Concept for issuing Verifiable Credentials (VCs) based on the EBSI framework and W3C standards, specifically for academic diplomas.
Spring-Security-JWT-and-Auth-Authentication
Cybersecurity for Logistics, Ports & Government Systems. Building security tooling, monitoring platforms, and authorized assessments for critical infrastructure.
AI-powered email triage and security analysis tool with phishing/malware detection
A proof-of-concept interactive web simulator demonstrating how AI agents can participate in feature-based consensus mechanisms within the Endless decentralized cloud.
Managed Small Scale Network 2025 Proof of Concept
Experimental prompt injection defense via grammatical voice shifting — rewrites untrusted text into 3rd person reported speech with reversible markers. Proof of concept.
VPS management API with FastAPI - System monitoring, Docker management, file operations with GitHub OAuth security
This is a basic cs2 external hack meant for use on non VAC secured servers. will be working on adding stuff like RCS and ESP, and an actual GUI with changeable hotkey
macOS-Security-Manager
Proof of concept of a data analyst portfolio made with Vibe Design.
A secure Notes REST API built with Django REST Framework and JWT Authentication. Users can register, login, and perform CRUD operations on their personal notes. Each note is linked to the authenticated user, ensuring data privacy and security.
This project is an Educational WebRTC Privacy Auditor. It serves as a proof-of-concept to demonstrate how the WebRTC (Web Real-Time Communication) protocol can be used to identify a user's public IP address, even through certain network abstractions.
Defensive cybersecurity toolkit including a network mapper, mini SIEM/IDS, and malware static analysis engine built for security research and learning.
Manage AI assistant memory by retrieving only the most relevant past interactions to keep context clear and focused.
A validation tool for Google's CEL (Common Expression Language) expressions in Python, providing a safe and typed way to evaluate expressions and prevent potential security vulnerabilities.
Proof of concept for online ordering menu delivery
Auth service I built to get hands-on with Spring Security 6. Covers JWT with refresh token rotation, OAuth2 login via Google/GitHub, RBAC with permission scopes, Redis rate limiting, and audit logging. Part of a larger microservices project.
Proof of Concept of the Auterion Library.
security-bot
6 intentionally vulnerable AWS environments to practice cloud attack & defense — misconfigured S3, IAM privilege escalation, IMDSv1/SSRF, Lambda RCE, secrets exposure & public RDS. Each challenge includes Terraform, hints, MITRE ATT&CK mapping & remediati
The ECL Proof of Concept / Demo Tool
Set up a security-focused monitoring system in AWS using CloudTrail, CloudWatch, and SNS. This project walks you through tracking access to sensitive data (like API keys, database credentials, and other secrets) and configuring alerts for unusual or suspi
Proof-of-concept for a Linux seccomp userspace syscall filtering
Android Malware Detection System is an Android app that detects malicious applications using a machine learning model. The model is deployed on the cloud, and the app sends data to the server for prediction. It helps identify whether an app is malicious o
Security testing tool that automates permission and accessibility checks for Google APIs and Firebase services
Enable private AI agents on desktop and mobile to index files and connect to over 10,000 tools without sending data to the cloud
A proof-of-concept Ansible playbook to deploy Kanidm Identity Management Server in a Podman container and configure it as an OIDC provider for HashiCorp Vault.
security: add input sanitization
China-OSINT-Practicum-Military-Food-Security-Analysis
For Hack Club Birthday Cards (birthday-cards.hackclub.com)
セキュリティ
Esta é uma PoC (Proof of Concept) em C++ que utiliza a poderosa técnica de escrita em bytes de funções ETW para desativar ou verificar as funcionalidades de detecção mais comuns no Windows.
Technical analysis and proof-of-concept for CVE-2024-1086, a Linux kernel nf_tables use-after-free vulnerability leading to local privilege escalation. Includes vulnerability breakdown, affected versions, exploitation methodology, and mitigation guidance
Cookie dungeon game + AI security monitor + MCP server for any terminal
Community security audits for Burglin Gnomes mods
A proof-of-concept that implements the Patient Health Questionnaire-9 (PHQ-9) depression screening tool using the FHIR R4 standard
A proof of concept SIP tool made with React and Electron
A Cybersecurity Proof of Concept (PoC) demonstrating high-ticket phishing techniques, social engineering, and local data interception for educational purposes.
Proof-of-concept User Interface showing how to interact with Maregraph's data resources
Proof of Concept voor MijnOverheid Zakelijk
Doing a proof of concept to see if I can inject a UUID into a prometheus remote write with Fluent-Bit.
A proof of concept of how components could work in the Elm programming language
Copy of Security-Tutor-CISSP but specific for the materials minus the transcription piece to distribute to students that use the same workproduct I used during the training for my exam.
Very simple proof of concept for Azure Landing Zone.
Open-source orchestrator that chains open-source AI tools to process a CT-scan end-to-end, each running in its own isolated environment. Outputs a structured findings report. Proof-of-concept prototype.
A quick SuperSet API hack
IEB Client is a free open sourced hacked minecraft client for 1.8.9 forge!
Ultra-lightweight, zero-dependency async socket core for AI agents & trading systems. Built with Python stdlib only. <5MB RAM, <100ms startup. FireSeed security included. 🛡️🚀
An autonomous, reasoning-first Android orchestrator. Bridges PC storage and mobile UI using Llama-3.1-70B to execute complex, cross-device workflows via ADB and Intent Injection. 🥈 2nd Place Winner - Hack-N-Android hacakthon.
GSoC '26 Proof of Concept: A lightweight, alignment-free Machine Learning taxon classifier for Anopheles mosquitoes using TF-IDF 5-mers and Random Forest.
Enterprise AWS Security Group Risk, Compliance & Attack Path Analysis Platform (Flask + CVSS + Graph + PDF + Docker + Boto3)
Ethical-Hacking
docker-security-lab
Advanced Network Port Scanner, Vulnerability Detector & Security Assessment Tool built with Node.js
This repo is as Proof of concept of plain traditional RAG
Hands-on security operations center lab with wazuh,ubuntu,windows, and linux attack machine
Implémentation pratique d'un service AI local avec FastAPI, Ollama et Docker. Démonstration d'inférence, exposition HTTP et bases en AI Security.
Proof of Concept that higher reasoning (via an SRM layer) would move faster than LLM if developed.
Building a B2B SaaS Security Platform using React with the help of Shadcn and Tailwind CSS.
keylogger, etc...
Customized Hacking & Coding Terminal
Cyber-Pulse: A self-hosted Home Lab Security Operations Center (SOC). Built with WireGuard for CGNAT bypass, Suricata (IDS) & CrowdSec (IPS) for threat defense, and Pi-hole for DNS filtering. Features a custom Zsh CLI dashboard and full containerized tele
just my answers for hacker ranks
This is a repo that is build on top of the existing strapi demo (seehttps://github.com/strapi/LaunchPad). This repo is a proof of concept for CFIN.
AI-powered Python code review — upload a codebase, get security analysis, architectural insights, a refactoring roadmap, and generated tests. 8-stage LangGraph pipeline with 5 Gemini agents grounded by RAG.
Secure LLM API gateway with MCP security, risk scoring, and manual review workflow.
Zero-Trust runtime security layer for agentic LLM systems.
Multi-layer security system for AI Agent on Sui blockchain - 7-layer defense, 120+ detection rules
Proof-of-concept demonstrating an attack against the OpenClaw gateway. The victim browses the malicious site, a connection is made to their local OpenClaw websocket, that connection is proxied to an attacker websocket. From here the attacker can ask OpenC
Network-Security
A serverless DevSecOps tool that monitors AWS CloudTrail events to automatically remediate public S3 bucket exposure in near real-time using Terraform, EventBridge, and Python (Boto3).
Proof of Concept Warhammer 40,000: Rogue Trader Mod
A basic proof-of-concept demonstrating a local MCP server to be used by VSCode's Copilot Chat.
This is a PoC (Proof of Concept) project focused on testing selenium automations running in a single window but with multiple tabs, with each one having it's own session and data.
Best Pubg Module On Zygisk
proof-of-concepts
A Python-based real-time network security tool for Windows. Uses Scapy for packet sniffing and WebSockets for instant threat alerting.
Demonstrate a proof-of-concept exploit for CVE-2026-2441, a high-risk Chrome use-after-free vulnerability in the Blink CSS engine.
Remake of the micro-hack game.
A production-grade portfolio and digital garden demonstrating modern DevOps, SecOps, and AI engineering. Features a zero-JS Astro frontend, CI/CD via GitHub Actions, strict security headers, observability endpoints, and a battery-efficient "Sand & Dust" g
Proof of concept of onboarding new clients and CRM. Client lead scraping from a pdf that leverages LLM models to draft emails from a business to SMB clients then outputs to a CRM to track status.
The hacking of the process is a mandatory side of the life
Pokemon Cuarzo ROM hack
⭐️ World of Tanks cheat 2026 | Humanized aim | Wallhack (modules/arty) | Triggerbot | Low-risk HWID spoof | Auto-updates hacks ⭐️
Ce projet est un Proof of Concept (PoC) de pipeline DevSecOps automatisé sur Azure. L'objectif est de démontrer comment sécuriser le cycle de développement d'une application moderne dès ses premières étapes ("Shift Left Security").
