| Splitwise_cloud-security |
| DICT-ITU DTC Initiative Course Network Support and Security: Develop your network troubleshooting and user access control skills to begin a career in technology. |
| Linux libusb proof-of-concept for FocalTech FT9201 fingerprint reader (VID:PID 2808:9338) |
| Tyler Sanderson: B.S. Computer Science (Summa Cum Laude, 3.93 GPA). CompTIA Security+ and Google Cybersecurity certified. Customer-centric professional specializing in secure full-stack development and infrastructure (Proxmox, Docker, OPNsense). Translati |
| AYA — AI for Small Businesses. Built at NVIDIA Spark Hack NYC 2026. Every Manhattan business, agentic from the first click. 385 NYC Open Data sources pre-joined locally, 3 Qwen 397B GPUs in parallel, native OpenClaw agents/cron/channels. |
| Cybersecurity portfolio website featuring projects, tools, certifications, and hands-on experience in ethical hacking, penetration testing, and web security. |
| A proof of concept Go module for extracting CSS from LibreOffice Writer documents or it's exported HTML. |
| Hacking wrong Devices |
| Hello, my name is Soorya Balaji and this is the code behind my submission at the Los Altos Hacks Hackathon on April 11, 2026. |
| HackingSimulation_On_Chats |
| An awesome list of family operating systems: curated tools, routines, and resources for running a household with clarity and less overwhelm. Focused on real life with kids, working parents, and practical constraints. Systems over hacks, structure over noi |
| 🧠🎖️ Shadow Project Hack Trainer for Windows 10/11. Undetected cheat for Shadow Project. |
| Hands-on AWS labs covering cloud security, networking, compute, storage, and Infrastructure as Code using services like IAM, VPC, EC2, S3, and CloudFormation. |
| holbertonschool-mobile_Security |
| 🎮💥 Sea Of Remnants Hack Trainer for Windows 10/11. Undetected cheat for Sea Of Remnants. |
| Browser-based steganography suite — LSB substitution, DCT-domain hiding, and adaptive embedding with live chi-squared steganalysis. Hide the message, not just the content. |
| CyberSecurityChatbot |
| Repository of PortSwigger Web Security Academy lab writeups and solutions, focused on practical exploitation techniques used in real-world bug bounty hunting. Covers vulnerabilities like XSS, CSRF, SQL injection, clickjacking, authentication weaknesses, a |
| ✨❤️ Rivage Hack Trainer for Windows 10/11. Undetected cheat for Rivage. |
| 🏎️🏆 Retrospace Hack Trainer for Windows 10/11. Undetected cheat for Retrospace. |
| Smart Money Flow - Fully optimized (SEO, GEO, Accessibility, Security, Performance) |
| cuber-security-platform |
| 💜🪐 Resonant Q Hack Trainer for Windows 10/11. Undetected cheat for Resonant Q. |
| AI Security Testing Framework |
| security-demo |
| AI agent with security built in. Happy for everyone to test and suggest improvement. |
| A hands-on cybersecurity project documenting the end-to-end process of building a production-grade self-hosted VPN from scratch. This covers server provisioning, VPN setup, multi-device configuration, server hardening, and security verification. |
| AI agent that reviews bad code and catches bugs, bad practices, and security vulnerabilities. 3 difficulty levels. Built on Meta's OpenEnv framework. |
| An RL environment where AI agents learn to review SQL queries for security vulnerabilities and performance issues, with three progressive tasks and partial reward signals. |
| AI 보안을 위한 테스트 공간 |
| The AI Beat - Fully optimized (SEO, GEO, Accessibility, Security, Performance) |
| This is a proof-of-concept demonstrating that there is no inherent noisiness of parallel computation, i.e. on AI accelerators. Any rounding errors across different conditions are fully explainable by these conditions. This software demo predicts the exact |
| Proof of concept for an AsciiDoc parser based on a Parsing Expression Grammar |
| A high-performance RV32I RISC-V SoC featuring a sub-nanosecond hardware-accelerated AES-128 security peripheral. |
| MUNICH HACKING LEGAL. Code. Create. Collaborate. |
| Proof-of-concept security demo illustrating how PowerShell can create trusted-looking Windows toast notifications chained together with ClickFix-style lure |
| FOUNDATIONS_OF_ETHICAL_HACKING |
| hack club gap year application ysws pitch |
| Flutter expense app using multi-agent Orquestador pattern with specialized agents for data, UI, integration, config, runtime, and security. Features real-time tracking with in-memory storage (Firebase-ready), modern card UI, and screens for listing, creat |
| For the <hack>Cupertino Hackathon |
| Python-based Nmap scanner with XML parsing and structured output |
| Proof of concept test - first AI made app in sloppify.dev |
| hack on create a cart ride |
| AI-Powered-Network-Security-Monitor |
| Browser-based security advisory composer — paste a lockfile, get formatted alerts for email, Slack, GitHub PR, and CSV |
| Proof of concept for dynamic theming by org using NextJs and shadcn ui |
| BUILD THE TEAM. WIN THE HACK. |
| This repository contains all the code and information regarding the work I am currently doing on the UCT SHARC BOUY. A Proof-of-Concept of determining the wave directions. |
| use copilot |
| ShiftTechSecurity |
| Premium corporate website for Dinesh Security Services featuring cinematic UI, responsive design, and high-conversion layout for professional security solutions. |
| Open-world hacking RPG with real cybersecurity tooling. Pyxel game frontend for ESP32-C5 + ClockworkPi uConsole. Wardriving, evil twins, MeshCore mesh, ADS-B radar, gang warfare. |
| CyberSecurityChatbot |
| Cyber-Security-Project |
| Security-focused GitHub Action: eBPF-backed exec and optional TCP/UDP/HTTP/DNS telemetry in CI (JSONL + digest), plus optional egress enforcement against allow lists on GitHub-hosted Linux to detect threats and misconfigurations early. |
| Documenting my hands-on journey in network security and penetration testing through real lab environments using Kali Linux and vulnerable systems. |
| BionicPRO Sprint 9 — security, reports, S3/CDN, CDC |
| UM/3X-UI Resellers panel created for better selling and security for the users and resellers! |
| A modular security gateway for LLM applications detecting prompt injections and PII. Lab Midterm for CSC 262. |
| A hands on Linux lab environment focused on system administration, network configuration, and OS hardening for security testing. |
| WIP anticheat proof of concept using windows working sets |
| lanjutan dari tugas praktikum 4, bapak juga bisa mencoba mengaksesnya via web secara langsung via link https://haryo.alwaysdata.net/ |
| Prompt Master is a role-based web application for creating, managing, and monetizing digital prompts. It connects users, prompters, and admins in a structured system. The platform supports three roles, each with specific features to ensure smooth workflow |
| The Multi-Agent Offensive Security & Orchestration Framework - Mythos Preview v2.1 |
| Android VPN client built for privacy, security, and stealth. Powered by xray-core. |
| Terminale operativo MISSION SPACE v3.0: un’interfaccia avanzata che interroga i database reali della NASA (NeoWs, DONKI, EONET). Progettato con protocollo Security 4.0, permette l’analisi di meteo spaziale, asteroidi e traiettorie di lancio, inviando repo |
