Portugal updates cybercrime law to exempt security researchers
Porsche outage in Russia serves as a reminder of the risks in connected vehicle security
Inside Shanya, a packer-as-a-service fueling modern attacks
React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New wave of VPN login attempts targets Palo Alto GlobalProtect portals
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Chinese State Hackers Use New BRICKSTORM Malware Against VMware Systems – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks
Maximum-severity XXE vulnerability discovered in Apache Tika
Barts Health NHS discloses data breach after Oracle zero-day hack
FBI warns of virtual kidnapping scams using altered social media photos
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
One-Person Production: Wondershare Filmora V15 Empowers Solo Creators With AI – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
EU fines X $140 million over deceptive blue checkmarks
A Practical Guide to Continuous Attack Surface Visibility
China-Linked Warp Panda Targets North American Firms in Espionage Camp
React.js Hit by Maximum-Severity 'React2Shell' Vulnerability
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
New Variant of ClayRat Android Spyware Seize Full Device Control – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Criminal IP to Host Webinar: Beyond CVEs – From Visibility to Action with ASM – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Pharma firm Inotiv discloses data breach after ransomware attack
Cloudflare blames today's outage on emergency React2Shell patch
Louvre to Bolster Its Security, Issues €57m Public Tender
Sharpening the knife: GOLD BLADE’s strategic evolution
JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability
PromptPwnd Vulnerability Exposes AI driven build systems to Data Theft – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
React2Shell critical flaw actively exploited in China-linked attacks
Introducing Sophos Intelix for Microsoft 365 Copilot
Introducing Sophos Intelix for Microsoft Security Copilot
BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions
"Getting to Yes": An Anti-Sales Guide for MSPs
Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
Cloudflare down, websites offline with 500 Internal Server Error
How to Fix OST File cannot be Opened Error
Predator Spyware Maker Intellexa Evades Sanctions
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities
New infosec products of the week: December 5, 2025
Building the missing layers for an internet of agents
Data brokers are exposing medical professionals, and turning their personal lives into open files
What security leaders should watch for when companies buy or sell a business
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
NCSC's ‘Proactive Notifications’ warns orgs of flaws in exposed devices
Qilin Ransomware Claims Data Theft from Church of Scientology – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Predator spyware uses new infection vector for zero-click attacks
Socomec DIRIS Digiware M series and Easy Config, PDF XChange Editor vulnerabilities
U.S. CISA adds new OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog
Russia blocks FaceTime and Snapchat over use in terrorist attacks
CISA warns of Chinese "BrickStorm" malware attacks on VMware servers
Your year-end infosec wrapped
Marquis data breach impacted more than 780,000 individuals
LummaC2 Infects North Korean Hacker Device Linked to Bybit Heist – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
[2411.11194] Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers
Just a moment...
Patching Pulse Oximeter Firmware
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
- YouTube
DPDP IMPLEMENTATION FRAMEWORK FOR RBI-REGULATED BANKS (Part 4)
Phia, a popular AI shopping agent founded by Bill Gates’ daughter Phoebe Gates and Sophia Kianni, has been collecting a concerning amount of user data
Stillepost - Or: How to Proxy your C2s HTTP-Traffic through Chromium | mischief
Family of Jimmie ‘Jay’ Lee pushes for legislation after son’s murder
- YouTube
- YouTube
GitHub - 1342tools/kanti: A web application testing tool built for capturing and modifying http/https requests.
GitHub - leonrjg/Vakthund: Self-hosted web dashboard for security researchers to manage and track IoT devices from public sources such as Shodan or ZoomEye.
- YouTube
[2511.17726] Pre-cache: A Microarchitectural Solution to prevent Meltdown and Spectre
Fraud on Zelle - Schneier on Security
CTO at NCSC Summary: week ending December 7th
How to Integrate CTI with Threat Hunting: A Practical Guide | TI Essentials | Feedly
AWS America | Cloud & AI Consulting, Managed Services, Staffing & IT Solutions
Cloudflare Outage Today: React2Shell Patch Causes Global Disruption | Trendy Tech Tribe
Attention Required! | Cloudflare
Cyber incident knocks out PES Energize phones in Tennessee
- YouTube
2025 Year in Review: Open Source DFIR Tools and Malware Analysis Projects – Baker Street Forensics
What 'No Evidence of Data Access' Really Means
Attention Required! | Cloudflare
Breakpoint-Driven Heap Search (BDHS) | wirebrowser
AI LLM Red Team Handbook | AI LLM Red Team Handbook and Field Manual
SSRF Payload Generator | Shelltrail - Swedish Experts in Pentesting
White Box vs Black Box Phishing: Understanding Different Phishing Approaches
DNS Centralisation | Recon Wave
4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign | Koi Blog
AWS Security Agent
After Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Know | Electronic Frontier Foundation
Taiwan and Japan ink digital trade deal | Taiwan News | Dec. 5, 2025 15:47
Admins and defenders gird themselves against maximum-severity server vuln - Ars Technica
Generates secure passwords with at least 72 bits symmetric security using patterns on the keyboard from different English layouts. · GitHub
reuters.com
Privilege escalation with SageMaker and there's more hiding in execution roles
Where's the Russia-Ukraine Cyberwar? - Schneier on Security
Hacking CMMC CTF » CyberTalents
How Hackers Are Turning Antivirus Tools Into Malware Delivery Systems | TeQ I.Q. Computer Repair
GitHub - VenTheZone/Project-WebHunter: CLI tool that will automate Pentesting for the most common vulnerabilties on a website. For anyone intereted in grayhats come join my discord
[CUDA/Python Code] Factoring With Two Large Primes
SMS Phishers Pivot to Points, Taxes, Fake Retailers – Krebs on Security
Scam Telegram: Uncovering a network of groups spreading crypto drainers
Sean Plankey nomination to lead CISA appears to be over after Thursday vote | CyberScoop
Prompt Injection Inside GitHub Actions: The New Frontier of Supply Chain Attacks
Microsoft fixes Windows shortcut flaw exploited for years • The Register
- YouTube
Proof of concept testing mpv's codec support and frame-accurate playback for VidVuR integration
A collection of all my favourite Cyber Security tools
Docker API CVE-2025-9074 PoC (Proof-Of-Concept). A sophisticated exploitation framework for CVE-2025-9074, targeting unauthenticated Docker API endpoints with an integrated interactive command shell.
A proof-of-concept tool demonstrating invisible adversarial injection attacks against LLMs using Unicode steganography. Hides malicious instructions in zero-width characters and template engine metadata to bypass safety filters.
Cybersecurity Researcher | SOC Analyst (L1) | GSM Signal & SDR Security | Pentester Currently working on GSM packet interception, malware triage, and SIEM threat detection.