I turn ideas, brainstorming sessions or interview notes into innovatvie proof of concepts that drive innovation.
A practical, hands-on roadmap documenting my progression as a Cloud & Platform Engineer through Linux, Azure, automation, CI/CD, and cloud security projects.
ESPECTRO FEDERAL is a cybersecurity platform providing professional-grade tools designed for ethical hackers, penetration testers, and security researchers..
Proof of concept to help my daughter do math
Project showcasing Security Engineering fundamentals
Community Voice at the Corner Proof-of-Concept
This project focuses on identifying security threats by capturing and inspecting data packets moving across a network using tools like Wireshark. You will analyze real-world traffic patterns to detect anomalies, such as spoofing or malware communication,
uploading 115 programs in hacker rank
IT-Security-quiz
A proof of concept app for product development coding with help from AI
A real-time, event-driven cloud security system that automatically detects and responds to threats in an AWS environment using fully managed, serverless services.
ShadowLocator v5.0: A specialized network utility designed for testing browser-to-server API latency and geolocation accuracy across distributed environments. Built for authorized security research and device verification.
A personal website and portfolio highlighting my journey in cybersecurity and ethical hacking.
Snake Cash Vault: Advanced URL Encryptor with a 30s Snake Game task. Boost A-Ads revenue (ID: 2429249) with high user retention. Features Dual-Ad placement, Base64 security, and a sleek Matrix UI. Perfect for Telegram & Social Media monetization. Bot-proo
Este es el repositorio donde documento mi aprendizaje y máquinas resueltas de Hack The Box, en mi camino dentro de este maravilloso mundo de la ciberseguridad.
"Proof of concept tool for bulk-creating Okta realms for partner organizations"
Star Wars Eclipse Cheats 2026 — Multi-Character Control · Diplomacy Hack · Reputation Editor · Skill Editor · Infinite Credits · Undetected. Free forever.
Cryptography is the art of scrambling data into unreadable code to ensure privacy and integrity. Network Security is the practice of using tools like firewalls and protocols to protect the infrastructure and "pipes" that carry that data. Together, they en
Simple Huffman Tree Proof of concept for a compression and archiving tool like gz or xz.
This system is designed to provide real-time monitoring, threat detection, and automated response for IoT environments. It bridges the gap between vulnerable IoT devices and centralized security management via a cloud-based dashboard.
spring-security
Complete Ethical Hacking Course - Network Security, Penetration Testing, Web Security
FIN7900 FinTech Security Training Platform — React + TypeScript + Express + SQLite
Automated Network Scanning & AD Enumeration tool. Performs multi-level reconnaissance, SMB/LDAP enumeration, and security testing including Password Spraying and Kerberoasting. Developed as part of the ZX305 program
Random thoughts as an engineering leader / security practitioner
Tools for OpenSource Security Operation Center
EdgeWalker is a high-performance IoT security scanner and offensive security tool that audits your home network detecting open ports, default credentials and known vulnerailities
Full-Stack Development Roadmap covering frontend, backend, DevOps, cloud, security, and QA — from beginner to production-ready engineer.
A GSoC 2026 proof-of-concept integrating Clad (compiler-based automatic differentiation) as a custom C++ gradient engine for LibTorch.
Open-WebUI over Tor hidden service with strict PQ-only TLS (X25519MLKEM768/X25519Kyber768Draft00), Dockerized deployment, and CI smoke tests.
SecureEyes is a modern security dashboard prototype featuring real-time log simulation, global search, and persistent dark mode. Built with vanilla JS, it offers a responsive interface for monitoring camera feeds and system alerts.
A chrome extension built for pay security and trust .
This project is a Terraform-based proof of concept for migrating a simple WordPress blog from on-premises infrastructure to AWS.
ShieldBot_-security
Practical AWS Cloud Engineering labs – networking, compute and security
Open-source LLM-based MCP agent for VM security analysis
app called “ATR Extension Screener”. It scans all US-listed stocks and ETFs across NASDAQ, NYSE, and NYSE Arca for securities trading far above their moving average, measured in ATR multiples — a technique used to identify parabolic price extensions.
Stacks is a proof-of-concept open-source platform for course reading list management.
🎯 Complete Smart Contract Security Audit Framework with modern UI and comprehensive features
fenrir-security-design-challenge
Proof of concept library for embedding Go code in the JVM, without native dependencies at runtime
Local AI Home Cyber Bodyguard - Real-time network security with antivirus, IDS, and parental control
Python CLI that creates GitHub repos with safe defaults — branch protection, Dependabot, secret scanning, and pre-flight security scanning — applied automatically.
PoolVault: Six cutting-edge security modules empower robust threat detection, encryption, and intelligent infrastructure
ai-iot-security-dashboard
A comprehensive, interactive educational platform for learning and implementing the 18 CIS Critical Security Controls with open-source tools and practical guidance.
Proof of concept for an interpretable language model.
Progetti ed esercizi pratici relativi al master
Bootstrap v5.8.0 validation - AGE-814 fix + AGE-811 security
This repository contains all essentials with Azure Administrator lab demonstrating resource organization, governance, networking, security, monitoring, and operational best practices aligned with AZ-104.
fenrir-security-dashboard
Proof of concept for geospatial analysis of Garmin activity data to determine park and trail visit frequency.
Comprehensive full-stack development and engineering skill merging Perplexity Computer's dev tools with Claude Code's engineering team skills. Covers architecture, frontend, backend, fullstack, QA/testing, DevOps, security, debugging, TDD, code review, an
security-update
Proof of concept for privacy screen iOS implementation
DS719 Product Management || A strategic pitch deck and technical proof-of-concept for a sustainable food sharing ecosystem designed to eliminate food waste. This repository outlines the market analysis, business model, and the underlying logistics used to
spa-security-keycloak-demo
VDURA V5000 Web UI - Proof of Concept
Carry out SharedFlow and StateFlow exercises from the lecture as a proof of concept. • Using Shared Flow, create a search bar to get a list of names by starting with the name letter regardless of the case (Don’t use toUpperCase).
Learning Python through Ethical Hacking projects.
SecuritySim
Proof of concept for FastAPI + Cabin Redis Watcher
residency-2-miami-2026-hack-a-thon-backstreet-boys created by GitHub Classroom
proof-of-concept (POC) for the WillBot AMR simulation in C++
This is a repository for scripts related to Microsoft Defender for Office 365, Exchange server/online, and some miscellaneous security topics. Recommendations and/or improvements are cordially accepted.
VertexGuard Cyber Security Admin Dashboard . VertexGuard is a modern, high-performance cyber security administration dashboard designed for real-time threat monitoring, incident management, and system configuration. Built with a focus on UI/UX excellence,
A real-time Security Operations Center (SOC) dashboard for monitoring, tracking, and responding to security events across your infrastructure.
Cybersecurity portfolio demonstrating practical penetration testing skills including web exploitation, network assessment, privilege escalation, and security reporting.
Linux administration, hardening guides, security notes, shell scripting, and practical exercises from my certification work.
This is the github repository of the FOSS HACK 26 by team kernl
legal citation (proof of concept)
Historical BrainDrive proof-of-concept implementations documenting milestone evolution from PoC-1 to PoC-5.
EguibarIT.SecurityPS
This is a proof-of-concept to see if there is a simpler way of testing modules against Puppet Core.
windows-privesc oscp hackthebox active-directory ethical-hacking red-team cyber-security penetration-testing
This repository hosts all the practical work written by AGAN Security.
A secure, scalable cloud network architecture for a small-to-medium organization, designed for future expansion and hybrid interoperability (cloud and on-premises). The design follows least-privilege access and a layered defense-in-depth security model.
The first reference monitor for autonomous AI penetration testing agents. Mandatory enforcement, not prompt-based guardrails. Patent pending.
Repositorio dedicado al estudio y práctica de ciberseguridad, hacking ético y fundamentos de redes, documentando laboratorios, herramientas, conceptos y avances personales.
This config sets up three main optimization layers plus security headers: compression, file cache and client-side caching
Open-source web-based DAW (proof-of-concept) - Multi-track audio recorder built with Web Audio API, React, and TypeScript
A security project
This is my project using R to perform descriptive and inferential statistics in analyzing China's voting pattern in the United Nations Security Council. I answer the question of how liberal China is internationally, as well as the question of whether Chin
Design and implement a minimum viable Proof of Concept (PoC) for a reactive agent capable of: Processing a local pool of 3,900 images Extracting structured category metadata via a Vision-Language Model (VLM) Generating high-dimensional vector representat
Ultra Security Monitor wcześniej: ✔ Chronił przed malware ✔ Chronił przed ransomware ✔ Monitorował procesy Po integracji: ✔ Chroni również przed analizą metadanych ✔ Utrudnia fingerprinting ✔ Wprowadza warstwę anti-profiling
Proof-of-concept for verifying Plonky3 FRI cryptographic code using Aeneas (MIR-based, pure functional extraction) as an alternative to Hax (annotation-driven, monadic extraction).
Proof of concept exploring cross-platform UI component sharing across web and mobile using Tamagui.