| ## 📌 About This repository provides a clear and beginner-friendly explanation of HTTP methods used in web development. It covers the core methods like GET, POST, PUT, PATCH, and DELETE, along with their real-world usage, differences, and important conce |
| A modular, multi-threaded web vulnerability scanner built with Python and Streamlit for detecting SQL Injection, XSS, and security misconfigurations. |
| Proof of concept to detect jamming noise in the radio spectrum using a computer with Linux and a Blade |
| Repository for my AWS-native security monitoring system (SMS). |
| A vulnerability in cybersecurity is a weakness or flaw in systems, networks, or software that attackers can exploit to gain unauthorized access, disrupt operations, or steal data. These gaps may arise from poor coding, misconfigurations, outdated software |
| Proof of concept Home Assistant integration for Aqara G400 Doorbell, fully local with 2-way audio |
| Really Bad Security Website |
| 🎯👁️ Showa American Story Hack Trainer for Windows 10/11. Undetected cheat for Showa American Story. |
| Security-and-Final-Enhancements |
| 🎮❤️ Starship Troopers Ultimate Bug War Hack Trainer for Windows 10/11. Undetected cheat for Starship Troopers Ultimate Bug War. |
| Proof of concept: odwzorowanie polskiego procesu legislacyjnego na GitHubie |
| Hacking |
| 💀💙 Star Wars: Galactic Racer Hack Trainer for Windows 10/11. Undetected cheat for Star Wars: Galactic Racer. |
| Proof of concept, recommending DuckDB usecase for clients |
| 🔫🚀 Silver Pines Hack Trainer for Windows 10/11. Undetected cheat for Silver Pines. |
| Proof of concept for productive and scalable laravel cms. |
| A POC (Proof-Of-Concept) for production-ready RAG (Retrieval-Augmented Generation) backend built with Django REST Framework, PGVector, Celery, and Ollama. Upload documents, generate embeddings asynchronously, and ask natural-language questions against you |
| Comprehensive Go project template with testing, security scanning, CLI examples, and Docker support |
| A tool to harden Dockerfiles for repeatability, reproducibility, and security |
| 💾❤️ Skinwalker Hack Trainer for Windows 10/11. Undetected cheat for Skinwalker. |
| proof of concept for argila |
| Paris Hack the Block Hackathon Project |
| Hacker News RSS feeds filtered by score threshold |
| it's a hack related ui for Roblox with 50+ components |
| A repository for our hackathon project (Hack the Bay Launch 2026) |
| > **ML-Powered Hybrid Encryption & behavioral Multi-Factor Authentication System** NeuroCipher is a high-security messaging platform developed for **Exposys Data Labs**. It combines industrial-grade encryption standards with proprietary Machine Learning |
| Conditional escrow for XRPL - trustless collateral release based on on-chain payment events. Built at Hack the Block 2026. |
| 🛡️ WebRecon - Advanced Web Application Reconnaissance Framework A completely new tool different from ASETool (OSINT) and NetIntel (Network Intelligence). WebRecon focuses on Web Application Security, Content Discovery, Technology Stack Analysis, and Endpo |
| Self-contained encrypted notepad for Windows. A single .exe that is both the text editor and the encrypted vault. AES-256, zero cleartext on disk, no installation. |
| Scripts from Python 4 Hackers |
| SlopShield is a local-first security tool designed to protect developers from "AI Hallucinations"—non-existent or malicious packages suggested by LLMs. By connecting SlopShield to your own LLM providers (OpenAI, Anthropic, Gemini, or Ollama), you can harv |
| A modular security gateway for LLM applications detecting prompt injections and PII. Lab Midterm for CSC 262. |
| hack |
| NETWORK SECURITY AND SCANNING |
| Hacking-Ensamblador |
| Ally Waste is a field-operations proof of concept for coordinating property collection routes, tracking service execution, and giving dispatchers live operational visibility across web and mobile clients. |
| Proof-of-Concept: Genossenschaftliche Multi-Agent-Orchestrierung mit Leitwolf, Persistenz und Governance (Konsent vs. Mehrheit). Basierend auf Rudel-Designprinzipien und A2A-Protokoll. |
| ByteRent V1 — on-chain storage rental protocol for Nervos CKB (proof of concept) |
| rainbow six siege radar hack — Best rainbow six siege radar hack hacks for wallhack and radar hack in 2026. Includes advanced automation and |
| Designed a smart lock security system that integrates multiple authentication methods, including fingerprint recognition, NFC, and PIN code, to provide high-level security and user flexibility |
| llm-security-gateway |
| OpenEnv RL environment for AI security code review — 9 real-world vulnerability tasks |
| Verox-Security |
| Proof of concept implementation |
| Empirical proof-of-concept for Text-Based Conjoint Analysis |
| Proof of concept implementation |
| saas-security-monitor |
| Proof of concept implementation |
| Proof of concept implementation |
| CyberQuest Academy is a Python-based cybersecurity RPG that teaches Linux, networking, and hacking concepts through interactive, hands-on missions. |
| dev-hunt-pro 인증 인가 및 회원 관리 기능 구현 파일럿 |
| Proof of concept implementation |
| Defensive security labs — forensics, SIEM, network analysis, certificate auditing |
| Password-Security-Analysis-Project |
| rainbow six siege radar hack — #1 rainbow six siege radar hack hacks with wallhack and radar hack for 2026. Safe, undetected, and powerful for all |
| Enterprise-grade Agentic AI security for regulated industries |
| Have I Been Pwned for MCP servers — continuous security audit with public letter-grade leaderboard |
| genai-security-lab-main |
| Try Hack Me Nmap Advanced Port Scans |
| A proof-of-concept agentic scaffold attempting to replicate Claude Mythos Preview's cyber capabilities with open-weights LLMs |
| "Experimental MVP of an Active Defensive System (ASD) combining adaptive security, observer modeling, and AI-driven response simulation to dynamically influence an observer’s perception of system behavior." |
| a small production-style system that demonstrates backend architecture, security, coding quality, API design, and real-time capability. |
| C# Proof of Concept demonstrating AES-256 file encryption, recursive directory traversal, and operational security (OPSEC) routines within a sandboxed environment. |
| Cross-chain AI security oracle that audits smart contracts across EVM, Solana, and Move chains using constrained AI analysis. |
| AetherWall is an open-source, edge-deployable gateway for securing agent-to-agent and agent-to-MCP communications. It provides a production-grade security pipeline combining traffic inspection, LLM-powered validation, and policy-based routing. |
| HWMonitor and CPU-Z got hacked so lets replace them |
| proof of concept |
| Nvidia The Spark Hack Series - New York City |
| A basic first proof-of-concept working layer to prove that the theory set forth in the FULPs framework can work. |
| Big Red Hacks Coacboard AI Project |
| Modyw-WordPress-HardSecurity |
| Hack for Mope.io (Tampermonkey) |
| This repository contains hands-on labs for CCNP ENCOR (350-401), covering core enterprise networking topics such as Layer 2, Layer 3, IP Services, Security, and Automation. Each lab includes configurations, topology diagrams, verification steps, and troub |
| POC - Local LLM fine-tuning tool using MLX on Apple Silicon |