Telegram-cyber-security-bot
notes, labs, theory summaries, diagrams, and security concepts
security
MIPT Security of Information course Project that studies the smart contracts vulnerablities
SmplExpln is a beginner-friendly repository supporting the YouTube channel. It offers clear /blogs on tech basics (AI, security, computing) and practical, commented /code-snippets (Python, C++) for hands-on learning. The goal is to demystify technology wi
Personal Blog about Security and Technology
Its a devops CI/CD pipeline security automation allat type of thing, using Gitea (dont forget to setup your docker compose if you want to try... but why?).
Proof of Concept et tests pour la Loi de Minimisation de l'Entropie Cognitive
Network Security, Malware Analysis, Vulnerability Assessment & Penetration Testing, Data Protection & Encryption, Phishing Simulation, etc.
This prototype demonstrates a premium digital unboxing experience combining modern web technologies with luxury design principles. Built as a proof-of-concept for high-end product presentations and marketing campaigns.
The jailbreak attack method I used in the 2025 First Global AI Security Challenge
A codebase to simulate proof-of-concept agentic capabilities in procurement negotiation
My Advent of code solution, it is poorly written python code and used many hacks so take with grain of salt.
Information Security End Semester Project - Software Supply Chain Security with Intoto
HACK INVADERS: Cyberpunkowy symulator zarządzania ryzykiem (Push-Your-Luck). Gra F2P oparta na losowości. Skanuj siatkę, wybieraj gęstość Anomalii (min), i powiększaj mnożnik. Oferuje pełną transparentność , responsywność i emocje "near-win".
BACKEND-AUTOMATION-HACKING-IN-PYTHON
Network-Security-Coursework
Security App
A real-time computer vision POC that detects a user’s hand from a webcam feed and tracks fingertip proximity to a virtual boundary. The system classifies interaction states as SAFE, WARNING, or DANGER and displays live visual alerts.
五险一金计算器 - 基于 Next.js 的社保计算 Web 应用
A minimal, hackable implementation of Claude’s code
The datasets generated and used during this applied project—along with the complete source code for the Intelligent Audit Assistant proof-of-concept—have been archived in a publicly accessible repository for review, reproduction, and further development.
Offensive-cyber-Security-Projects
All proof of concept type projects/solutions
cyber-security
obscurity: steganography based drivechain proof of concept and hackathon demo examples, special thanks BitcoinGrove Miami
CVE-2025-55182 – React2Shell: Proof-of-Concept Remote Code Execution (RCE) exploit for Next.js apps. Features an interactive shell prompt to test and demonstrate the vulnerability in real time. Use for security research and authorized penetration-testing
My custom macropad for Hack Club Hackpad project
Streamlit POC (Proof of Concept) project
Password-Security-Analizer-Final-version
A MCP server that fetches Hacker News discussions and article content. Optimized for LLM consumption with compact, token-efficient formatting.
HSE VIBE HACK команда SHIFT HAPPENS x MISIS
Personal toolkit to extract information from compromised computers
Demo AI Security with GCP Model Armor
wifi-hacking
SecurityMatyc
WebSecurity-OWASP-TOP10
Capcha-Detection-Using-Advanced-Geolocation-for-Enhanced-Security
A security engineering documentation repo with design docs, RCA and incident report templates, executive summaries, and detection-as-code examples. Includes a leadership reflection log highlighting growth in ownership, curiosity, and consistent engineerin
ChromePasswordDumper is an educational security utility that demonstrates how web browsers store and protect your saved passwords. Built as a proof-of-concept tool, it highlights critical security vulnerabilities in local password storage systems to promo
AIBFS is a secure, scalable banking and financial management system built using FastAPI and PostgreSQL. It supports user authentication, account management, transactions, loans, invoicing, and AI-based insights. Implements role-based access and company-sp
just a proof of concept
Security
EncryptXpert is a cross-platform file encryption tool using AES-EAX/GCM for secure and authenticated data protection. Built with Python, PyQt5, and PyCryptodome, it supports key/nonce generation, GUI/CLI workflows, and safe file restoration. Designed for
SecureNetworkDesign-Car-Hacking
Kubernetes advisory agent that scans clusters via Flask APIs, aggregates metrics, and uses Azure OpenAI with Guardrails to produce Markdown reports covering reliability, security, scaling, and cost recommendations.
🎉 基于SpringBoot,Spring Security,JWT,Vue & Element 的前后端分离权限管理系统
WalletHunter v1.0 is a cutting-edge wallet management tool designed for enthusiasts of TrustWallet, MetaMask, and TonKeeper. It allows users to analyze and enhance their wallet security while providing insights into potential vulnerabilities. Share, explo
A fast and lightweight network-scanning tool that detects live hosts, open ports, running services, and basic vulnerabilities. Built for quick recon and security auditing, it provides clear scan results and an easy command-line workflow for beginners and
🎉 基于SpringBoot,Spring Security,JWT,Vue & Element 的前后端分离权限管理系统
Unified hybrid logging package (activity, security, and error logs) for Laravel applications.
Automated Security Configuration Audit Engine - Python-based tool for remote system security assessment
A simple python honeypot created for learning basic cyber security and monitoring attacker behaviour.
HACK INVADERS: Cyberpunkowy symulator zarządzania ryzykiem (Push-Your-Luck). Gra F2P oparta na losowości. Skanuj siatkę, wybieraj gęstość Anomalii (min), i powiększaj mnożnik. Oferuje pełną transparentność , responsywność i emocje "near-win".
Aspiring Red Team Operator | Ethical Hacker | Offensive Security Enthusiast
iac-security-project
IDOR Broken Access Control Lab — RB Cyber Security Labs
A collection of custom cybersecurity tools and scripts for learning, automating, and experimenting with offensive and defensive security techniques. Built with Python, Bash, and other open‑source technologies for ethical hacking and educational use only.
Task 2 focuses on: Reconnaissance (Whois, Shodan); Port & Service Scanning (Nmap TCP/UDP, OS detection); Vulnerability Scanning (OpenVAS/Nessus on Metasploitable2); Packet Analysis (Wireshark capture, SYN flood analysis); and Firewall Basics (iptables rul
This project implements a chat interface using Angular/TypeScript (Frontend) and Node.js/TypeScript (Backend) to interact with a Google Dialogflow agent that is configured with information about the FIFA World Cup 2026. The architecture ensures security b
🔍 FOFA Sentinel - Proactive security reconnaissance tool with complete FOFA API integration. Features query history, result storage, multi-format export (JSON/TXT/CSV), and modern hacker-style UI.
Different proof of concepts of possible implementations of online PDF editing and collaboration, based on PDF.js
The Musafir | Data Scientist & Security “Locks don’t work when the thief lives inside.”
apify-hack
Intercept, audit, and block critical Python operations at runtime.