Provides a free Layer 7 DDoS testing hub with botnet-powered attacks and bypasses for common protections like Cloudflare and Captcha challenges.
TON blockchain smart contract best practices skill for Claude Code — security, Tolk v1.2, TVM 12 audit guides
A proof Of Concept regarding Music, RUST, LORA, Meshtastic and RSA...
High-security web application that merges AES-256 encryption with Least Significant Bit (LSB) steganography, allowing you to conceal secret messages within standard PNG and JPG images.
Demonstration of resetting Ubuntu password via GRUB recovery mode and security implications.
Ralph Wiggum: Autonomous Development for Proof of Concepts - A method for running Claude Code in a continuous autonomous loop with fresh context windows
Secure AI development assistant built in Rust. Terminal-native coding agent with zero-trust security, WASM skills, and multi-model support.
A webserver for web hacking learn.
The definitive open-source reference for AI Trust, Risk, and Security Management (AI TRiSM). 60+ vendor profiles, market sizing, regulatory tracking, and Gartner framework analysis. Structured for machine readability and AI-system extraction.
Open-source WAF security toolkit — recon, detect, test, report. 5,500+ payloads, 25 WAF vendors, 14-check reconnaissance.
Hacked Client for ReIndev 2.9_03 with FoxLoader
An AI-native DevOps platform for solo builders, indie hackers, and tiny product teams.
No security vendors flagged this repository as malicious
ai-security-scanner
A proof of concept using XGBoost to predict text complexity from keystroke logging dynamics (pauses, bursts, and revisions). Presented at AIME 2025.
AUTARCH — Autonomous Tactical Agent for Reconnaissance, Counterintelligence, and Hacking. By darkHal Security Group & Setec Security Labs.
Military Scan - Autonomous APT Orchestration Engine. AI-driven penetration testing with Monte Carlo optimization, smart exfiltration, and 11-phase kill chain automation. Built for red teams and offensive security operations.
The complete open-source guide to selecting, deploying, and scaling solar-powered 4G LTE security cameras for B2B wholesale buyers
Browser-based AWS CloudTrail log analyzer for incident response, security audits, and cloud forensics. No server. No dependencies. Fully client-side.
Sistema de gestión de reservas hoteleras desarrollado con Spring Boot 3, Spring Security y MySQL. Arquitectura MVC y persistencia con JPA/Hibernate.
A developer gives your tool their AWS credentials. Your tool automatically connects to their AWS account using Python code, reads everything — their servers, databases, storage, security settings — and produces a complete risk report telling them exactly
Dungeon Crawler game winning 2nd place at the Hack Club Campfire Ottawa game jam
Structured penetration testing learning journey from scratch - notes, labs, and write-ups.
A repo for my TSL Proof of Concept
Generate high-quality documents with Document Generator Pro, an enterprise-grade solution designed for efficiency, security, and scalability in critical operations.
Project Umbra - Isometric Hack n slash RPG Platform (Monorepo)
A 100% offline, privacy-first AI personal assistant for summarizing notes, journals any personal files. Built for FOSS Hack 2026.
Homebrew taps for AI agent skills. Agent-agnostic. Install from any git host or npm registry, search across taps and npm with find, static and semantic security scanning before anything touches disk.
SecurityLogMonitor
Python code analysis engine built on Mathematical Contrapuntalism — security + quality dissonance detection using generating functions, Banach convergence, and path-sensitive taint analysis.
ACM Hack On the Hill 2026
CRE + ERC5564 for Convergence Hack 2026
Security-first directory of AI agent skills and MCP servers with multi-agent verification
Agentic AI runtime security — detects and interrupts prompt injection, data exfiltration, and memory contamination attacks in real-time. 733 tests, 0% FP.
🕵️♂️ Simulate phishing attacks with ngl-core-audit to test security using realistic NGL clones and capture social engineering data safely.
DePaul Demon Hacks 2026 Project
🛠️ Bypass TikTok SSL pinning on Android to intercept and analyze HTTPS traffic on rooted and non-rooted devices for security research.
🖨 Manage print jobs securely on mobile with a local print server supporting network printers and verified, memory-safe processing.
🚀 Deploy MTProxy automatically with FakeTLS support using a lightweight script for fast, secure, and simple proxy setup.
WarPanel — real-time Iran/Israel war intelligence dashboard (Oref alerts via Tailscale proxy, RSS.app OSINT ingest + webhook, AI summaries/classification, live WebSocket feed, map + media wall, health/monitoring, rate limiting & hardened security headers)
Website for Chevalier, Advanced Security.
AI-powered PR review agent with security rule engine, structured findings, and a grumpy auditor persona
Security analysis and hardening of an IoT video streaming system based on ESP32-CAMs — Bachelor thesis source code, attack scripts, and measurement data
Дипломная работа по интеграции ИИ в СУИБ
ZINO is a hackable, modular LLM agent platform.
GHR Hacks 2.0
https://portswigger.net/web-security/essential-skills/using-burp-scanner-during-manual-testing/lab-discovering-vulnerabilities-quickly-with-targeted-scanning
hardware_hacking_YOGASLEEP_ROHM_3RUS1WTBU
Irvine Hack 26
Домашнее задание к занятию «Уязвимости и атаки на информационные системы»
Tetragon dashboard + AI Defense shim for OpenClaw security
GCP IAM Explorer — natural language queries, security findings, and access visualization across your entire GCP organization
A lightweight, Falcon-backed security dashboard for aggregating and reporting multi-repository vulnerability scans.
Scan and fix vulnerabilities in Python, JavaScript, TypeScript, Go, and Java code using AI-powered analysis with 200 built-in security rules.
🔐 Secure files with post-quantum encryption using NIST-approved algorithms to protect against future quantum computer threats
🔐 1-Cybersecurity Social Engineering Main Repository - PUCSP: Academic hub for Cybersecurity & Social Engineering (PUC-SP, 2026) — labs, ethical hacking simulations, AI security practices, and applied defense strategies.
Python SDK — PII cloaking middleware for LLM calls (spaCy NER + regex + Ollama)
A lightweight, TUI-based Docker observability agent written in Go. Features real-time container metrics, native Prometheus integration, and a security auditor.
🛠 Manage personal server and home network infrastructure with templated configs, secure secrets, and automated deployment via SSH and Cloudflare Workers KV.
SaaS Security multi-agent AI system for OSCAL/SSCF assessments across Salesforce and other SaaS orgs
AI agent framework, written from scratch (not based on openclaw), focused on stripping it down to the bare necessities, optimizing token count, reducing security risks. modular so you can enable only exactly what you need. 100% coded by hand, no vibecodin
CLI toolkit for managing Meraki networks at scale — inventory, health, security audit, config backup, bulk ops
Proof of Concept: Parity Multisig Wallet Exploit (2017) - Library self-destruct vulnerability analysis
Here I will present you my HA Proof of Concept, web service is always available thanks of High Availability configuration I set. Understandable, replicable and verificated project.
Interactive XSS Security Checklist Trainer — a hands-on step-by-step guide for finding Cross-Site Scripting vulnerabilities
🤖 Automate SOC alert triage and incident response in Wazuh with OpenClaw agents and MCP for efficient security operations.
Designed and developed a multi-tenant enterprise workflow API using ASP.NET Core and Entity Framework Core featuring complex relational modeling, role-based security, SLA automation, audit logging, advanced filtering, and cloud deployment via Docker and A
BootSecurity
Smart E-Commerce System for Week 7 lab at AmaliTech NSP training programme
This application is a gamified productivity platform that converts daily habits and personal goals into RPG-style quests. Users gain XP, level up, track stats, complete challenges, and monitor progress through structured behavioral feedback loops. The sys
Controlled Runtime Security
A local organization wants to create an application that allows them to manage their employees. Here I create a proof-of-concept API using placeholder data.
ESLint for your database — CLI + SaaS dashboard
Assassin is a multi-purpose tool for Cyber Security Specialists.
Zero-downtime VPS hardening with multi-layer defense: Linux hardening, LGMA observability + VictoriaMetrics, dual IPS (CrowdSec HIPS + Suricata NIPS Fail-Closed), and proactive MITRE ATT&CK-based threat hunting. Production case study.
Advanced AI-powered coding assistant with comprehensive security testing capabilities (v3)
⭐️ Valorant Hack February 2026 | Undetected Aimbot ESP No Recoil Loot Radar | Skin Changer Protections Cheat ⭐️
Ethereum-based hybrid electoral framework combining gas-optimized smart contracts with off-chain FastAPI and MySQL infrastructure. Implements wallet authentication, RBAC, real-time vote aggregation, session timeout security, and double-vote prevention for
Just-in-time kubectl exec access for Kubernetes. Request → Approve → Exec → Expire. No permanent permissions. Ever.
Full-stack Task Management system built with Spring Boot 3, JWT Security, and PostgreSQL. Features a responsive Vanilla JavaScript dashboard and is fully containerized with Docker.
Multi-agent orchestration framework with Binding governance layer
Intro to Ethical Hacking curriculum
Home network security auditing tool by PureSecure
A curated and comprehensive collection of 500+ free TryHackMe rooms, organized into logical categories for easy navigation. Master cyber security fundamentals, penetration testing, and CTF challenges without a premium subscription. Curated and maintained
🔐 SW1ZX — Red Team | Mobile Security | GRC | Cybersecurity Profile
Open-source prompt injection attack console. Test AI security by firing categorized attacks at any endpoint.