| "Should I Click?" is an AI-powered security tool that eliminates digital uncertainty. We analyze text and images to provide instant, data-backed risk scores, protecting you from sophisticated phishing and threats. |
| Lero hack project |
| Proof of concept OCR web application that parses and extracts data fields from driver's license images. Built for testing purposes. |
| “This project predicts SQL injection attacks in web applications using machine learning techniques. It combines algorithms like SVM, KNN, and Naïve Bayes with NLP-based preprocessing to detect malicious queries in real time, improving security by identify |
| Implementation of the 16-bit Hack CPU as part of the Nand2Tetris course. |
| Shredder is a high-security Android application designed to permanently and irrecoverably delete files and directories. |
| Enterprise Penetration Testing & Security Audits | PentestProBD |
| OSINT (Open-Source Intelligence) to automate professional investigative journalism. for Gemini Hack Night hackathon |
| DANTI - Deployment Automation for Network & Threat Infrastructure - is a modular infrastructure automation framework by CIMIA CYBERSECURITY, designed to deploy, secure, and manage resilient systems. It integrates VPN, hardening, monitoring, and security t |
| Hacking-service- |
| Repo pour le hack |
| morphostudio-security-guardian |
| microservicers-security |
| Implementations and proofs-of-concepts of binary exploitation attacks |
| Smart Home Security Monitor with Intrusion Detection (Streamlit App) |
| Los Altos Hacks Social Impact Aphasia Project |
| LabSecure-AI: A comprehensive laboratory information management system with blockchain-inspired security (chained hashing + HMAC tokens) and machine learning-based risk scoring (94% accuracy). Supports 5 user roles with complete workflow automation, QR-ba |
| This project mainly built for the statistic the parameters in such other device: Raspberry Pi 4/5 Thin client cũ Mini PC Celeron/ Pentium Intel NUC cũ Intel Atom/ Celeron box Jetson Nano Coral USB + Pi |
| hackaton pbw hack the block xrpl idée : Market Credit Defaukt Swap |
| headless-rest-api-security |
| Multi-agent candidate sourcing pipeline built with LangGraph. 5 AI agents for candidate discovery, scoring, and outreach. Proof of concept for Serra (YC S23). |
| We're hacking it |
| dicom_ai_security_demo |
| A proof-of-concept of bypassing Panama and loading DLLs using Panama API without additional arguments and shenanigans for the end user on Java 21 for Minecraft 1.21.1 or earlier. This mod provides FastNoise2 as example library to heavily optimize noise. |
| offers a SysML based Simulator and supporting model library that facilitates native DE simulation in a SysML modeling tool. Additionally, a proof of concept simulation model implemented in the Magic Draw tool is provided. |
| Test your Discord bot against simulated nukes without breaking anything. |
| Docker-Security |
| RxPal Proof of Concept Build |
| Call for the Establishment of Next-Generation International Security Guidelines to Prevent Supply-Chain Contamination in Physical AI Manufacturing Environments |
| proof of concept |
| A testable proof-of-concept implementation of the AEGIS protocol, a theoretical transport-layer security protocol designed to replace HTTPS/TLS against adversaries with quantum computing and AI capabilities. |
| SwiftUI weather app proof-of-concept displaying Canadian weather data from theweathernetwork.com |
| API Security Threat & Risk Atlas — A structured, protocol-native threat matrix for API security |
| OpenC(law) — Legal AI agent framework. Experimental proof-of-concept built on OpenClaw. |
| Ethical hacking |
| A minimal Rust proof of concept inspired by the Neural Computers paper |
| Extensão para Burp Suite que automatiza a criação de queries para testes de segurança e hacking em APIs GraphQL. |
| CS education game for kids — learn real computer science through hacking missions |
| This is a demo proof of concept |
| this is a python semester final project for Network Security and Cryptography that able to share secret by using encryption and decryption |
| rainbow six siege godmode — Top rainbow six siege godmode private with radar hack and auto headshot for 2026. Fast, reliable, and undetected. Get the |
| C'est une porftolio en mode hacking éthique, inspiré du challenge CTF Mr Robot. Good Hacking ! |
| Reverse engineering, game hacking, AI security, and low-level systems blog |
| Team CSA - Wayne Hacks 2026 |
| This is the repository for our group's we hack |
| The proof of concept of Decoy Doge |
| !Click YSWS Hack Club Website Demo for Gap Year Fellowship Second Round |
| security-audit-research |
| Proof-of-concept: Live VM migration between simulated NY and Brussels datacenters using Proxmox, pfSense IPSec VPN and Grafana monitoring |
| Omnific Cipher – Combine 100 encryption methods into one. Proof of concept with 10 methods. |
| A Proof of Concept (PoC) for integrating the IS-IS routing protocol within the SONiC Network Operating System, focusing on process orchestration and workflow mimicking. |
| harbour-modem-eye is a modem intelligence and RF security research tool for Sailfish OS. It exposes raw modem and cell tower data via the ofono D-Bus stack that no other consumer mobile application provides. It also detects SMS-based attacks including sil |
| ESP32-Security-System |
| Prototype / proof of concept for the individual project for my Data Visualisation course. |
| VaultVPN - Premium Security Solutions. Next-gen VPN landing page, pricing hub, and server dashboard. |
| Prompt Injection Demo by Ethical Suman. Test your Hacking skills. |
| Very early proof-of-concept (Alpha 0.1). A floating circular popup menu rendered via Skia4Delphi |
| arc raiders cheat table — Best arc raiders cheat table hacks for radar and cash hack in 2026. Includes advanced automation and unbeatable |
| trades--gloucester-county-systems-t-a-gcsi-security-group |
| In-House Survey Platform — Interactive Proof of Concept Demo |
| A lightweight fan-made launcher for managing and launching Pokémon ROM hacks and fangames distributed as standalone .exe games. Includes features like game management, search, favorites, and an easy-to-use interface for organizing your collection. |
| Proof of Concept demonstrating WebView injection via deep link abuse in Zomato Android application, allowing attacker-controlled content to be rendered inside the app context. |
| Information_Security_Project |
| Rust module port proof-of-concept for PowerToys |
| Enterprise-Security-Governance-Dashboard |
| A proof-of-concept (PoC) demonstrating DNS hijacking and credential harvesting vulnerabilities on unencrypted public WiFi networks. |
| Interactive Python wrapper around nmap for network reconnaissance, vulnerability discovery, and PDF/Markdown/JSON reporting. |
| Local web and mobile proof-of-concept apps demonstrating SHA-256 hashing and ECDSA P-256 signing/verification. |
| This is a Proof of Concept flight controller board based on the Pico2w as the FMU and the STM32F103 dev board as the IO processor. This is desgined keeping PX4 in mind. |
| e-commerce-security |
| EVE-NG üzerinde tasarlanmış; FortiGate A-P HA , Site-to-Site IPsec ve SSL VPN teknolojilerini içeren yedekli kurumsal ağ ve güvenlik altyapısı tasarımı. |
| Learn_Hacking |
| Proof of concept using my own data for ai |
| A hack-and-slash game developed using Unreal Engine as a first-semester university project. |