Offensive security
A clean, organized collection of my personal study notes for the CompTIA Security+ SY0-701 certification exam. All content is written in my own words to help others learn and review the updated Security+ objectives.
Detection engineering project to identify command-and-control (C2) infrastructure through network flow analysis, adaptive beacon detection, and SOC-oriented SIEM rules.
security
This project demonstrates designing and deploying a secure multi-tier network architecture in Microsoft Azure using Virtual Networks, Subnets, Network Security Groups, and Bastion, ensuring safe communication between application layers.
A hacker mystery with a 90s aesthetic, compatible with webOS 3 and newer browsers
DataEthicSecurity
A real-time Gun Detection System built using Python, OpenCV, and Haar Cascade. The model detects guns from live webcam footage, highlights them with bounding boxes, and logs detection status. Lightweight, efficient, and ideal for basic security applicatio
Clon funcional de Amazon con enfoque en seguridad (Validación de contraseñas en tiempo real) y persistencia de datos.
WebReckon Api Discovery Tool for testing and security uses Playwright
Documenting hands‑on CTF solutions, enumeration techniques, exploit development, and practical security skills gained through continuous practice.
Cipher guard password security checker
A clean and responsive Python + Flask weather application Displays real-time current weather, emoji-based conditions, and severe weather alerts using the OpenWeather API. Built as a practical API-driven project featuring environment-based API key securit
This application will get looged in by google or gitbub account no need to create id and password to login to view the page
This solution made it effortless to track the security posture of every image tag, improved visibility across teams, and reduced the manual effort needed for scanning to zero. Security and DevOps teams can now quickly detect risks and take action all fro
Blue team arsenal: Detection engineering, threat hunting queries, Microsoft Entra ID PowerShell automation, security monitoring tools, and defensive scripts for SOC/security operations.
SecurityScansPipelineGithubAction
A research system with focus on security, modularity, and introspectability.
A technical research blog analyzing risky HostPath volumes in Kubernetes, demonstrating attack paths, privilege escalation, and mitigation strategies for cluster security.
Locator — Find. Return. Reunite. 🔎✨ A modern lost & found application built for web 🌐 and mobile 📱, designed to securely connect people with their missing belongings 👜🎒📦. Powered by intuitive UI 🎨, smart search 🔍, and reliable security 🔒, Locator makes
COMP 357
A beginner to Pro Invariant Thinking (Smart Contract Security)
A decentralized Dark Pool that protects you from MEV, Flash Crashes, and Hacks using Threshold Encryption and Reversible Settlement.
A Zero Trust security gateway combining IAM and SIEM capabilities for real-time threat detection and adaptive access control.
Proof of Concept: SIRENE database search using Open LLM (Ollama)
A modern tool to scan web applications for common vulnerabilities, generate compliance reports, and track security posture over time.
Proof-of-concept web application inspired by Kahoot, demonstrating real-time questions, player connections, and score updates.
This lab focuses on accessing, configuring, and running vulnerability scans using the **Greenbone Security Assistant (GSA)**, formerly known as OpenVAS/GVM.
proof of concept nextjs spa pos app
VPN configurations of V2Ray and XRay-core to increase the security of user traffic for free.
A Frida-based tool for intercepting HTTPS/TLS traffic in Flutter apps on Android and IOS. Supports arm64 & x86_64, bypasses certificate validation, rewrites socket connections to a Burpsuite and hooks Dart network APIs for authorized mobile security testi
Repo to archive notes and bits of information needed to get my Cert +
just a repo to store things about network security courses
static code analysis using pylint, security vulnerability teat using sonarqube, deployment on elastic beanstalk.
It helps in gaining information and for collage studes to prepare exams
Ethical_Hacking
Cybersecurity-Labs è una raccolta strutturata di esercizi, proof-of-concept, demo didattiche e strumenti di analisi pensati per studiare e comprendere le principali tecniche utilizzate nel mondo della sicurezza informatica
My grey hack scripts and data files
Repository documenting a critical iCUE 5.x flaw causing continuous config-file write loops, high disk I/O, SSD wear, and CPUID service deadlock. Includes full technical analysis, reproduction steps, impact assessment, and Security Advisory SA-2025-001 aut
A Horizontal Take-off and Landing Drone, Proof of Concept.
VaultLink — Experimental Fallout 4 Co-Op Framework A private, proof-of-concept multiplayer layer for Fallout 4 built using an F4SE plugin + external Python networking service. The goal is simple: sync minimal player state across instances to enable early
security-audit.sh
Built a full-stack web app for DigitalFlake Hackathon 2025 using React and Node.js. Implemented JWT auth, bcrypt password security, responsive UI, and data tables. Used MySQL/MongoDB for storage with clean, modular code and scalable architecture based on
A responsive sidebar menu built with HTML/CSS using the checkbox hack.
Proof of Concept project for an Area Mapping and Hazard Detecting Arduino robot with Depth Anything v2 and pySLAM.
A simple proof of concept to demonstrate my GodotAndroidBle plugin on the Meta Quest 3
flight speed jump noclip hacks all in one simple ui
Self improvement loop
A simple React app to log side gig income and track progress toward financial goals. (Note: Intended for personal use, security config not optimal.)
Sense hack IEEE hackathon NGO project
Discord Web 3 Security Protocol
The official Android app for Onion Search Engine. Search the web with maximum privacy and explore the Tor network content securely.
fe-hack
cyber-security-project
Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.
, I set up an Active Directory environment, connected a client device, forwarded logs into Splunk SIEM, and built an automated alert workflow using Shuffle SOAR and Slack. This helped me understand user authentication, event logging, detection rules, and
NetworksAndSecurityFinal-ChatRoom
just a silly proof of concept
SecureRabbit is a comprehensive security code analysis tool written in Go that combines static analysis with AI-powered deep reasoning to detect OWASP Top 10 vulnerabilities.
This is a proof of concept for a Slack bot that uses MCP to get useful from CVaaS and Anthropic
Lightweight JavaScript automation for VIT Chennai Add & Drop that auto-opens a course’s View Slot page, checks only Available Seats every 5 seconds, returns if full, and alerts instantly when a seat opens. Runs in the browser console without bypassing log
Panoptes is a self-hosted AI security assistant that watches the global vulnerability landscape in real time
Plataforma web enfocada en la divulgación educativa de ciberseguridad, defensa digital y hacking ético. Incluye manuales, recursos formativos y contenido orientado al aprendizaje responsable de técnicas de análisis y protección informática.
Enterprise-grade Golden AMI pipeline using AWS, Terraform, Packer, GitHub Actions, Trivy, and AWS Inspector. This project builds a hardened golden image, scans it for vulnerabilities, provisions secure infrastructure, and delivers automated security-gated
A full-stack nutrition tracker built with Node.js, Express, and MongoDB. It includes recipes with nutrition info, calorie and BMI tracking, user login with JWT security, an admin panel, and API integration for real-time meal data. Created as a group proje
Encrypt Studio is a fully local encryption toolkit designed to securely process files and text. Version 1.0.0 provides a modern feature set, strong security architecture, and an intuitive user experience.