Security Operations Analyst labs using Microsoft Sentinel and Defender XDR for threat detection, investigation, and response.
Scan your dependencies. Know your risks. Ship with confidence.
A Pythonic personal AI assistant with security-first architecture and multi-channel integration
This is a proof-of-concept / prototype for a new application architecture I'm calling "Swarm".
AWS Services Security Audit
A minimal and easily hackable OpenClaw alternative.
Cyber Security Internship -Task 2 Phishing Email Detection
MetaDefender Storage Security
Diagnostic is a proof of concept for a decentralized science platform that allows users to contribute their biometric wearable data to scientific research while also providing their physicians with the data to make more accurate diagnosis.
Bilingual (EN/ES) language school web application built with Python, Flask, and FastAPI. Features JWT-authenticated REST API, CEFR course catalogue, student enrolment, user dashboard, role-based admin access, security hardening, and auto-generated Swagger
🛡️ Automate web app pentesting with AI to find real exploits before attackers do, enhancing your app’s security proactively.
🤖 Analyze customer churn risk, assess financial exposure, and automate business decisions using an AI-driven agentic system with LangChain.
Submission for Hack London 2026
crud-users-security
The complete AI agent governance stack — security, trust, runtime control, and reliability in one install. pip install ai-agent-governance[full]. Works with LangChain, CrewAI, AutoGen.
A Fallout-inspired terminal hacking minigame built with vanilla JS
Encrypted environment variable injection via a committed .kredsfile
This repository contains 11 real-world Azure enterprise scenarios with complete architecture, security, governance, networking, DevOps, and cost‑optimization examples.
Buy licensed software tools, certified ethical hacking services, and cybersecurity solutions. Fast delivery & support available.
regis-cli is a command-line tool designed to analyze container image registries, evaluate security playbooks, and generate comprehensive reports. It provides deep visibility into container image metadata and security posture, enabling automated policy enf
Security research scripts and vulnerability patch references for Zombie Rush (Roblox), shared for educational purposes
Application Security Review UI
Hacks for Blooket
mi foro bombeta
ToolsHacking
A personal autonomous AI Agent in the style of OpenClaw designed for one single user for personal life management with easy to sync solution and built-in security
Enhanced documentation proof of concept
Continuous security scanning of AI agent skill registries. The Mozilla Observatory for AI agents.
Independent AI Oversight Layer — monitors what AI agents do on your computer. EDR for AI Agents.
Zero-knowledge secrets infrastructure built for AI agents to operate, not just consume.
Self-hosted Node.js cron job scheduler with browser dashboard and IP-based security, deployable on Workers
Identified an internal host generating periodic outbound encrypted connections consistent with automated beaconing behavior, demonstrating a practical workflow for Tier-1 SOC investigation and network anomaly detection.
WordPress Full Stack Hardening Benchmark — prescriptive security configuration guidance for WordPress 6.x on LEMP/LAMP.
🛡️ The only security solution AI agents need
Infrastructure Architect & Senior Systems Engineer | Specializing in Cloud Security, AI Automation, and Enterprise Infrastructure Strategy
A production-ready, reusable authentication and authorization system built with NestJS. Features role-based access control (RBAC), email verification, JWT authentication, and comprehensive security measures.
RAW video filmmaking with hacked cameras and open hardware. Magic Lantern 5D Mark III, AXIOM, agent-driven post-production.
My cybersecurity and pentesting portfolio: hands‑on labs, CTF writeups, tools, scripts, and structured notes documenting skill development across security fundamentals and offensive techniques.
Supply chain security for Claude Code — sandbox sessions, attest every action, verify provenance
A ruthless pentesting tool that strikes deep into networks, systems, and applications to uncover hidden vulnerabilities. Lightweight, fast, and precise Fang gives ethical hackers the edge to dominate security testing.
A proof-of-concept that connects front-end user behaviour data to an AI-powered automation pipeline
A dynamic, data-driven web application that leverages the core back-end technologies (Node.js, Express.js, and MongoDB). Design and implement a functioning back-end using routes, connect to a database, and render user-facing pages dynamically with authent
NetDAG is driven by the vision of bringing blockchain technology to the mainstream. As an advanced Layer 2 blockchain solution, NetDAG leverages cutting-edge algorithms to deliver industry-leading transaction speeds, zero transaction fees, and enterprise-
Enterprise Branch Network simulation using Cisco CML and Ubuntu Linux for DHCP, OSPF routing, and ACL security.
Security-Glass
in version 5 i have done some security changes
Jamf's open source mcp for Jamf Pro, Jamf Protect and Jamf Security
Spring 2026 Infrastructure Security Group Project
GitHub Action to lint TLS configurations for security anti-patterns across Go, Python, Node.js/TypeScript, C++, and Java projects
AI agent red team platform — MCP server security scanning, traffic interception, tool poisoning, and agent-chain exploitation. Maps to OWASP MCP Top 10.
Modern Java Backend for Personal Finance Management. Powered by Spring Boot 3, MySQL, Redis, and Docker. Engineered for scalability, security, and high availability.
Cyber_security
A secure, role-based web application for managing personal and professional contacts. Built with Spring Boot and Spring Security.
One chart to rule them all !
🚀 Deploy and manage VM templates and infrastructure on a Proxmox cluster using this efficient Terraform framework.
Pre-transaction security layer for Arbitrum DeFi
MCP server for Rapid7 InsightIDR — SIEM log search, investigations, alerts, UBA, and threat intelligence
MCP server for Sophos Central — endpoint management, EDR/XDR detections, alerts, Live Discover queries, and security policies
Terraform module for FIPS-enabled Rocky Linux 9 EC2 instances on AWS
terraform-google-network-security-auth-extension
ESLint for AI Agents — AGENTS.md/CLAUDE.md 채점·진단·자동수정 | Position Risk Warning · Token Efficiency · Security Check
cyber_security_notes
Secure personal AI assistant with encrypted memory, multi-provider LLM routing, and privacy-first design. Inspired by OpenClaw.
Notas de los retos resueltos en la clase de seguridad en redes y sistemas de software
Turn any repo into a governed AI workspace. Quality gates, security scanning, and risk management — enforced locally via git hooks. Works with Claude Code, GitHub Copilot, Cursor, Gemini & Codex.
security-engineering
AI Agent proof of concept
Documentation for Security Onion
Security-first task queue for OpenClaw. Deploy on cloud (remote access) or Docker local (low latency). Same Worker architecture, your choice.
Mog : TikTok for Agents or Agent Content Testing | CrossChain Hack '26
Hacks for TablacusExplorer
Saterix: AI Security Agent for Rural India (AWS Hackathon Submission)
This repository contains the material for educational hands-on sessions about the secure development of applications on the SAP Business Technology Platform.
Assigment and Project code implementations for the EITN41 Web Security Course - Lund University.
API_checkAuto_security16
Entry-Level GRC Portfolio | Risk, Compliance, and Security Documentation
Terraform framework for deploying VM templates and infrastructure to a Proxmox cluster.
My learning journey of web security labs from PortSwigger Web Security Academy
A Twitter-inspired social media platform built with the MERN stack using full TypeScript, TanStack Query, and shadcn/ui. Focused on backend security, scalable architecture, and modern frontend patterns to simulate real-world production systems.
🛡️ Professional cybersecurity testing platform with 165+ verified security tools
Proofs that Finite Automaton and other concepts learned in theory of computation work in real world by compiling them correctly
Intelligence Adjacent (IA) Framework - Build AI systems that work alongside human intelligence. Modular skills for security, career development, compliance, and more. AI-first installation: just ask Claude.
A curated list of Web3 Security materials and resources for Pentesters and Bug Hunters.
macOS menu bar app to bypass VPN for specific domains and services
"A secure digital fortress platform for Malaysian scam victims. Built with Astro & Tailwind."
Self‑hosted web player, built with TypeScript, HTML and CSS. Fully compatible with Navidrome and the Subsonic API.
Sentinel is a unified mini security operations platform that monitors system activity and scores financial transactions for risk
The industry standard for Provenance & Intent Contracts (PIC) in Agentic AI. Bridging the Causal Gap in autonomous systems.
Course projects and exercises from 'Spring Boot 3, Spring 7 & Hibernate for Beginners' by Chad Darby. Covering REST APIs, Security, MVC, and Data JPA.
CyberFriday — a personal knowledge base of security writeups, labs, notes, and projects focused on hands-on learning.
Repository used to store Offensive Security resources.
Tensorflow/OpenCV Computer Vision CNN that predicts hand-drawn digits (proof of concept)
Proof of Concept For Purchasing Music Instruments
Beginners in Ethical hacking can use this Nmap scanning codes to scan ports , ip address , and devices using safe websites like HACK THE BOX ACADEMY🧑‍💻 and also TRY HACK ME for scanning on other devices
A collection of write-ups and solutions for Hack The Box challenges.