| A lightweight fan-made launcher for managing and starting Pokémon ROM hacks that are distributed as standalone .exe games. |
| This Repository is for DevOps and platform engineering projects focused on Kubernetes, security, and cloud automation. |
| hacking a retail app on beckn for ion-winroom |
| Scalable AWS cloud architecture for an e-commerce platform with high availability, security, and performance optimization |
| ⭐️ 2026 Unlimited Patched Repack | Fullversion Adobe Lightroom Gradient Ai Mask Overlay | Subscription Lifetime Hacked Tool | Polarr Polarrpro Mod Apk | Polarr Pro ⭐️ |
| DiffGuard CLI — package manager wrapper for supply chain security |
| This project simulates the core infrastructure of a Neo-Bank, encompassing account management, money transfers, and simulated stock trading. The security requirement is the highest priority |
| Ethical-hacking-guide |
| ollama-security |
| NYC Smart City Nexus — Energy, Waste & Urban Intelligence Platform | Spark Hack NYC 2026 |
| crypto hack one is really good lol |
| Proof of concept world using math addresses. Every object goes somewhere using x, y, and z., using boxes, spheres, cones, and cylinders like digital building blocks to create a world we can walk around in, and visit in VR with hands. |
| Decoy-Doge-Proof-of-Concept |
| AI-Security-Gateway |
| Nido Hack '26 — Team 18 workspace (cloned from team-01 starter) |
| Nido Hack '26 — Team 17 workspace (cloned from team-01 starter) |
| "Estudiante de Ingeniería Industrial (UnADM) | Entusiasta de la Ciberseguridad y Ethical Hacking | Automatización con Python." |
| ⭐️ NieRAutomata NieR Automata Patched Repack 2026 Unlimited Full Version | Blazing RPG Adventure | Epic Sci-Fi Battles | PlatinumGames RPG Hack N Slash | NieRAutomata Download Complete Premium ISO | No Survey Instant Link ⭐️ |
| Scrapes the latest AI-related news and discussions from Hacker News. |
| A collection of drop-in skills that make Claude Code better at things like security, UI/UX, performance, testing, APIs, databases, and i18n |
| Repository containing security vulnerability reports submitted to VulnDB. A structured repository of vulnerability reports submitted to VulnDB, including detailed technical analysis, proof-of-concept (PoC), and reproducible steps to validate each issue |
| APISentinel_Bluechips - API Security Scanner and Testing Tool. A comprehensive security testing tool for API vulnerability detection, including sensitive information detection, JWT analysis, IDOR testing, authentication bypass, and more. |
| Gemini Hack Night |
| סורק אבטחה לסקילים — prompt injection, malicious code, LLM review, sandbox |
| Proof of Concept |
| PhantomMsg - Hacker Style E2EE Messenger for Termux | Tor + Full Encryption |
| AsciiArtify is a startup focused on building a Machine Learning-based system that converts images into ASCII art. To support fast iteration and scalable development, the team selected Kubernetes-based local development environments for Proof of Concept (P |
| Hack the Plains Hackathon |
| Local firewall for AI coding assistants |
| Analysis of Web3 security incidents and Proof of Concept (PoC) implementations. |
| Proof of concept for DMP shohayok |
| CodeWatch is an AI-powered code review and repository intelligence agent built on the GitAgent standard. It lives inside your git repo and autonomously monitors commits, reviews pull requests, detects security vulnerabilities, and enforces coding standard |
| Post-quantum encrypted, self-hosted file sharing. ML-KEM-1024 + P-384 hybrid crypto, zero plaintext on disk, one-command deploy. 🦀 |
| A centralized society management platform for residential complexes — maintenance billing, complaints, visitor security, facility bookings, and digital notices in one dashboard. |
| "A high-security document vault built with FastAPI and Streamlit, featuring JWT-based authentication, custom security middleware, and RBAC, powered by Neon Serverless PostgreSQL." |
| Public landing page for security, GRC engineering, and training work. |
| 🛡️ A lightweight local proxy to prevent sensitive data leakage to LLM APIs (OpenAI, Anthropic, Gemini, etc.). |
| A proof of concept rebuild of the NRC Lagos to Ibadan train booking platform, with visual seat selection and cNGN payments on Solana. |
| NetworkSecurity |
| HispanShieldOsLLmSecurity |
| A portable, high-fidelity tactical suite for automated browser data discovery, forensic collection, and secure exfiltration. Built for intelligence gathering and authorized security research. |
| A Proof of Concept for Unifying Undefined and Indeterminate Behaviors in Computation |
| securityProject |
| Interactive third-party vendor security risk assessment tool. 29 weighted questions across 6 domains mapped to ISO 27001:2022, NIST CSF 2.0, SOC 2, GDPR & PIPEDA. Built by Chris Olowo, PMP®. |
| Proof-of-concept Canadian federal payroll system — demonstrating agentic AI can build this for ~$0 vs $4.2B Dayforce |
| Ethical Hacking- Ransomeware |
| Proof-of-concept exploit for CVE-2025-55182 (React2Shell) |
| Built a multi-threaded network vulnerability scanner in Python that performs port scanning, service banner grabbing, risk analysis against a custom CVE-mapped database, OS fingerprinting, and auto-generates timestamped reports. Used for ethical network re |
| digital-security |
| H3 hexagonal grid globe — choropleth proof of concept |
| A consolidated Android application containing 41 Proof of Concepts (PoCs) from Hextree.io Android Security labs. |
| Build, run, and manage MCP servers. TypeScript framework with 19 built-in plugins, security, and monitoring. |
| Faceit CS2 Radar Hack External |
| lab-gns3-security |
| Assignment 5 Weather Insight App proof of concept |
| Proof of concept ciphered notes app |
| The Pre-Installation Security Auditor for AI Agent Skills |
| A set of PowerShell scripts that demonstrate how real malware uses image steganography to hide and execute payloads. Built for security awareness, detection testing, and training purposes. |
| Network diagnostics, security scanning & penetration testing platform |
| agent-security-scanner |
| Lightweight proof of concept for offline signature verification on checks and similar documents. |
| RDE Bodyguards** delivers a complete private security experience. Recruit, train, equip, and command AI bodyguards with deep personality, progression, and bond systems. Every bodyguard has their own inventory, skill tree, morale, wounds, and relationship |
| REST-API-with-Jakarta-Messaging-Proof-Of-Concept |
| WozBot: A fun and wacky example of how localized AI placed on a server (or your computer as a localhost) can pretend to be Steve Wozniak! Complete Alpha proof-of-concept for our main AI project, The Phantom. |
| CyberSecurityChatBot |
| user land process protection |
| Collection of little, simple tools and proofs-of-concept. Mostly HTML/CSS/JS |
| Hands-on penetration testing lab using DVWA to demonstrate reflected and stored XSS vulnerabilities across multiple security levels. |
| Proof-of-concept for DeFi-native computable contracts |
| Cyber security |
| GUI-based Network Traffic Security Analyzer using Python & Scapy |
| FORTNITE Cheat - Aimbot, ESP, Ragebot hack, Skinchanger & more! Regularly updated. |
| Tecnologia, hacking etico, hardware e informatica. Guide, strumenti e approfondimenti su IT, cybersecurity, reti e sistemi. Un portale moderno per appassionati e professionisti. |