This React demo facilitates secure, high-value resale of used electronics (mobiles, laptops, cameras). It features an AI-driven valuation CTA, specialized About Us content on trust, and a product-focused FAQ on data security & payment.
Proof-of-concept e-commerce platform for Rare Form Roasting Co. Built using Java Spring Boot, React.js, PostgreSQL, Reactstrap.
Following Hack Club PCB designing tutorial to make USB Hub
Comprehensive analysis of 6.6M+ U.S. Social Security baby name records (1910-present). Most popular names, gender ambiguity evolution, 1980s popularity shifts. Production-grade Python pipelines.
Looking_You is an advanced geolocation tracking tool for authorized penetration testing. It creates deceptive web pages to collect precise location data, device information, and user behavior for security research and educational purposes only.
3D in a browser - various proof of concepts
Custom Form Login Page in Spring Security — Part of the Spring Security Enthusiast Series.
Redlight Cyber Security It Management
"EMO-X is a 10th-generation universal operating platform that runs across all systems, devices, and languages. Built on a self-expanding distributed core, it delivers instant execution for apps and services worldwide, with advanced security, unified conne
BlueSpy is a PoC tool that records and replays audio from vulnerable Bluetooth devices, demonstrating Bluetooth security flaws for research use only.
Приложение разработано с помощью Java, Java Spring Boot, Spring Security, Spring Hybernate.
Collection of security reviews
Dan Bourdeau's 'proof of concept' forecasting dashboard with synthetic data and exogenous AI variables
Proof-of-Concept app for podman
From zero to Cloud & AI Security Engineer. Building secure AWS infrastructure with Terraform, automating defenses with Python, and implementing MLSecOps."
A proof-of-concept human identification system that captures images from a Raspberry Pi, sends them to a Django REST backend for identification, and presents results in a React web UI. Intended for research, demos, and as a starting point for production-r
CVE-2025-55182 & CVE-2025-66478 proof of concepts
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
Node.js 웹서버에서 발생할 수 있는 보안 취약점 PoC(Proof of Concept)
A collection of most frequently used USN/USNR digital tools and portals in one place. Built with convenience and security in mind.
Proof of Concept resources for SVG Smuggling, HTML Polyglots, and IP Obfuscation techniques. Includes Python generation scripts, a PoC listener, and YARA rules for detection. For educational and defensive research purposes.
Repositorio de mis write-ups de CTFs (Capture The Flag). Aquí comparto mis soluciones detalladas y metodologías para máquinas de diferentes plataformas de hacking ético y ciberseguridad.
This is a short demo of my application 6 real time system for EEL5862; it is a proof of concept system that works to show a sensor system in an autonomous vehicle containing a analog slider acting as a USS or LiDAR sensor, an analog button acting as a bra
Proof of concept for AI agent case study. Demo for ticket classification and mock actions.
A native multi-tenant isolation framework for high-security hosting environments. Designed for dual-stack operations across clearnet and Tor hidden services. Provides strict per-tenant separation for web, PHP-FPM, MySQL, PostgreSQL and networking layers.
security_tag
Ethical Hacking Assistant
Hands-on labs covering
This repository contains a proof-of-concept demonstration of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.
Competitive Intelligence Dashboard for DLP/DSPM/Browser Security - Track 33+ competitors with automated RSS feeds, Excel reports, and Google Alerts
A Proof of Concept for whale behavior classification using ESP32 with Edge AI(Edge Impulse) and Satellite Transmission via Blues Notecard & Starnote.
TryHarder Security Suite - 15-in-1 Browser Security Testing Toolkit for Chrome, Edge & Firefox
A security-focused, identity-driven, healthcare-grade AI system where: • RAG retrieves only the documents the identity is authorized to see.• MCP acts as an IAM administrator.• RAG calls MCP tools when queries require an action or security check. • ABAC/R
Public proof-of-concept and documentation for ShieldShift – a proprietary, vendor-agnostic firewall configuration migration and auditing engine. Converts complex network security policies in seconds.
My own personal hackpad for the blueprint program of hack.club
Original Proof-of-Concept's for React2Shell CVE-2025-55182
Proof of Concepts de extensões nas IDEs IntelliJ IDEA e VS Code.
I am trying to solve the hacker earth question in C language
CyberSecurityProject1
A Rust proof-of-concept demonstrating AB-BA kernel deadlocks via FUSE reentrancy primitives.
Proof-of-Concept Loan Product Assistant for Bank of Maharashtra
Frontend para un dashboard de auditorías de seguridad en servidores Linux, construido con React, Vite y TailwindCSS.
Proof of Concept: Unifying AAS and OPC UA
A comprehensive Penetration Testing Agreement developed by Senunyeme Kwabena Young of G-TECH SOLUTIONS for ParoCyber. This document outlines scope, authorization, methodology, responsibilities, legal terms, and ethical standards for a controlled ethical h
Trial/proof of concept for a good cardiac arrest management app
Zero Trust Enforcement in Kubernetes Security
Umamusume Pretty Derby Hack 2025 | Auto Farm Support Points Fans Infinite Stamina Unlock All Horses Max Stats Race Win | Uma Musume Cheat PC Undetected December 2025
A better new tab for Hack Clubbers
This repository contains a complete Proof of Concept (PoC) for the hospitality sector using AI Agentic. The project implements a comprehensive hotel management system with specialized AI agents.
A lightweight framework that uses foundation models to generate structured test cases and controlled perturbation scenarios for Security Operations Center analytics. It helps engineers understand how their pipelines behave when log data shifts in small b
AI‑powered habit failure prediction system using sentiment analysis, behavioral insights, and micro‑interventions. Built by Team HackInfinity for Hack The Flame 2025.