OSINTgram Lite is a Python-based OSINT tool for collecting and analyzing publicly available Instagram profile information via an interactive CLI. Built for Kali Linux, it is intended for educational use, ethical hacking practice, and lawful open-source in
Controlled Runtime Security
# Cybersecurity Labs & Writeups This repo contains my detailed lab reports from PortSwigger, TryHackMe, and Hack The Box, showcasing vulnerability analysis and exploitation reasoning.
Enhance Windows security with this Powershell-based framework! Audit & remediate against CIS, NIST, DISA STIG, NSA, CISA, ENISA, ISO 27001, & Core baselines. Features 500+ checks, interactive & automated remediation, and detailed reporting (HTML/JSON/CSV/
api-security-gateway
A collection of Python scripts 🐍 for work tasks 💼, experiments 🔬, and skill demonstrations 🏆, including utilities ⚙️, tests ✅, and proof-of-concept projects 💡.
Advanced cybersecurity framework combining offensive (WiFi radar, auto-exploit, DNS enum, password cracker) and defensive (MITM detection, SSL audit, packet sniffer) capabilities with encrypted vault and P2P messaging. Accelerated with C++ (6-10x faster)
special project for ambassadors program - teaches about web vulnerabilities through a "hackable" website
Yet Another Security web version
HELEXIA-UFV-SECURITY-MONITORING-V2
A curated toolkit for Open-Source Intelligence (OSINT) investigations. This repository contains a collection of scripts, resources, and methodologies to aid in gathering and analyzing publicly available information. Designed for security researchers, jour
Falcn is an open-source supply chain security tool that detects typosquatting and malicious packages across npm, PyPI, Go, and more. Like a falcon with exceptional vision, it spots threats that others miss — in under 60 milliseconds. Integrate it into you
intelligent auditing tool powered by large language models, supporting GPT, . It automatically detects security vulnerabilities, performance issues
🚀 Manage your infrastructure effortlessly with AI-powered DevOps agents for real-time updates, security, and multi-service intelligence.
Bot that automates farming and clicker activities in GasHero finance game. Includes crypto and blockchain integration with features for hacks and cheats to optimize profit and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Wild Forest game. Includes crypto token integration and API support. Features cheats and hacks to maximize profit and enhance gameplay efficiency. Managed via Telegram for effective game management.
Bot that automates farming and clicker activities in The Sandbox game. Includes crypto token integration and API support. Features hacks and cheats to maximize profit and enhance gameplay efficiency. Managed via Telegram for optimal control.
Bot that automates farming and clicker activities in Pixels.xyz game. Includes crypto integration and API support. Features hacks and cheats designed to maximize profits and improve gameplay efficiency.
Bot that automates farming and clicker activities in Cyber Finance game. Features include crypto integration with CFI, Telegram support for management, and hacks and cheats to maximize profit. Designed for efficient gameplay and profit optimization.
Bot that automates farming and clicker activities in Aavegotchi game. Features include crypto integration and API support. Equipped with cheats and hacks to optimize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Brilliant Crypto game. Features include crypto token integration and API support. Designed with cheats and hacks to optimize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Tomarket game. Features include crypto integration, Telegram support, and API tools. Equipped with cheats and hacks to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Apeiron NFT game. Features include crypto integration and API support. Includes cheats and hacks to optimize profits and improve gameplay efficiency.
Bot that automates trading and clicker activities in Dogs House game. Includes crypto exchange integration and Telegram support for management. Features hacks and cheats to enhance trading efficiency and maximize profits.
Bot that automates farming and clicker activities in Parallel Life game. Features include crypto energy integration and API support. Designed with hacks and cheats to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Rocky Rabbit game. Features include crypto integration and Telegram support. Equipped with API tools, hacks, and cheats to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in PiggyPiggy game. Features include crypto integration and API support. Equipped with hacks and cheats to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Chainmonsters game. Features include crypto token integration and API support. Equipped with cheats and hacks to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Xborg game. Includes crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Chibi Clash game. Features include crypto token integration and API support. Designed with cheats and hacks to optimize profits and enhance gameplay efficiency.
Bot that automates farming and clicker activities in Splinterlands game. Includes crypto token integration and API support. Features cheats and hacks to optimize profits and enhance gameplay efficiency. Managed via Telegram for convenient control.
🔍 Analyze Flutter APKs to extract sensitive environment variables and enhance your application's security with ease.
🤖 Streamline your tasks with Universal Bot, an AI-driven Telegram bot for math, media, and chat processing, integrating seamlessly with social platforms.
🔍 Scan .NET applications for vulnerabilities in NuGet dependencies, ensuring secure and reliable software with this professional-grade security tool.
🔒 Run AI agents securely with filesystem, privilege, and network isolation using llm-rustyolo, ensuring a safe and controlled environment.
🧠 Build an AI-based face recognition access control system with MaixFace, offering modular design and IoT automation for enhanced security solutions.
"Mail.NET": proof-of-concept email client with vector embeddings, semantic search, and LLM connectivity
Added complete source code with real-time IP camera integration, YOLO-based license plate detection, Tesseract OCR, database authentication, and access control logic. Code is modular and structured for implementation of automated Smart Vehicle Access & Re
A production-ready template demonstrating user management, dashboard analytics, and security features with integration to microservices backend.
🔍 Monitor and debug HTTP/S traffic with Charles Web Debugging Proxy, a vital tool for developers to optimize web application performance.
🤖 Build intelligent dialogue systems with Sentra Agent, an all-in-one AI framework for real-world applications, featuring multi-stage decision-making and extensive tool support.
🔍 Audit IKE VPN servers with IKESS to detect vulnerabilities and generate detailed reports for improved security and risk assessment.
🛡️ Obfuscate function calls in Windows using Vectored Exception Handlers for enhanced security and control flow without traditional jumps or memory allocation.
slowloris
whitepaper
🌐 Simplify S3 data management with s3-t1w, a tool for efficient file uploads and downloads, enhancing your cloud storage workflow.
🔒 Protect secrets with Flatline, a constant-time C toolbox that eliminates side-channel risks using branchless operations and zero dependencies.
🔍 Explore and implement secure provenance tracking with this template, ensuring project integrity and compliance throughout your development lifecycle.
🌟 Demonstrate core JavaScript functionality with this simple project, ideal for learning and enhancing your coding skills.
A privacy and security minded wedding website.
🩺⚡ Runtime Doctrine ORM analysis integrated into Symfony Web Profiler. Detect N+1 queries, security vulnerabilities, and performance issues during query execution.
CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehens
Scan, log, and exploit WiFi, Bluetooth, BLE, and NFC signals with RF CHAOS, the powerful Android toolkit for mobile hacking and signal analysis.
A collection of smart contract security audits, findings, and proofs-of-concept demonstrating vulnerabilities, mitigations, and best practices across multiple blockchain platforms.
Automated CVE tracking and security intelligence aggregation tool with exploit maturity tracking and breaking news monitoring
🏢 Build a scalable, maintainable Next.js application architecture using Nx and Vitest for performance, security, and testing excellence across teams.
CNS-SOWA-SECURITY
🛠️ Master 106 real DevOps interview questions with step-by-step solutions in Kubernetes, Docker, Linux, CI/CD, Git, Networking, and Security.
AI middleware tool that adds intelligence into prompt optimization, model optimization, and security
Independent study project based on the intersection between Knowledge Graphs and Cyber Security.
Free Real-time Tesla sentry security alerts via Telegram
Security Operation Center (SOC) attack detection and response
A Proof of Concept LLM based on Phi-2 and trained on popular public data sets.
This Arduino sketch transforms an ESP32-CAM into a versatile, Wi-Fi-enabled security and monitoring device controlled entirely through a Telegram bot. It captures and sends images upon motion detection or user request, provides real-time temperature and h
🔒 Build a production-ready zero trust network lab to explore key concepts like micro-segmentation, SDP, and continuous verification for security education.
POC met zelfgekozen frontend- en backend frameworks. Ik heb gekozen voor React en Nest.js
Prácticas de Laboratorio y Proyectos en Iron Hack - alumno: Juan Alberto Peñalver Alvarez
security_project_be
Adaptive Prompt Security Framework
WiFi Geo Mapping is a Python proof-of-concept that captures Wi-Fi Probe Requests, extracts SSIDs, and visualises them on real maps. Built with tcpdump and modular design, it demonstrates how SSIDs can link to locations while emphasising privacy: all tests
Core de NovaSuite : Agents d'intelligence Artificielle de Pentesting (Hacking Éthique) pour l'automatisation des audits de sécurité et le Bouclier Proactif
better personal repo with hacks for portfolio
A curated directory of company trust centers and compliance documentation. Easily discover security, privacy, and compliance information from trusted organizations. Built with Next.js and open to community contributions.
FPGA for beginners
Continuation of my VR "Martial Arts input" game. (Post University) Project takes the players hands' positions and uses them as inputs depending on what pose they make, akin to the Wii remotes but significantly more precise. I'm creating an Avatar game as
🚀 Manage and access AI-native NPM packages with AgentRegistry, offering high test coverage and seamless Bun compatibility for efficient workflows.
VulnScanner is a lightweight, open-source tool for scanning web applications, networks, and local systems for security vulnerabilities. It features automated detection, extensible plugins, and clear reports to help users identify and address potential ris
This ToolKit Is Designed By Athex For Cyber Security Experts . This Toolkit contain 3000+ Tool which Need Of Every Hacker.