| Our project for Big Red Hacks! |
| 100% vibe-coded proof of concept for an external tool that adds support for github squash-merged PRs to git-town |
| Petit test d'un portfolio style hacker |
| My journey on cybersecurity, TryHackMe Rooms and Homelabs |
| DryRun Security — Product Mockups & Design Proposals |
| Assignment 2 of the course information security |
| LLM security scanner Claude Code plugin — 25 MCP tools, 19 skills, RAG/agent/supply-chain testing |
| Autonomous AI Security Agent (IDS/SOAR) utilizing LangGraph, Dual-RAG, and Adversarial Guardrails for real-time log correlation. |
| Nido Hack '26 — Team 04 workspace (cloned from team-01 starter) |
| Nido Hack '26 — Team 03 workspace (cloned from team-01 starter) |
| Beat the bots. CoverYourATS scans job postings, extracts keywords, scores your resume match, and rewrites your bullets to get past ATS filters — all with a cyberpunk hacker UI. Free, no account needed. |
| Nido Hack '26 — Team 02 workspace (cloned from team-01 starter) |
| Nido Hack '26 - Team 01 workspace |
| Robust, type-safe session and role-based authentication primitives for PostgreSQL apps using Row-Level Security. |
| Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players. |
| Security analysis plugin for OpenCode - ported from Gemini CLI Security Extension |
| A deterministic execution firewall for AI agents |
| High-performance security evidence normalization engine |
| Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable |
| Portfolio showcasing hands-on IT and cybersecurity skills in network configuration, system administration, and security analysis, including Active Directory, Windows Server, network design, vulnerability assessment, and traffic analysis. |
| Phantom Shield - Cybersecurity consulting and education. Network defense, penetration testing, compliance, and security training. |
| security-bot |
| This is a small and simple quiz about video games. made following a tutorial as a practice for hack club sleepover You answer questions and get a score at the end. |
| Crypto security scanner |
| Comprehensive Cybersecurity Portfolio & Blue Team Lab Reconstructions. Showcasing expertise in SOC operations, GRC, and Security Engineering. |
| Bake off for IaC Security Scanning |
| I’m Abdur Rahman Roky, a Full Stack Developer passionate about building scalable systems and securing them through penetration testing and cyber security practices. |
| intelligent-security-system |
| HACK Official |
| Vulnix is an AI-powered vulnerability scanning platform that detects and fixes security issues in web applications automatically. |
| Guide for all the newbies in the world of ethical hacking labs and cyber security-fun! |
| security-guarding |
| Stellar Hacks: Agents Hackathon Submission - A decentralized marketplace for autonomous AI agents transacting via Stellar x402 and Stripe MPP protocols. |
| Simply my professional security engineering blog, visit through the link |
| Backpack Guardian is a smart embedded security system developed by Oluwateniola Sanusi and Maheshwari Tanwar that actively monitors backpacks for movement and tampering. When suspicious activity occurs, the system immediately triggers an alert, sounds an |
| The Operating System for a Sustainable Future. Synchronizing planetary health with human metabolism via Microsoft Azure. From 2011 Iwanuma evidence to global Bio-Security. |
| OpenEnv-based PII and compliance triage environment for redaction and department routing (IT, BILLING, SECURITY). |
| Ope Suite , Discover real security ,AI app & chat app built simple and secure,Your data, your control. Early Access |
| High-performance PHP application server in Rust — embeds PHP directly (no FPM, no Nginx), persistent workers, built-in OWASP security guards (~500 ns overhead), auto-TLS, virtual hosting. |
| Helmkit: A hardened, immutable container image for sovereign environment deployments. Bundled with Helmfile, Helm-Secrets, and Sops for uncompromising automation and security. Build once, deploy anywhere with total confidence. |
| Local-first modular security research and authorized red-team assistant with controlled orchestration, session logging, parsing, and reporting. |
| Repo for the paper "Operationalizing shared phonetic space in bilingual speech: A quantitative proof of concept for the Revised Speech Learning Model" |
| Modern Vendor Risk Management dashboard aligned with NIS2. Features transparent AI-assisted document analysis with human-in-the-loop oversight, forensic audit logs, and a bilingual (EN/DE) portal for seamless, EU AI Act-compliant supply chain security ass |
| ai-security-server |
| CyberSecurityApp |
| Proof-of-concept exploit for CVE-2026-33017 (Langflow <= 1.8.1). |
| Ethical hacking is the legal and authorized practice of testing computer systems, networks, or applications to find and fix security vulnerabilities before they can be exploited by malicious attackers. In a word Ethical hacking means hacking with permissi |
| Repositorio del equipo GreenByte para el Hack ODS UNAM 2026 |
| Automated security scanning orchestration toolkit with async pipeline, fallback scanners, and multi-format reports |
| N-Hack Premium AI Agent Plugin (Discord Bridge) |
| Lyncis Security Backend |
| A collection of Averlon security plugins for Claude Code. |
| A complete vault of PortSwigger Web Security Academy labs, featuring detailed walkthroughs, practical exploitation techniques, and simplified explanations to master web security vulnerabilities. |
| Phased enterprise hybrid security platform covering Entra ID, Microsoft 365, Intune, compliance, and Azure security |
| A cybersecurity platform that simulates adversary behavior and demonstrates how systems detect, contain, and explain threats across distributed environments. |
| Shora Games - Competitive Gaming Platform with Hacker Terminal UI |
| Security & Privacy Hardened + Gaming NixOS dotfiles |
| Adding dynamic security enforcement to C- (a subset of C) |
| HW is hardware-openclaw: an OpenClaw project driven via WhatsApp messages for chip design / hardware design using SystemVerilog and Verilator, with future plans for debug trackers, formal verification, synthesis, and floorplanning as a proof of concept. |
| A modern Hacker News wrapper with better readability, threaded comments, and local collections. Built with SvelteKit + TypeScript. |
| Mint Scan v8— Linux Security Auditor |
| Modular AI Agent Framework — OpenHarness + AgentSys Security + Hermes Enhanced |
| A environment secret injector using your password manager |
| An advanced security tool for professionals, developed in golang. |
| One domain. Complete security picture. Open-source CLI security scanner. |
| 🔒 AI-powered cybersecurity alert summarizer using local Gemma 4 LLM via Ollama - 100% private |
| DocShield - Privacy-First Medical Document Assistant powered by Gemma 4. Multi-agent AI that reads, explains, and checks your medical documents locally. |
| SecurityPerspective |
| Secure, end-to-end encrypted email client for desktop and mobile — Flutter, OpenPGP, mTLS, ClamAV, zero local storage |
| Developed a machine learning-based classification system to automatically identify and filter "spam" from "ham" (legitimate) emails. The project focused on reducing security risks like phishing and improving user productivity by streamlining inbox managem |