Lightweight remote agent for micro-hack - distributed network scanning
🚀 SmartVision AI is an intelligent multi-class object recognition system using CNNs & YOLO. It detects and classifies 25 COCO classes in real time, powering use cases in traffic, retail, security, wildlife & more. Fully deployed via Streamlit on Hugging F
Rust-Cryptography-Proof-of-Concept-
Completed a comprehensive lab simulating an enterprise network using Cisco Packet Tracer. Configured VLANs, EtherChannel, FHRP, OSPF, ACLs, NAT, DHCP, DNS, SNMP, Syslog and implemented WAN technologies with routing and security best practices to demonstra
Brawlhalla Hack 2025 | Aimbot Hitbox Expander Speed Hack Unlock All Legends Skins Infinite Legend Points | Brawlhalla Cheat PC Undetected December 2025
The goal of this Proof of Concept (POC) is to design and implement a scalable, flex (ible, and robust IT Operations Agent capable of autonomously handling common Level 1L1) support tasks. The initial scope focuses on Identity and Access Management (IAM) o
Hackathon submission for BNB Hack Abu Dhabi
Implement-Cloud-Security-Fundamentals-on-Google-Cloud
univeristy-security
File-Permission-Security-Audit-Toolkit
Proof-of-concept project for Zephyr test management integration with VISA QA processes
Built for the Trihacker finale hack at IBW
ARM-CAN-BASED-SECURITY-ACCESS-SYSTEM
Security scanner and fixer for Vibe Coder - find, verify and fix security vulnerabilities
Subdomain Takeover Proof of Concept (PoC)
🎚️🔥 HacKing-DJ — תשתית העל לתחילת הדרך שלך כ-DJ
Proof-of-concept semantic layer for grounding RAG and AI systems in business concepts and rules
A lightweight tool for performing security checks on account protection, such as cloning users and adding users.
A comprehensive Web Security Analysis project documenting reconnaissance, vulnerability scanning, exploitation testing, impact assessment, and mitigation planning using industry tools like Burp Suite, Nmap, and Wapiti. Includes detailed findings, screensh
Guias internas y buenas practicas de seguridad para aplicaciones, datos, accesos, gobernanza e infraestructura, basado en OWASP, NIST y lineamientos de seguridad empresarial
Encrypted QR codes for secure visual transfer. Tturn any sensitive data (keys, passwords, credentials, tokens, secrets) into portable, scannable QR codes.
Proof of concept to build chat application
🔧 Main Skills C# C++ 📊 GitHub Statistics
Ultra-low-power RISC-V SoC with BLE 5.x for wearables, trackers, and smart bands. Features integrated BLE radio, PMU, security subsystem, ML hooks, and sensor interfaces for multi-day battery life applications.
Basic security using PyWhatKit and YOLO
"This project is about Automatic Number Plate Recognition. It detects the number plate from a vehicle image or video and reads the plate number automatically . This system is useful for traffic checking ,parking, toll plaza and security purposes."
This is a proof of concept for bucket pattern implementation in PHP.
Triton agentic layer proof-of-concept
Siber güvenlik öğrenim sürecim, notlarım ve laboratuvar çözümlerim.
Production-ready Docker Compose setup for Kimai time-tracking application with MariaDB, health checks, security hardening, and persistent volumes.
Terraform modules for GCP security hardening, implementing best practices and ensuring compliance.
metron-security
Proof-of-Concept RCE pour CVE‑2025‑55182 exploitant le protocole React Flight sur Next.js App Router.
Text Encryption and Decryption Tool for CS4333 Security Project
Proof‑of‑concept multilingual content moderation system for Zimbabwean languages. Trains a single machine learning model on Shona, Ndebele, English, and mixed speech, with a PySide6 GUI for testing moderation workflows.
Real-time Bash script that detects failed login attempts by monitoring system authentication logs. Useful for learning Linux security and log analysis.
Security research and vulnerability analysis from HackerOne bug bounty programs. Contains exploitation techniques, proof-of-concept code, and reports for fintech platforms and API gateways. Includes Python/Bash scripts, authentication bypasses, CORS explo
A beginner-friendly full-stack CRUD template for a personal dashboard where each user can manage their own data. Uses Supabase Auth and row-level security to ensure users only access their own content. Perfect as a foundation for to-do apps, habit tracker
Proof of Concept: Fault-Tolerant Flight Control through Verifiable State Machines
This repository represents my complete cybersecurity learning environment, designed to organize, document, and demonstrate real-world skills in Splunk, SOC operations, threat hunting, blue team engineering, red team fundamentals, and programming for secur
Tasks for School of Solana Season 8 by Ackee Blockchain Security.
A collection of hands-on cybersecurity projects, labs, reports, and case studies demonstrating SOC, blue team, threat detection, and security analysis skills.
🚪 AI-powered file monitoring agent with 11 specialized bouncers for code quality, security, documentation, performance, accessibility, infrastructure, dependencies, and Obsidian knowledge management. Built with Claude Agent SDK.
hacking
AI-Security-Portfolio
Vanguard Security Research & Analysis (PoC) Research and proof-of-concept code analyzing the Vanguard anti-cheat system's core security architecture. Aims to understand defensive mechanisms and potential vulnerabilities for educational and defensive secu
A custom 5-key macropad with OLED display and rotary encoder. Designed in KiCad and Onshape for Hack Club Blueprint.
Revolutionary AI code generation from natural language to production-ready applications. Supports 50+ languages and frameworks. Automated testing, security scanning, performance optimization. Self-healing code with continuous learning.
A comprehensive end-to-end (Zero to Advanced) Spring ecosystem learning repository covering everything from Java backend fundamentals to advanced Spring Boot, Spring Security, JPA, microservices, and deployment.
comic-program proof-of-concept
Team of front-end web developers (**US**) to create a new HR system that is user-friendly for HR staff. The new HR system should only consist of a web-based application with front-end implementation. Demonstrate this as a proof of concept.
A Retrieval-Augmented Generation (RAG) chatbot Proof-of-Concept (POC) built with LangChain, leveraging vector embeddings and a vector store for context-aware responses.
This repository contains write-up for the Rocket machine on TryHackMe.
This repository contains a proof-of-concept tool for generating CSV documentation from TestStand sequence files.
GIMKIT HACKS
A pure PHP implementation of Shamir's Secret Sharing scheme with fluent conductor API, allowing secrets to be split into N shares where any M shares can reconstruct the original secret. Features zero external dependencies, information-theoretic security,
Private Cyber Security Project – Secure Student Feedback Portal
Hack back into the Linux server
SecurityCheck
This project is a proof-of-concept prototype built for an assignment where the goal is to detect a user's hand from a live webcam feed and trigger safety warnings when the hand approaches a virtual object on the screen.
GIMKIT HACKS
An Ideal Cyber Security Analyst Role Preparation Guide (به زبان پارسی)
Proof_of_concept_karman_line
Working proof of concept for NextJS for reactshell.
Security checker for n8n workflows - detects vulnerabilities in nodes and scenarios
NBA 2K26 Mod Menu 2025 Full Unlocked | Divine Mods Auto Combo VC Glitch Unlimited VC Badges MyCareer Hack PC PS5 Xbox Undetected December 2025
hacking_and_Pentesting
This course explores the Interoperability Trilemma in software development, defined by the balance between: Scalability Modularity Security Each of these dimensions represents, in turn, an internal trilemma, which must be understood and managed within the
A proof-of-concept Node.js server for handling Lark events, including event registration and message reception using the Lark SDK.