Self hosted ScramJet based proxy server for evading internet censorship using a proof of concept port changing system to constantly remain in an unblocked state, written in JavaScript.
Izumi is a discord bot which manages the server by providing a variety of slash commands that players can use to toggle settings and players. It is mainly for security purposes.
agent-scripts
Enterprise-grade sudoers policy framework for HOMESERVER digital sovereignty platform. Implements principle of least privilege with granular access control for web-based system administration. Provides secure, auditable privilege escalation for infrastruc
Web application to audit AWS environment security and facilitate compliance with regulations like PCI DSS.
An API-Gateway focused on Security and a leightweight approach
A retired proof-of-concept REST API that let a CustomGPT query Odoo ERP data using natural language, with Claude translating questions into Odoo domain filters.
🤖 Transform your Zalo account into a smart AI assistant with 178 actions, image support, group chat, and more using zalo-personal.
🤖 Build AI workflows quickly using pre-made skill chains to avoid starting from scratch and streamline development.
CTF write-ups, solutions, and scripts for learning ethical hacking.
A personal hacking lab by Faez, featuring OSINT tools, steganography demos, CTF writeups, and cybersecurity experiments. Built for learning, sharing, and community contribution.
Post-Quantum Cryptography Proofs of Concept
Simple demonstration of dual stream architecture. Focused on showing overhead associated with constraint and telemetry of dual twin interactions.
This Spring Boot Book Management API provides a secure and efficient backend solution, leveraging JWT for robust authorization via Spring Security, and enabling flexible data retrieval through integrated pagination and sorting capabilities.
🔍 Explore and analyze binary files with ImHex, a powerful hex editor designed for reverse engineers and programmers who work late into the night.
🛠️ Activate and manage your Windows system effortlessly with Microsoft Windows Activator 2025, ensuring genuine performance and security for all versions.
fortigate-dashboard - Python automation and development tool.
Matter Security
🚀 Production-ready portfolio & technical blog built on Astro 5, TypeScript, and Bun. A reference Docker-first architecture featuring hybrid SSR/SSG rendering, advanced i18n, strict security, and stateless Telegram API integrations.
Why Are Smart Home Security Systems Booming in 2030? A Deep Dive into Market Trends, Innovations, and Challenges
rhoai-hacking
Ravin Kumar: A curious person blessed to see life through the perspectives of an artist 🎨, engineer 🎓, researcher 🤖, inventor ⚙️, economist 📈, poet 📝, ethical hacker 👾 , mathematician 🎲, game developer 🎮, author 📘, writer ✍️, traveler ❄️🌿🌵🌊🪁⛰️⛵🏝️ || Autho
A Proof-Of-Concept MCP Server for the Mollie payments API
Open Source ESP32 Project for Pentesting.
Security scanner for projects / domain / network
🔒 Build a secure Cybersecurity Homelab with virtualization, network security, and file sharing using Proxmox VE, Arch Linux, and Docker.
A curated collection of Pentesting notes, methodologies, and tools. Covering reconnaissance, web application attacks, network exploitation, and vulnerability assessments. Continuously updated with practical techniques and cheat sheets for ethical hacki
[Proof of Concept] - Engaging Networks standalone component that creates a customizable One-Click Donation UX on "Thank You" pages
Unified TypeScript interface for multiple web archive platforms.
One-command installer & manager for AmneziaWG 2.0 VPN on Ubuntu 24.04 LTS — traffic obfuscation, auto-hardening, client management
Hacker News
A swiss army knife for CLI operations catered to devs and security professionals.
Построение кривых обеспеченности по гидрометеорологическим данным
🔒 Provide secure, extensible login and authentication for Bukkit servers with hashed passwords, session tracking, bot protection, and multi-database support.
A text-based proof of concept for a game about fostering relationships within your questing party!
This Project demonstrate the deployment of a multi-tier application using Docker Compose, including configuring public IP addresses and setting up necessary security group rules for accessing the frontend, API, and database services.
tinyAgent uniquely treats functions as first-class citizens, easily transforming them into powerful AI tools. Inspired by human organizational structures, it dynamically orchestrates specialized agents, balancing security and capability for complex tasks.
Security scanner for AI/ML model files. Detects malicious code, backdoors, and vulnerabilities before deployment
🔍 Enhance online privacy with Tor-shipt, a project designed to improve your browsing security using the Tor network. Explore the possibilities today.
This project demonstrates practical cybersecurity skills in identifying, analysing and remediating security vulnerabilities across network infrastructure using Nessus Essentials, one of the industry's leading vulnerability assessment tools. It includes sc
Proof of concept go wttr client
Digital security guides for activists and organizers - https://activistchecklist.org
A proof-of-concept for how the SLSA Source Track could be implemented.
Offensive Security Notes
Security Interest Group
A robust and flexible data sanitization component for PHP, part of the KaririCode Framework, utilizing configurable processors and native functions
🔍 Detect real-time anomalies and fraud in streaming transaction data with SlipStream, an enterprise-grade Kafka-based solution for financial security.
Sistema de votação hack 2024
A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search queries.
Public sync with private azure-security-docs-pr repo
A proof of concept daisy-chaining Nextflow workflows
A set of hacking related features
A hackable markdown, Typst, latex, html(inline) & Asciidoc previewer for Neovim
Proof of Concept Inventory Management Tool
🔍 Scan MCP config files to detect hardcoded secrets, leaked API keys, and security misconfigurations for safer AI setups.
Proof of concept application responsible for managing EVE Online Data.
BlockForge is a minimal educational blockchain implementation written in Python. It demonstrates core blockchain concepts such as proof-of-work, transaction hashing, block validation, and chain integrity verification. Designed for developers who want to u
👁️ Build real-time AI vision assistants with LLM-EYES, enabling AI to interpret and respond to video content during calls using WebRTC technology.
🔒 Provides an open-source security framework to recover sensitive data from browsers and systems for education and red-team use.
XNU Image Fuzzer - iOS App for Fuzzing Images with Objective-C Code covering 12 CGCreateBitmap & CGColorSpace Functions working with Raw Data and String Injection.
🐛 UCLA ACM Cyber's Fuzzing Lab
⚙️ Set up the Zig toolchain to cross-compile C, C++, Rust, Go, and Zig projects with a focus on security, performance, and ease of use.
Repository to hack things around in the openshift-pipelines organization
Easily implement usual security measures in React Native Expo apps. Made by BAM ❤️💙💛
This project provides security for user authentication and authorization systems, so ensure that it follows best practices and use secure communication protocols (e.g., HTTPS) to protect sensitive information.
The unified documentation experience for developers hacking on Fyra Labs projects.
Reverse Shell indetectable para Windows 10
🚦 Limit API requests to protect your service from abuse and ensure fair usage with this effective middleware component.
Proof of concept repo 1
🔐 Implement the Playfair cipher in Python to learn classical digraph encryption and matrix-based substitution techniques clearly and simply.
Repo with a proof of concept of Groovy parser
Hello! Am sharing most of the important powershell tasks that i have been did in my school am gonna publishing more about security auditing powershell tasks especially for AD environment security.
A collection of small MVP/proof-of-concept sites made for school projects.
Proof of Concept for GCSD
openapi-oathkeeper is a CLI for generating Ory Oathkeeper rules from an OpenAPI 3 contract and save a lot of time and effort, especially for larger projects with many endpoints or many services.
The system uses an IP camera for taking inputs. Whenever a weapon is detected, the system alerts the security instantly and prevents any big accident from happening.
🦊 Hide local sellers on Temu to view only products directly shipped by Temu for a cleaner shopping experience.
Python scripts that build optimal routes for node collection
This repository contains a simple geolocation api microservice, fast, reliable, Kubernetes friendly and ready written in go as a proof of concept.
Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration
🔒 Encrypt directories and files with AES-256-GCM using chunked streaming, compression, and optional output splitting for efficient secure storage.
Hack of PEX Python but for Embedded Python
Securing your rest API with Spring Security
🎮 Play a BanG Dream!-themed Klotski puzzle with drag-and-drop moves, smart hints, and mobile touch support on a classic 4x5 board.
🧪 Proof of Concept for a RESTful Web Service made with JDK 25 (LTS) and Spring Boot 4
Yet Another Link Repo. Mainly Security Links
This is the root. Different projects based on technology and proof of concepts will be created under this root
My Ongoing Technical and Hacker Journey
Simple shell escape library for JavaScript
Quantum-resistant, multi-currency decentralized EVM wallet. Create and interact with decentralized applications across multiple blockchains with industry-leading security powered by advanced cryptographic primitives.
A proof of concept project to create a pure functional stack for java microservices
Spring Cloud微服务DevOps云服务管理框架,其中包含后台管理+服务接口+门户首页,涉及到SpringBoot、Spring Cloud、Spring Security、mybatis、vue、html、javascript等技术。 框架中包含了服务器域名管理、微信公众号管理、短信管理、工作流管理、自定义表单等服务。
Proof of concept for Starship rewrite
Brute force tool for SSH, IMAP, HTTP, FTP, POP3 and others
A Proof of Concept implementation for the storage of Patient Health Records in their native format.