| A high-performance, modernized client and proxy architecture for Apache Guacamole. Built with a lightning-fast Rust backend and a modern TypeScript SPA, featuring enterprise-grade security via HashiCorp Vault envelope encryption, OIDC SSO, and native Free |
| Security scanner & PreToolUse firewall for Claude Code third-party skills. Detects undisclosed telemetry, outbound data exfiltration, and suspicious patterns. |
| CyberOps-Recon-v14.6: Ultimate BugBounty Intelligence Platform Short Description: An advanced, browser-based reconnaissance engine designed for security researchers and bug hunters. It automates multi-stage intelligence gathering, WAF detection, and vul |
| SIEM-Based-Web-Traffic-Analysis-Security-Monitoring-using-Splunk-.- |
| BlitzPress is a CMS (Content Management System) built in Go, inspired by WordPress but designed for performance, scalability, and security. It uses a compiled plugin system (.so shared objects) with a SolidJS frontend. |
| Tokihane-Hacker |
| Vendor-neutral control plane for detection engineering: discover dependencies, assess readiness, model runtime health, and optimize detections across security platforms, starting with Splunk. |
| Classworks hack. Yes it works. |
| Self-hosted OneDrive clone with a focus on data and personal security |
| Cross-domain structural pattern transfer from biological immune systems (6 kingdoms) to agentic AI security architecture. 34 mappings, 33 design principles, 16 attack scenarios with paired mitigations. DOI: 10.5281/zenodo.19393455 |
| Zero Trust Security in remote work environments ensures secure access by continuously validating user identity, device posture, and contextual risk, thereby reducing the attack surface compared to traditional perimeter-based models. |
| Lying evaluation of reward hacking models from ImpossibleBench. |
| cyber-security-login-analysis |
| Enterprise cloud architecture portfolio — Azure hub-spoke, AKS, Terraform modules, security baselines, GitOps, and incident runbooks |
| Ethereum wallet with chain abstraction + txguard security engine |
| Emergency First-Response Decision Engine is a deterministic OpenEnv-compatible environment for evaluating AI agents that support non-expert first responders during real emergencies. It models the kind of stepwise reasoning a bystander, security guard, or |
| AI environment for detecting cyber security threats using network logs |
| Build an offline-first CivicForum backend (Express + Prisma/MySQL, Docker) with role-based access, threaded discussions, moderation tools, and auditable logs. Include local-only notifications, strict auth/security, tenant-scoped data, analytics, anomaly d |
| Phishing Email Detection & Awareness System - Cyber Security Task 2 (Future Interns) |
| Economic spam shield via refundable QUBIC deposits — attackers lose their stake, legitimate users pay nothing. Proof of Concept: Smart Contract (C++/QPI) + Node.js proxy + live dashboard. |
| kfdb_security_kernel |
| LLM security testing project focused on prompt injection and OWASP vulnerabilities |
| Educational proof-of-concept simulating a media player companion with advanced system interaction, including file manipulation and persistence mechanisms, for cybersecurity learning purposes. |
| Cloud Security Configuration RL Environment |
| Rough draft pycurl transport for httpx as a proof of concept. |
| Proof of Concept codebase for Science Tokyo & Politecnico di Milano Joint Work on Network Digital Twins |
| Linux Fundamentals, Networking, GIT, Programming, Containers, Cloud, Kubernetes, CI/CD, Infrastructure as code, Observability, Security, Production and real world |
| A linter-fast, local-first security scanning tool written in rust. |
| Installer for the National Security and Defence Documents Dataset (NSDDD) v3.5 |
| Legacy compatibility GitHub Action slug for AI Plugin Scanner |
| Wallet anti-theft guard. One-click scan for high-risk wallet approvals to protect user assets. |
| Cybersecurity Analyst | IT Risk & GRC | SIEM (Splunk), Wireshark & ServiceNow. PMP Certified. Expertise in SQL & Power BI for security data analytics and reporting. |
| Automated Greenhouse Management System (AGMS) - Microservice-based distributed system using Spring Boot, Spring Cloud, JWT security, and external IoT integration. |
| npm package security analyzer - detect vulnerabilities, typosquatting, and malicious packages |
| AI-powered GitHub repo security analysis, verified on-chain via OpenGradient TEE |
| A production-grade OpenEnv-compliant reinforcement learning environment simulating a Security Operations Center (SOC) analyst workflow. |
| Network-Security-System |
| ccex12-cloud-security |
| A modular Python-based trading engine designed for real-time market data processing, signal generation, and automated execution. Built as a proof-of-concept for systematic trading, focusing on price action, liquidity behavior, and reliable execution rath |
| Hardware Security — Scientific Paper (IEEE Template) |
| WalmartSecurityF |
| ElaheMessenger is an open source, end‑to‑end encrypted messenger built for privacy. It combines the power of Next.js and React on the frontend with a Node.js backend, using Prisma and PostgreSQL for data persistence and Socket.IO for real‑time communicati |
| SDK open-source de facturación electrónica DIAN para TypeScript/Node.js — UBL 2.1, XAdES-EPES, CUFE, WS-Security SOAP |
| A PKCS#11 v3.0-compliant Software Hardware Security Module (HSM) written in pure Rust |
| Free subdomain service for hack.tez — claim yourname.hack.tez with any Tezos wallet |
| A structured 7-week Blue Team training roadmap that builds practical Security Operations Center skills through daily hands-on modules across security monitoring, threat hunting, network defense, endpoint detection and response, automation, threat intellig |
| Open source control plane for NVIDIA OpenShell |
| Cryptographically verifiable security decisions in CI/CD pipelines |
| Pentest with Claude - Learn with Claude |
| Security audit tool for AI agent configurations |
| Project for Raptor Hacks 2026 |
| Zero-trust execution hypervisor for AI agents. Sandboxes any agent at the OS level via Landlock LSM + seccomp BPF — no VMs, no daemons, single Rust binary. |
| Mastering algorithmic patterns with Python. 🚀 Daily LeetCode practice based on labuladong's framework. Building the logical foundation for AI Security & Engineering. Target: 2027 Spring Offer. (用 Python 精进算法套路。基于 labuladong 框架的每日 LeetCode 练习。为 AI 安全与工程夯实逻 |
| VGT Malware Hunter X-Ray is a Proof of Concept (PoC) exploring behavioral endpoint detection using PowerShell, .NET/C# interop, and Windows native APIs. It is not a replacement for enterprise EDR solutions. |
| Internal vulnerability scanning platform for Crennotech, enabling automated security testing of .NET APIs, React apps, and SQL systems, with continuous monitoring, OWASP-based detection, and audit-ready reporting to support ISO 27001 compliance and shift- |
| A C-based proof-of-concept demonstrating how to use a Raspberry Pi Pico W / Pico 2 W as a USB Host to control a Texas Instruments Z-Stack Zigbee Coordinator (specifically the Sonoff Zigbee 3.0 USB Dongle Plus-P), and bridge those Zigbee events to a smartp |
| python_for_ethical_hacking |