CS2 Hack 2025 | Legit & Rage Aimbot | Wallhack ESP Glow Chams | Triggerbot No Flash | Radar Hack Skin Changer | VAC Bypass Undetected | Steam Faceit Support | December 2025 Working
Automated Reconnaissance Framework for ethical security testing. Performs subdomain enumeration, port scanning, technology fingerprinting, and basic vulnerability mapping.
hacking-hu
A powerful Python-based security tool that automatically detects web application vulnerabilities including SQL Injection, XSS, LFI, CSRF, and SSRF. Designed for ethical hackers, security researchers, and developers to identify security weaknesses in web a
Week7_calculator-security-demo
A Proof of concept app showing how a vibe coded AI studio SPA can be used with a locally hosted LLM for increased flexibility and control over data and costs
Winning project of hack ai thon
sdopgnhdoigfbm[
Demo portfolio for GhostVenumAI, GhostMirror, GhostShield and GhostPoster (AI security tools).
Proof of Concept for a decentralized collateral-based lending platform. Users can deposit WETH or WBTC as collateral and borrow USDC through multiple DeFi protocols (Uniswap, Aave, Lido).
jenkins-security-analysis
🎯 Smart attendance system with 99%+ face recognition accuracy using InsightFace. Features: QR cross-device sync, real-time dashboard, camera lock, CSV export. Built with Flask, MySQL, OpenCV. Production-ready with security best practices.
cyber_security_challenge
Proof-of-concept ICU MessageFormat binding
This repository represents my complete cybersecurity learning environment, designed to organize, document, and demonstrate real-world skills in Splunk, SOC operations, threat hunting, blue team engineering, red team fundamentals, and programming for secur
E-Portfolio for Network And System Security Module
Proof of Concept for React2Shell vulnerability
A censorship-resistant, ephemeral data protocol where information survives by constantly migrating across the network topology. (Proof-of-Concept)
Sentinel is a tactical Travel Security Management app designed for Close Protection operations. Features include an OSINT Intel Hub for vetting locations, interactive Crisis Response Protocols (Medical/Attack), instant GPS Evacuation vectoring, and operat
Artificial-intelligence-Syber-security
ITA1406-Ethical-Hacking
This repository contains an Infrastructure-as-Code implementation of an AWS Landing Zone designed to establish a secure, scalable, multi-account cloud foundation. It automates organizational governance, account provisioning, centralized logging, monitorin
A simple telegram bot for windows security when you don't have physical access
React Server Components Security Research Tool
Updates management for Legacy Hack
Fps killer hack
Voice-first professional social network with 2FA security
PhishGuard is a real-time phishing protection tool that intercepts Chrome traffic through a local proxy, detects suspicious domains, and alerts the user with a security popup to Allow or Block the site. If blocked, the user is redirected to a custom warni
User and Security Service for Expense Intelligence Platform
WizardGame is an on-chain gamification Proof-of-Concept designed to integrate with the WizardToken (MANA) ERC-20 contract.
Proof of concept Tree Walk interpreter without recursion
web-security
Dans ce challenge Miaou de Hack The Box, nous allons exploiter une vulnérabilité critique présente dans le protocole FTP (File Transfer Protocol) lui-même, plus précisément une faille historique d’authentification qui permet de prendre le contrôle du serv
Using adversarial AI models to increase security with quantum cryptography
Overnight_Hackathon_HackingSquad_PrabhavTiwari
ci-cd-security-de
Implementing a Zero Trust network and runtime security model on Kubernetes with Cilium, Tetragon, Hubble, and SPIFFE/SPIRE, including mTLS, L7 policies, and eBPF-powered detection.
code-security-analyzer
Simple Proof-Of-Concept Loader written in C ©️
A lightweight, automated toolkit for testing URLs for Clickjacking vulnerabilities. This tool checks for security headers (X-Frame-Options and Content-Security-Policy) and generates visual Proof-of-Concept (PoC) HTML files for client demonstration.
spring-security-jwt-demo
Docker test environment for CVE-2025-13486 (ACF Extended RCE). For security research only.
Discord bot that rewards Qubic on-chain activity - Hack the Future Hackathon
A proof of concept exploit script for CVE-2025-55182
Proof of concept on Kedro and Spark integration.
thinkscan_proof_of_concept
AI-Powered Command & Control Framework using Claude's Model Context Protocol (MCP)
A lightweight, automated toolkit for testing URLs for Clickjacking vulnerabilities. This tool checks for security headers (X-Frame-Options and Content-Security-Policy) and generates visual Proof-of-Concept (PoC) HTML files for client demonstration.
Building-a-CompTIA-Security-SY0-701-Tutor-Chatbot
LED chaser project for Hack Club Blueprint
This project is a Proof of Concept (POC) of a .NET Core Worker Service designed to run scheduled tasks, orchestrated by Kubernetes.
(WIP) ArchSecure is a small Python CLI tool designed to explore ideas around package checking, automation, and system safety on Arch Linux. The project is still evolving and serves as a space for experimenting with update handling, command-line design, an
AI Security Final Project
The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it is a superpower for any security analyst or red-teamer to perform quick recon in single interface! If you perform reconnaissance on networks, then run this tool righ
security-web
Passwordless • Zero-knowledge • Phishing-proof • No PII • Constant-time • One round-trip login
security-api
A real-time password strength analyzer with entropy calculation and detailed security metrics
ItSecurityTalents
AdGuard Home Security Backend
Proof of concept for a KAIZEN posts alike app
ai-security-scanner
Small proof of concept library for Unilangs Middle-level IR
Local-first browser-based security tools for developers and defenders. No backend, no data sent anywhere.
A beautiful, modern peer-to-peer LAN Messenger. Share text and media instantly with a stunning glassmorphic interface, powered by Tauri and Rust for security and speed.
get-best-home-security
Construye aplicaciones web Spring Framework 6 y Spring Boot 3: AOP, JPA, Security JWT, RESTful, AWS EC2, Angular, React
A deliberately vulnerable REST API built in Go that demonstrates common security vulnerabilities including SQL Injection (SQLi) and Insecure Direct Object Reference (IDOR).
-securityportfolio.io
Automated analysis of network and Windows security emergency response tools.
Cassette is a free and open-source password manager
This is the repo for the JB Security Website
Security-Project
Project Daedalus: The API Maze 🕸️ A dynamic honeypot that traps attackers in a labyrinth of realistic, fake REST endpoints. Dynamic Structure: Generates infinite API paths on the fly. Breadcrumbs: Lures hackers deeper using hidden links and fake admin
a devboard i hacked together with minimal sleep
A GitHub for all the files needed for the Hack Club - Blueprint Challenge!
Network_Security
CloudStrike is a multi-cloud pentesting toolkit designed to identify misconfigurations in AWS, Azure, and GCP environments. It focuses on real-world attack vectors used by red teams and cloud security engineers.
macOS M2 Max host setup for the CollectivAI ecosystem (AI, Security & Crypto hub)
A security tool for identifying exposed origin servers behind WAF/CDN protections using domain probing across IP ranges, CIDR subnets, or IP lists.