Asherah is a multi-language, cross-platform application encryption SDK
Check Point CloudGuard Network Security repository containing solution templates, Terraform templates, tools and scripts for deploying and configuring CloudGuard Network Security products.
Suomenkielinen Infom 7 -tyyppinen kieli tekstiseikkailujen luomiseen / Proof-of-concept Finnish programming language inspired by Inform 7
A Vault swiss-army knife: A CLI tool to init, unseal and configure Vault (auth methods, secret engines).
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such a
This repo contains a proof of concept bi-directional LSTM text classifier written in TensorFlow
Ultralight, security-first service mesh for Kubernetes. Main repo for Linkerd 2.x.
Vulnogram is a tool for creating Security Advisories and CVE ID information.
🔌 Fetch port information easily with this lightweight Python tool, accessing IANA's official dataset for service names, protocols, and descriptions.
The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™
Ansible role to apply a security baseline. Systemd edition.
Vulnerable Classified Ads WebApp for Webapp Security Training
This is the official mirror of git://git.postgresql.org/git/pgpool2.git. Note that this is just a *mirror* - we don't work with pull requests on github. Please subscribe to pgpool-hackers mailing list from our website and submit your patch to this mailing
proof of concept for a circular html5 audio player, using svg and plain javascript
Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.
trying to be a robust, user-friendly and hackable music player
Web Application Security Working Group repo
A p2p, secure file storage, social network and application protocol
CVE-2026-21628 -- A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.
CVE-2026-22052 -- ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure vulnerability. Successful exploit could allow an authenticated attacker to view a listing of the contents in a directory for which they lack permission.
CVE-2026-26033 -- UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Unquoted Search Path or Element (CWE-428) vulnerability, which allows a user with write access to a directory on the system drive to execute arbitrary code with SYSTEM privileges
CVE-2026-26034 -- UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Incorrect Default Permissions (CWE-276) vulnerability that allows an attacker to execute arbitrary code with SYSTEM privileges by causing the application to load a specially craf
CVE-2026-2743 -- Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before
CVE-2026-27982 -- An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.
CVE-2026-2833 -- An HTTP request smuggling vulnerability (CWE-444) was found in Pingora's handling of HTTP/1.1 connection upgrades. The issue occurs when a Pingora proxy reads a request containing an Upgrade header, causing the proxy to pass through the rest of the bytes
CVE-2026-2835 -- An HTTP Request Smuggling vulnerability (CWE-444) has been found in Pingora's parsing of HTTP/1.0 and Transfer-Encoding requests. The issue occurs due to improperly allowing HTTP/1.0 request bodies to be close-delimited and incorrect handling of multiple
CVE-2026-2836 -- A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factor
CVE-2026-29052 -- The Calendar module for HumHub enables users to create one-time or recurring events, manage attendee invitations, and efficiently track all scheduled activities. Prior to version 1.8.11, a Stored Cross-Site Scripting (XSS) vulnerability in the Event Types
CVE-2026-29121 -- International Data Casting (IDC) SFX2100 satellite receiver comes with the `/sbin/ip` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the G
CVE-2026-29122 -- International Data Casting (IDC) SFX2100 satellite receiver comes with the `/bin/date` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the
CVE-2026-29123 -- A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data Casting (IDC) SFX2100 on Linux allows a local actor to potentially preform local privilege escalation depending on conditions of the system via execution of the affected SUID b
CVE-2026-29124 -- Multiple SUID root-owned binaries are found in /home/monitor/terminal, /home/monitor/kore-terminal, /home/monitor/IDE-DPack/terminal-dpack, and /home/monitor/IDE-DPack/terminal-dpack2 in International Data Casting (IDC) SFX2100 Satellite Receiver, which m
CVE-2026-29125 -- IDC SFX2100 Satalite Recievers set the `/etc/resolv.conf` file to be world-writable by any local user, allowing DNS resolver tampering that can redirect network communications, facilitate man-in-the-middle attacks, and cause denial of service.
CVE-2026-29126 -- Incorrect permission assignment (world-writable file) in /etc/udhcpc/default.script in International Data Casting (IDC) SFX2100 Satellite Receiver allows a local unprivileged attacker to potentially execute arbitrary commands with root privileges (local p
CVE-2026-29127 -- The IDC SFX2100 Satellite Receiver sets overly permissive file system permissions on the monitor user's home directory. The directory is configured with permissions 0777, granting read, write, and execute access to all local users on the system, which may
CVE-2026-29128 -- IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf,
CVE-2026-30777 -- EC-CUBE provided by EC-CUBE CO.,LTD. contains a multi-factor authentication (MFA) bypass vulnerability. An attacker who has obtained a valid administrator ID and password may be able to bypass two-factor authentication and gain unauthorized access to the
CVE-2026-3236 -- In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token.
CVE-2019-25498 -- Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with mal
CVE-2019-25499 -- Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. Attackers can send POST requests to get_job_applications_ajax.php with malic
CVE-2019-25500 -- Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the employerid parameter. Attackers can send POST requests to the register-recruiters endpoint wit
CVE-2019-25501 -- Simple Job Script contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the app_id parameter. Attackers can send POST requests to delete_application_ajax.php with crafted paylo
CVE-2019-25502 -- Simple Job Script contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the job_type_value parameter in the jobs endpoint. Attackers can craft requests with SVG payload injection to
CVE-2019-25503 -- PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bannerID parameter in click.php3. Attackers can submit crafted bannerID values using SQL comm
CVE-2019-25504 -- NCrypted Jobgator contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the experience parameter. Attackers can send POST requests to the agents Find-Jobs endpoint with m
CVE-2019-25505 -- Tradebox 5.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the symbol parameter. Attackers can send POST requests to the monthly_deposit endpoint with malicious sym
CVE-2019-25506 -- FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable passwo
CVE-2019-25507 -- Ashop Shopping Cart Software contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'shop' parameter. Attackers can send GET requests to index.php with malicious 'shop
CVE-2025-15558 -- Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-b
CVE-2025-40894 -- A Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality due to improper validation on an input parameter.
CVE-2025-40895 -- A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties.
CVE-2025-40896 -- The server certificate was not verified when an Arc agent connected to a Guardian or CMC.
CVE-2025-59783 -- API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection.
CVE-2025-59784 -- 2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation.
CVE-2025-59785 -- Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption.
CVE-2025-59786 -- 2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.
CVE-2025-59787 -- 2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.
CVE-2025-66024 -- The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injecte
CVE-2026-2297 -- The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire.
CVE-2026-24732 -- Files or Directories Accessible to External Parties, Incorrect Permission Assignment for Critical Resource vulnerability in Hallo Welt! GmbH BlueSpice (Extension:NSFileRepo modules) allows Accessing Functionality Not Properly Constrained by ACLs, Bypassin
CVE-2026-25750 -- Langchain Helm Charts are Helm charts for deploying Langchain applications on Kubernetes. Prior to langchain-ai/helm version 0.12.71, a URL parameter injection vulnerability existed in LangSmith Studio that could allow unauthorized access to user accounts
CVE-2026-26002 -- Open OnDemand is an open-source high-performance computing portal. The Files application in OnDemand versions prior to 4.0.9 and 4.1.3 is susceptible to malicious input when navigating to a directory. This has been patched in versions 4.0.9 and 4.1.3. Ve
CVE-2026-27441 -- SEPPmail Secure Email Gateway before version 15.0.1 insufficiently neutralizes the PDF encryption password, allowing OS command execution.
CVE-2026-27442 -- The GINA web interface in SEPPmail Secure Email Gateway before version 15.0.1 does not properly check attachment filenames in GINA-encrypted emails, allowing an attacker to access files on the gateway.
CVE-2026-27443 -- SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers.
CVE-2026-27444 -- SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an attacker to fake the source of the email or decrypt it.
CVE-2026-27445 -- SEPPmail Secure Email Gateway before version 15.0.1 does not properly verify that a PGP signature was generated by the expected key, allowing signature spoofing.
CVE-2026-27446 -- Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to a
CVE-2026-2746 -- SEPPmail Secure Email Gateway before version 15.0.1 does not properly communicate PGP signature verification results, leaving users unable to detect forged emails.
CVE-2026-2747 -- SEPPmail Secure Email Gateway before version 15.0.1 decrypts inline PGP messages without isolating them from surrounding unencrypted content, allowing exposure of sensitive information to an unauthorized actor.
CVE-2026-2748 -- SEPPmail Secure Email Gateway before version 15.0.1 improperly validates S/MIME certificates issued for email addresses containing whitespaces, allowing signature spoofing.