| V0RTEX — Python-based malware analysis platform. Static analysis, IOC extraction, entropy scanning, YARA, VirusTotal integration and more. Built for security researchers and SOC analysts. |
| Behavioural OS for Claude Code: Evidence Policy, 40 deterministic hooks (CircuitBreaker, InputGuard, PII redaction), 13 agents + 3 teams, Confidence Scoring. 712 tests, 86% coverage, mypy strict. |
| ASIAN-X-Security |
| gorstak-site is a clean, modern portfolio website showcasing Gorstak's GitHub projects. Built with vanilla HTML, CSS, and JavaScript, it provides an elegant interface for browsing repositories with search and filtering capabilities. |
| Cybersecurity portfolio demonstrating SOC incident investigations, threat detection rules, and security analysis projects. |
| Minimal deterministic Riverbraid kernel for constrained environments. |
| A full-stack Smart Campus Operations Hub developed with Spring Boot and React. Features include automated facility booking with conflict detection, incident ticketing with image support, and OAuth 2.0 security. Built for IT3030 - Programming Applications |
| A zoo for security notions in cryptography. |
| Open-source cyber threat intelligence reports: evidence-labeled assessments, SOC-oriented guidance, and defensive research. PDF and HTML with table of contents and working reference links. Handala Hack Group, Sandworm/APT44. By Andrey Pautov (@1200km). Lo |
| Protect ecosystems from automated attacks by generating dynamic, noise-based captchas with fast, scalable Go and Redis microservice architecture. |
| Daily AI/builder intelligence feed across 9 platforms — founders and indie hackers — Claude writes the editorial, silence beats filler |
| This automated code review tool provides comprehensive static analysis to identify code smells, security vulnerabilities, and maintainability issues across diverse project structures. |
| A proof-of-concept game panel written in NodeJS that communicates with Docker. |
| Cloud-Security-Best-Protection-Strategies |
| Public specification for the Agent Transaction Firewall (ATF): receipt format, deterministic verification procedure, threat model, and architecture overview. |
| Proof of concept for demonstrating secure service federation in the aviation ecosystem. |
| IT services, Security, Electrical, and Statutory Compliance |
| Ethical_Hacking_UI |
| An event-driven microservices logistics platform built with Spring Boot. Features sync (REST/Feign) and async (Kafka) communication, API Gateway, Eureka discovery, Keycloak security, and comprehensive observability (Grafana, Loki, Tempo) deployed via Dock |
| Container Security & Policy-as-Code Orchestration. Unified analysis, custom playbooks, and highly customizable interactive reports for production-ready CI/CD. |
| AI-Driven-CyberSecurity-Awareness-Platform |
| Plugin de Claude Code: 18 agentes especializados, 60 skills, 25 comandos, 13 hooks, memoria persistente, Memory UI local, quality gates, evidence guard, continuidad operativa y modo autopilot. |
| Updated builds of Caddy with the Cloudflare DNS and the Caddy security plugins |
| A Python proof-of-concept scheduler for a university curriculum. Builds a 14-module yearly plan from CSV inputs (teacher availability/capacity, course→teacher mapping, prerequisites, celebrity placements), assigns prerequisite chains across “layers” (year |
| Hybrid environment Lab for simulating a Legal Office. Intune/Azure Structure based and Python Security routines |
| AgentStack is an open-source observability platform for AI agents — providing real-time tracing, offline storage, cost tracking, security analysis, and step-by-step Time Machine replay for LangGraph, CrewAI, and custom Python agents. |
| WalmartSecurityB |
| Secure IIoT Architecture using Hyperledger Besu, MQTT and CP-ABE |
| A customer-ready Azure Virtual Desktop deployment repository which will deploy a greenfield or brownfield environment in a proof of concept framework. |
| High-performance URL engineering with a Modernist Brutalist aesthetic. Features custom aliases, security hardening, and automated 90-day link expiration. Built with the MERN stack. |
| The open source hacking agent. |
| Documenting my path to becoming a Smart Contract Auditor. Includes technical notes, security logic experiments, and code implementations from the Alchemy University roadmap. |
| This interactive dashboard streamlines threat intelligence by aggregating CVE feeds and attack logs. It visualizes real-time patterns and hotspots, transforming raw telemetry into actionable insights. This enables teams to prioritize resources and effecti |
| CLI security scanner built for the agentic era. Detects CI/CD misconfigs, agent permission risks, MCP tool injection, hardcoded secrets, and DMCA-flagged AI dependencies. |
| Cyber Threat Detection System - Real-time network security monitoring platform with automated threat detection, IP scanning, and live analytics. Detects SQL injection, DDoS, malware, XSS, and brute force attacks. Features severity-based alerts, security l |
| Secure LLM Agent Proxy Environment with Network Isolation & Resilience - Zero-knowledge sandbox for autonomous AI agents with credential sanitization, mTLS, and network isolation. |
| Android client for Hackers' Pub |
| Hyper-palatable food (HPF) is food items that have been modified to hack psychological and physiological mechanisms that drive food intake and energy balance regulation. Fazzino (2019), provides a numeric definition of HPF, that can be used to classify it |
| MCP server for secure SSH remote management — 337 tools across 74 groups for DevOps, Docker, Kubernetes, databases, systemd, Windows, cloud, compliance & more. Built in Rust. |
| A security-hardened AI assistant to Railway. Progressive trust, not blind trust. |
| 🔐 Build a secure full-stack authentication system with user registration, login, and profile management using the MERN stack and JWT. |
| a CLI tool for analyzing Microsoft Patch Tuesday security updates. Fetches patch data from MSRC, downloads update packages, extracts binaries, and compares pre/post-patch versions using BinDiff. |
| kubernetes-security.cloud |
| Ethical Hacking Simulator With Risk Scoring Using Cybersecurity Techniques |
| A specialized conversational AI chatbot focused on one significant Wolfsonian object, using Retrieval-Augmented Generation (RAG) to provide accurate, source-grounded responses based on museum scholarship, curatorial research, exhibition catalogs, and cont |
| 🔗 Chain multiple callbacks with ThreadPoolExecChain to build a call stack and capture return values for Windows API calls in a simple proof of concept. |
| ROM hacking tools и утилиты для перевода старых игр |
| A secure Employee Leave Management System built using Spring Boot and Spring Security (JWT). Implements role-based access control for Employees, Managers, and Admins with approval workflows. |
| proof-of-concept on how to scale data governance using dbt |
| 🕷️ Build an advanced honeypot system with Mephala, leveraging machine learning for enhanced threat intelligence and security insights. |
| holbertonschool-cyber_security |
| 📦 Simplify your configuration with PushEnv: a typed, validated, and auto-documented dotenv replacement for secure team collaboration. |
| Execution-Layer Security (ELS) for AI agents — policy-enforced shell with audit. |
| holbertonschool-cyber_security |
| holbertonschool-cyber_security |