Final Project of Computer Network Security Lab
A Graduation Project for IoT Security
holbertonschool-mobile_Security
CampusConnect aims to solve these issues by providing a dedicated, campus-exclusive online marketplace where students can buy, sell, donate, or exchange academic resources and services. Unlike open public platforms (e.g., OLX, Facebook Marketplace, Cra
A modern Kubernetes management dashboard with real-time monitoring, security posture analysis, cost optimization, and AI-powered insights. Built with FastAPI and React.
GitHub Actions for DevSecOps Demo through AWS
Hacking-Adventskalender-2025
aoc25 hacky hacky hack hack
CAI Ollama Python AI Pentesting Security Automation
Community Hack Project 2 for Bruxelles
simple spring security setup with jwt
Fundamentals of the Security in Communications (2025/2026 ZS) - Semestral Project Website
Hands-on Labs for Cloud Network Security — Zero Trust, XDR + SOAR Automation, API Security, CNAPP & Financial Data Protection on AWS. Fully designed for banking-grade architecture.
Roblox hack
This repository documents the systematic security audit, hardening, and monitoring implementation for a production homelab environment running 25+ containerized services, VMs, and network infrastructure.
security-management-system
NU-Manila : Information Security Project
🔧 Manage Google Workspace configurations effortlessly with GAM. Extract, store, and optimize settings for improved security and efficiency.
Open-source company OS with HR & people, asset management, finance operations, and security compliance engine (ISO 27001, SOC I, SOC II). Risk registers, controls, audits, objectives. API-first.
Production-ready n8n workflow automation platform with enterprise security
Hackable, creative coding engine built in Nim. Build stuff using Markdown with executable, Nim-like code blocks.
MX² — MAX 2 eXcryption Container: a portable, deterministic, Argon2id + XChaCha20 cryptographic container used in the MAX identity system.
Documentation and PowerShell automation scripts for my Azure Active Directory Home Lab (DC1, Client01, SOC-SRV01). Includes AD DS, OU structure, security groups, NTFS permissions, file shares, and enterprise-style automation.
A python GUI tool used for finding the most optimal path in a network of routers, conforming to security constraints.
This is my first ever build from scratch. This is a macropad with 4 keys, made by using the tutorial provided by Hack Club.
A minimal Flask-based homework-help platform built for Secure Programming classes, emphasizing security-first design, robust authentication, and protection against common web vulnerabilities.
🔥 Fireblast your packets - Linux firewall done right Linux firewall with teeth: block, monitor, protect The last firewall script you'll ever need for Linux servers . iptables, ipset, fail2ban, Spamhaus DROP, sysctl hardening.
🔗 Connect AWS Security Hub v2 findings to Slack seamlessly, delivering critical alerts from multiple services with rich details and easy filtering.
🌉 Share files seamlessly across Android, Windows, and Linux devices with Bridge, the fast, cross-platform file sharing app built with Flutter.
Landing page for Cold Signal 2025 NoCo Hackers CTF challenge
ADCSDevilCOM
Computer-Security-Final
🔧 Develop, compile, and deploy smart contracts effortlessly with the Etheram plugin for Atom, enhancing your Ethereum programming experience.
⚡ Explore classical–quantum workflows with a safety gate, enhancing AI security and efficiency in hybrid computing on NVIDIA GPUs.
A collection of actions to automatically audit contracts/VM for Movement
🌐 Configure a Cloudflare Worker to mirror paths and rewrite domain/Cookie settings, ensuring smooth proxying of upstream sites and modified responses.
🔍 Analyze suspicious emails quickly with AI for safe communication. Forward emails to receive instant security reviews on potential threats.
DNS Tunnel Detection is an intelligent security solution that uses Isolation Forest ML algorithms to identify malicious DNS tunneling
🎨 Enhance project development with BallCat, a modular framework for easy feature integration and seamless updates using React and Ant Design.
🔍 Extract archived URLs from the Wayback Machine efficiently with advanced filtering, automatic retries, and rate limiting for optimal performance.
☕ Streamline JVM workloads with hardened OCI images preinstalled with Temurin JDK 25 and JDK 26, ensuring security and performance for your applications.
🔍 Monitor and debug HTTP/S traffic with Charles Web Debugging Proxy, a vital tool for developers to optimize web application performance.
My personal cybersecurity portfolio website
Script to Automate App testing
🛠️ Automate fuzz testing of COM/DCOM interfaces to uncover vulnerabilities and visualize data, enabling quicker insights for security researchers.
Security research on Grok Imagine jailbreak - studying NSFW content generation boundaries
Graphics for my Hack 112 Project.
Floating UI proof-of-concept using Popper.js with anchors outside React and caret-based positioning.
ml-based-cyber-security
Hands-on labs for GDPR and security governance, focused on DPIAs, ROPA, and breach workflows.
for Milkyway @ Hack Club
GitHub Actions-powered pipeline for a Java application, showcasing automated building, security scanning (Trivy), and zero-downtime deployment to AWS Elastic Container Service (ECS) Fargate.
HelpDesk Pro Backend – Production-ready Spring Boot ticketing system with JWT auth, role-based access, ticket CRUD, SLA tracking, comments, knowledge base, admin stats, Docker support, Swagger docs, and 80%+ test coverage. Built for scalability, security,
saas-security-controls-profile
My personal SOC analyst Write-ups and investigations.
hallwaypass_securitysystem
securityLingua
Spring Library REST API (JdbcTemplate): A back-office library management API (Book, User, Loan) built with Spring Boot, Spring Security (JWT), & PostgreSQL. Focuses on raw SQL JdbcTemplate over ORM.
Self-hosted security lab: Qubes/Proxmox, enterprise firewalls, VLAN segmentation, SELKS/Suricata SOC node.
Public documentation for the AI Trust & Licensing Protocol (ATLP). High-level conceptual framework for AI licensing, trust scoring, authorship, verification, governance, and standardization.
Comprehensive multi-language development workspace template optimized for AI-assisted programming with integrated quality tools, testing frameworks, and CI/CD automation.
Student-Attendance-System-with-Anti-s-Spoofing-Security-and-Masked-face-Detection-and-Face-Emotions
Your Gateway Between BLE and Wi-Fi
pain and suffering. Group Hack project for machine language (CS30A)
Typing-Game--Second-Proof-of-Concept-
InheritX is a decentralized digital inheritance platform that brings automation and security to estate planning
NCFE Level 3 Cyber Security Learning Journey
웹보안프로그래밍 팀플-보안뉴스 웹 만들기
Reusable GitHub Action to scan repositories for vulnerabilities with AI-assisted insights
Ludic – a hackable training library for the era of experience
My playground for building privacy-first messaging. XOR today, Signal someday. Proof-of-concept only.