CVE-2026-27801 -- Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access t
CVE-2026-28427 -- OpenDeck is Linux software for your Elgato Stream Deck. Prior to 2.8.1, the service listening on port 57118 serves static files for installed plugins but does not properly sanitize path components. By including ../ sequences in the request path, an attack
CVE-2026-28695 -- Craft is a content management system (CMS). There is an authenticated admin RCE in Craft CMS 5.8.21 via Server-Side Template Injection using the create() Twig function combined with a Symfony Process gadget chain. The create() Twig function exposes Craft:
CVE-2026-28696 -- Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the GraphQL directive @parseRefs, intended to parse internal reference tags (e.g., {user:1:email}), can be abused by both authenticated users and unauthenticated guests (
CVE-2026-28697 -- Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g., Email
CVE-2026-28769 -- A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file`
CVE-2026-28770 -- Improper neutralization of special elements in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management Interface version 101 allows for XML Injection. The application re
CVE-2026-28771 -- A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /index.cgi endpoint of International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface version 101. The application fails to adequately sanitiz
CVE-2026-28772 -- A Reflected Cross-Site Scripting (XSS) vulnerability in the /IDC_Logging/index.cgi endpoint of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 allows a remote attacker to execute arbi
CVE-2026-28773 -- The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses
CVE-2026-28773 -- The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parse
CVE-2026-28774 -- An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject ar
CVE-2026-28775 -- An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with re
CVE-2026-28776 -- International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver contains hardcoded credentials for the `monitor` account. A remote unauthenticated attacker can use these trivial, undocumented credentials to access the system via SSH. Wh
CVE-2026-28777 -- International Datacasting Corporation (IDC)
CVE-2026-28778 -- International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver contains undocumented, hardcoded/insecure credentials for the `xd` user account. A remote unauthenticated attacker can log in via FTP using these credentials. Because the
CVE-2026-28781 -- Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the entry creation process allows for Mass Assignment of the authorId attribute. A user with "Create Entries" permission can inject the authorIds[] (or authorId) paramete
CVE-2026-28782 -- Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-beta.1, the "Duplicate" entry action does not properly verify if the user has permission to perform this action on the specific target elements. Even with only "View Entries" per
CVE-2026-28783 -- Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-beta.1, Craft CMS implements a blocklist to prevent potentially dangerous PHP functions from being called via Twig non-Closure arrow functions. In order to be able to successfull
CVE-2026-28784 -- Craft is a content management system (CMS). Prior to 5.8.22 and 4.16.18, it is possible to craft a malicious payload using the Twig map filter in text fields that accept Twig input under Settings in the Craft control panel or using the System Messages uti
CVE-2026-29000 -- pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA publi
CVE-2026-29069 -- Craft is a content management system (CMS). Prior to 5.9.0-beta.2 and 4.17.0-beta.2, the actionSendActivationEmail() endpoint is accessible to unauthenticated users and does not require a permission check for pending users. An attacker with no prior acces
CVE-2026-29119 -- International Datacasting Corporation (IDC) SFX Series SuperFlex(SFX2100) SatelliteReceiver contains hardcoded and insecure credentials for the `admin` account. A remote unauthenticated attacker can use these undocumented credentials to access the satelli
CVE-2026-29120 -- The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and suscep
CVE-2026-2994 -- Concrete CMS below version 9.4.8 is subject to CSRF by a Rogue Administrator using the Anti-Spam Allowlist Group Configuration via group_id parameter which can leads to a security bypass since changes are saved prior to checking the CSRF token. The Concre
CVE-2026-3103 -- A logic error in the remove_password() function in Checkmk GmbH's Checkmk versions <2.4.0p23, <2.3.0p43, and 2.2.0 (EOL) allows a low-privileged user to cause data loss.
CVE-2026-3125 -- A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.The @opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handle
CVE-2026-3240 -- In Concrete CMS below version 9.4.8, a user with permission to edit a page with element Legacy form can perform a stored XSS attack towards high-privilege accounts via the Question field. The Concrete CMS security team gave this vulnerability a CVSS v.4.0
CVE-2026-3241 -- In Concrete CMS below version 9.4.8, a stored cross-site scripting (XSS) vulnerability exists in the "Legacy Form" block. An authenticated user with permissions to create or edit forms (e.g., a rogue administrator) can inject a persistent JavaScript paylo
CVE-2026-3242 -- In Concrete CMS below version 9.4.8, a rogue administrator can add stored XSS via the Switch Language block.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:
CVE-2026-3244 -- In Concrete CMS below version 9.4.8, A stored cross-site scripting (XSS) vulnerability exists in the search block where page names and content are rendered without proper HTML encoding in search results. This allows authenticated, rogue administrators to
CVE-2026-3452 -- Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by stored PHP object injection into the Express Entry List block via the columns parameter. An authenticated administrator can store attacker-controlled serialized data in block confi
CVE-2026-3520 -- Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability in Multer prior to version 2.1.1 allows an attacker to trigger a Denial of Service (DoS) by sending malformed requests, potentially causing stack overflow. Users should upg
CVE-2025-12345 -- A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer overflow
CVE-2025-15595 -- Privilege escalation via dll hijacking in Inno Setup 6.2.1 and ealier versions.
CVE-2025-15598 -- A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of crypt
CVE-2025-15599 -- DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can in
CVE-2026-0754 -- An embedded test key and certificate could be extracted from a Poly Voice device using specialized reverse engineering tools. This extracted certificate could be accepted by a SIP service provider if the service provider does not perform proper validation
CVE-2026-0869 -- Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to perform ASCG operations related to Brocade Support Link(BSL) and streaming configuration. and could even disable the ASCG application or disable use of BSL data collection on
CVE-2026-1775 -- The Labkotec LID-3300IP has an existing vulnerability in the ice detector software that enables an unauthenticated attacker to alter device parameters and run operational commands when specially crafted packets are sent to the device.
CVE-2026-1874 -- Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP versions 1.106 and prior and Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Mo
CVE-2026-1875 -- Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously
CVE-2026-1876 -- Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continu
CVE-2026-21866 -- Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vulnerable to a stored XSS issue when rendering Mermaid diagrams within chats. This occurs because Dify’s default Mermaid configuration uses securityLevel: loose, which allows p
CVE-2026-24415 -- OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize
CVE-2026-24848 -- OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations
CVE-2026-2637 -- iBoysoft NTFS for Mac contains a local privilege escalation vulnerability in its privileged helper daemon ntfshelperd. The daemon exposes an NSConnection service that runs as root without implementing any authentication or authorization checks.
CVE-2026-27601 -- Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.flatten and _.isEqual functions use recursion without a depth limit. Under very specific conditions, detailed below, an attacker could exploit this in a Denial of Service (DoS)
CVE-2026-27622 -- OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for
CVE-2026-27905 -- BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.36, the safe_extract_tarfile() function validates that each tar member's path is within the destination directory, but for symlink memb
CVE-2026-27971 -- Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single H
CVE-2026-28518 -- OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with
CVE-2026-29022 -- dr_libs version 0.14.4 and earlier (fixed in commit 8a7258c) contain a heap buffer overflow vulnerability in the drwav__read_smpl_to_metadata_obj() function of dr_wav.h that allows memory corruption via crafted WAV files. Attackers can exploit a mismatch
CVE-2026-2915 -- HP System Event Utility might allow denial of service with elevated arbitrary file writes. This potential vulnerability was
CVE-2026-3136 -- An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment.
CVE-2026-3266 -- Missing Authorization vulnerability in OpenText™ Filr allows Authentication Bypass. The vulnerability could allow unauthenticated users to get XSRF token and do RPC with carefully crafted programs.
CVE-2026-3342 -- An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow an authenticated privileged administrator to execute arbitrary code with root permissions via an exposed management interface.
CVE-2026-3343 -- A reflected cross-site scripting (XSS) vulnerability in the Fireware OS Web UI enabled execution of malicious JavaScript in the context of an authenticated management user's browser when they click on a specially crafted link.
CVE-2026-3344 -- A vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fireware OS filesystem integrity check and maintain limited persistence via a maliciously-crafted firmware update package.This issue affects Fireware OS 12.0 up to and including
CVE-2026-3351 -- Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server.
CVE-2026-3351 -- Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server.
CVE-2026-3437 -- An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Portwell Engineering Toolkits version 4.8.2 could allow a local authenticated attacker to read and write to arbitrary memory via the Portwell Engineering Toolkits
CVE-2026-3449 -- Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await
CVE-2026-3455 -- Versions of the package mailparser before 3.9.3 are vulnerable to Cross-site Scripting (XSS) via the textToHtml() function due to the improper sanitisation of URLs in the email content. An attacker can execute arbitrary scripts in victim browsers by addin
CVE-2026-3463 -- A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::binary_writer::append of the file source/detail/binary.hpp of the component Compound Document Parser. This manipulation causes heap-based buffer over
CVE-2026-3484 -- A vulnerability was detected in PhialsBasement nmap-mcp-server up to bee6d23547d57ae02460022f7c78ac0893092e38. Affected by this issue is the function child_process.exec of the file src/index.ts of the component Nmap CLI Command Handler. The manipulation r
CVE-2026-3485 -- A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been publ
CVE-2026-3486 -- A vulnerability has been found in itsourcecode College Management System 1.0. This vulnerability affects unknown code of the file /admin/student-fee.php. Such manipulation of the argument roll_no leads to sql injection. It is possible to launch the attack
CVE-2026-3487 -- A vulnerability was found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/class-result.php. Performing a manipulation of the argument course_code results in sql injection. The attack can be init
CVE-2026-3494 -- In MariaDB server version through 11.8.5, when server audit plugin is enabled with server_audit_events variable configured with QUERY_DCL, QUERY_DDL, or QUERY_DML filtering, if an authenticated database user invokes a SQL statement prefixed with double-hy