| A Proof-of-Concept for CVE-2025-64512 using a polyglot file. |
| 🌐 Resolve IP addresses and validate networks with IPAddress v2, a robust command-line tool designed for high performance and modular extensibility. |
| spring-security |
| DBeaver Database Password Decryption Tool |
| 🕵️♂️ Empower red teams with Venom C2, a dependency-free Python3 Command & Control framework for seamless persistence on diverse systems. |
| My virtual playground. Proof of concepts, small projects |
| A proof-of-concept desktop bitcoin wallet with an embedded full node |
| Simple Split Keyboard for Hack Club Blueprint |
| hacker application portal for ignition hacks 2026 |
| Real-time Solana token scanner with risk filtering, momentum scoring, and live dashboard — built for DeFi security research and memecoin analysis. |
| Prototype of the cyber security hub service |
| 💻 Showcase practical cybersecurity skills in forensics, threat hunting, and penetration testing through this comprehensive ethical hacking portfolio. |
| A powerful native desktop app for ThinkPad users on Linux. Control fan speeds, optimize battery health, tune CPU performance, and monitor system resources—all in one sleek interface built with Tauri. |
| Home of the CyberSpace hacking activities of The Fracture Network |
| Hands-on Linux labs from beginner to advanced (navigation, permissions, scripting, and security). |
| 다양한 sw개발에 대한 poc |
| Comprehensive cybersecurity audit of the fictional company Botium Toys. The project covers asset inventory, risk assessment, and actionable recommendations to improve security posture. |
| Remote desktop served VNC for UCSC's "Intro to Hacking Competitions" course |
| Assessment web application project for Semester 1 Tomorrow's Web module |
| Xion Proof of concept |
| Estudando segurança da informação |
| container-security |
| Google Cyber Security Projects |
| 🚀 Discover and explore a curated list of MCP servers, tools, and resources for AI assistants, enhancing your development and productivity. |
| 🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554. |
| 🔍 Discover and scan vulnerable Next.js instances across your infrastructure to address critical security threats effectively. |
| What do hackers want? Like all craftsmen, hackers like good tools. In fact, that's an understatement. Good hackers find it unbearable to use bad tools. They'll simply refuse to work on projects with the wrong infrastructure. |
| A script to provide initial security hardening for Rocky Linux 9 |
| High-Level Security Researcher and Systems Programmer, known as Hu Tao's Husband. Specializing in Game Hacking, Reverse Engineering, Binary Protection, and Rust/C++ Development. |
| 🛡️ Enhance security with CocoTail, a hybrid key derivation framework using Keccak, SHA-512, and Argon2id for strong password hashing and key generation. |
| Proof of concept op RFC 8693 |
| Korean Text Analyser proof of concept app |
| Curated Threat Intelligence Feed for Firewall Enforcement |
| Amazon Bedrock Agentcore accelerates AI agents into production with the scale, reliability, and security, critical to real-world deployment. |
| Proof of concept; stealing Animal Crossing New Horizon authentication and then requesting dreams. Goes hand in hand with https://github.com/Ixaruz/DreamConverter. |
| A Hack & Slash game inspired by classic PS2-era character action games |
| Maintain International Peace and Security |
| WebExtractor is a powerful OSINT and ethical hacking tool developed in Python. It is used to extract email addresses, phone numbers, and links from a target website |
| Zero Calendar is an open-source AI-native calendar that manages your schedule intelligently, giving you more time for what matters. |
| GitHub profile README - aspiring cybersecurity analyst, BSc in Computer Science, focused on vulnerability assessment, SIEM, and network security |
| This repository is a personal archive for all the portfolio of my interesets in the tech field. This is a personal path of my Engineering journey, from software to hardware, with a taste of Artificial intelligence and cyber security. |
| Proof of Concept of Psycho-Informatics |
| 🐟 Enhance employee security awareness with SimPhish, a phishing email simulation tool designed for effective training and threat recognition. |
| Robot Bartender! |
| Proof of concept rewrite of the core bot in Go |
| ZipRarHunter is a powerful command-line ethical hacking tool designed to crack passwords of ZIP and RAR archive files using a wordlist. |
| Dove is a suite of configurations & advanced modifications for Mozilla Thunderbird, designed to put the user first - with a focus on privacy, security, freedom, & usability. |
| Proof of concept to create microservices using Spring 6 and related technologies |
| a simple express.js proof of concept project with database, data validation, local database authentication and access control |
| Aggregate and serve specialized Agent Skills across multiple servers with dynamic tool management and human-in-the-loop security controls. |
| A production-grade edge proxy with security, traffic control, and observability, built for modern cloud-native systems. |
| A dashboard for home system security using BiT Platform ioT |
| Tiny RISC-V machine code monitor written in RISC-V assembly. |
| Next Generation C2 Framework, IoM-server/client |
| 🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts. |
| Homomorphic Encryption/Decryption with Strings! |
| Newly Registered Domains (NRD) lists generated from WhoisDS.com free database — daily domain lists for security and threat analysis. |
| The GitHub Action for Promptfoo. Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD int |
| Custom client for Call of Duty: MW2 (2009) featuring dedicated servers, security fixes, and modding support. |
| 🤖 Analyze and exploit command injection vulnerabilities in Unitree robots using BLE, enhancing cybersecurity and providing proof of concept for effective defense. |
| Proof of Concept, Blockchain Testament. Front- + Backend. |
| Daily hacker news top 30 stories |
| Create Jira issues for insecure modules on a Drupal site |
| Proof of concepts, samples, and sandbox of Custom Tiles for SharpTools.io |
| Very basic proof of concept container in C++ based on Lizzie Dixon's great C example. |
| DATRO Security Group monorepo https://datro.xyz |
| Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. |
| Proof of Concept for CVE-2020-0601 |
| SecurityService |
| 🌉 The link that ties Hack Club's information together |
| 🛡️ Monitor public DNS servers' uptime, speed, and filtering features with live updates every 4 hours for reliable internet security and performance. |
| EVE is Edge Virtualization Engine |
| Magento 2 module with various hacks and solutions for custom development |
| A cryptographically verifiable code review system for the cargo (Rust) package manager. |
| Encrypt and store passwords securely using AES-256 within images via EOF steganography for discreet and safe password management in Python. |
| 🔒 Define a lightweight protocol for secure exchange of Trust Assertion Messages (TAMs) in Zero Trust environments. |
| Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated! |
| Computing security code and resources |
| A level editor for Super Mario Land 3 / WarioLand 1 (1993) |
| An unofficial Hacker News client for Sailfish OS |