Your go-to resource for offensive web security techniques and tools
Official site for EEHS Hack Club!
miscellaneous scripts for big money hacking
Guías de estudio elaboradas por: @matoriusbig para certificaciones en ciberseguridad líderes en la industria.
Advanced Shell Generation Framework
An ed tech and assistive tech proof-of-concept to support problem-solving, and a potential asset toward a more global and sustainable quality of life
security dev, for capstone
cyber security and data privacy
🔒 Local AI Cybersecurity Workstation - GPU-accelerated LLMs for security research, vulnerability analysis, and incident response. 100% private, zero cloud dependency. AMD ROCm | LocalAI | big-AGI
🛡️ Detect and address dependency confusion vulnerabilities in WordPress with this fast scanner for ethical security assessments.
Repository of hands-on penetration testing and cybersecurity projects, including network reconnaissance, Nmap scans, service enumeration, and vulnerability assessments, designed to document practical experimentation and ethical security research.
Anti-Passback система контроля доступа для терминалов Hikvision с MySQL и автоматическим управлением дверями
Research SOC testbed for alert correlation and noise reduction. Zeek + Wazuh + Elastic. Includes generated attack telemetry, detections, metrics, and reproducible experiments
Controller to manage battery level of cameras, to optimize for clean energy usage.
An AI-driven Hacker News aggregator providing automated Chinese translations, structured summaries, and RAG-based Q&A to help users efficiently access technical insights.
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform resea
AI-Based-Cyber-Security-Threats-Prediction-AI-Agent
A Structured Framework for Classifying Malicious Web Content for Data Collection Security
AI-Based-Cyber-Security-Threats-Prediction-AI-Agent
A 1v1 poker simulation game built with application security as its main objective.
Developing a proof-of-concept for Hack-Dibner 2025
ME Allows website 2 Miền
Cryptology-Security
Work in progress rewrite of Hackers Week website
XWMS Package offers robust and complex login APIs designed for businesses requiring stringent security, multi-factor authentication, and seamless integration with modern PHP frameworks like Laravel and Symfony. Featuring token-based authentication (JWT, O
A scalable code assessment platform designed to detect plagiarism and ensure fair evaluation in coding assignments and contests. Built with a microservices architecture, it provides high performance, security, and flexibility for large-scale usage.
A modern cross-platform note-taking application built with Electron, featuring local data storage for complete security and control.
H_WEB_HACK
A production-ready RESTful API for Content Management System (CMS). Built with Spring Boot 3, Java 21, PostgreSQL, and JWT Security. Features Advanced Authorization (SpEL), Soft Delete, and Docker support. 🚀
The purpose of this project is to design and implement a network and Wi-Fi security scanner that can identify potential vulnerabilities and provide insights into overall network security. The system will leverage existing security tools while integrating
HoleInTheBox is a powerful offensive security tool designed to detect containerized applications from the public-facing side. By probing and exploiting exposed or vulnerable services, it identifies if an application is running inside a container environme
Antidote to VibeCoding
A modern WordPress security plugin for monitoring file integrity across your WordPress installation. Detect unauthorized changes, track file modifications, and maintain security compliance with automated scanning and comprehensive reporting.
Detailed Portswigger Web Security Academy write-ups with screenshots and step-by-step methodology
A Proof of concept : BeamDrop lets you transfer files between your computer and phone instantly over the same Wi-Fi network. Scan a QR code, open the link, and access your files no cables, no cloud, just seamless local transfers.
🔍 Centralize logging and monitoring in AWS using CloudTrail, CloudWatch, and Athena to detect and analyze risky API activity for improved security.
🪂 Claim verified Solana airdrops easily and securely with SolDrop – your trusted resource for free $SOL tokens and rewards within the Solana ecosystem.
Cyber-Security-Splunk-NMTAFE-2025
"This repository is a proof-of-concept demonstrating how to deploy and manage VLLM for fast LLM inference across a supercluster. It showcases distributed system architecture for high-performance computing (HPC)."
🚀 Build production-ready AI agents with FastAPI and Google ADK in this hands-on workshop for seamless integration and powerful user experiences.
A sciprt to setup up all my linux enviornments with the needed software tools I will be using in Hack The Box. This so if I can have identical setups from computer to computer. The hardest about any setup is learning all of the new tools or features. I
Game mode using in HackerOS. App uses Hacker Launcher.
🧃 OWASP Juice Shop is an intentionally vulnerable, API-driven web application built with Node.js + Angular. 🔐 Packed with OWASP Top 10 flaws and real-world bugs, it’s the ultimate playground for learning web security, ethical hacking, and CTF challenges.
Follow on from ADProject which aims to harden existing AD deployment, implement alternate identity related tools and simulate attacks.
A port of Fullmetal5's BlueBomb to the Wii. Hack a Wii from a hacked Wii!
Quanta Analytica, by M Nuri Shakoor Consulting, applies the Conflict Systems Research Framework (CSRF) to deliver data-driven risk, security, and resilience analysis. Anchored in ISO 31000 and INSSA, it blends systems thinking, conflict diagnostics, and a
An extensible bug bounty automation framework.
🐙 Arsenal Físico de Hacking Ético: catálogo interactivo de herramientas reales y DIY para pruebas de penetración, forense y auditorías, con inventario, precios y etiquetas.
Personal cybersecurity learning notes from TryHackMe & OverTheWire. Includes detailed, OCR-converted handwritten notes for each room and level, organized by paths and topics.
A collection of oscp commands tailored to my taste
🔍 Simplify WiFi pentesting with WIFI-TOOLKIT, a utility that integrates essential tools like Aircrack-ng and Nmap for effective network analysis.
Ollama-powered cybersecurity assistant for ethical penetration testing and security research.
holbertonschool-cyber_security
A collection of niche projects to explore Python's automation potential and capability.
Creation of a secure and isolated environment for cybersecurity and offensive security studies.
End to end encrypted chat app fully focused on quantum security and user privacy.
A collection of cybersecurity labs, notes, tools, and projects focused on ethical hacking, penetration testing, and network defense. Created to document hands-on learning and skill development in offensive and defensive security. For educational use only
MiAntivirus is a graphical interface for ClamAV that allows you to scan your computer for viruses and easily update the virus definition database through a user-friendly interface.
IPv6 Security Telemetry Stack
AI code analysis, debugging, and security scanning.
🛠️ Deploy a customizable, self-hosted Authentik instance with Docker for secure Identity & Access Management, supporting multiple protocols and integrations.
Proof of Concept for TB-CSPN Financial Agent System
This is my personal template collection. Here you'll find templates, and configurations for various tools, and technologies.
Revolutionize Your Data Security Multi-Layered Steganography & Encryption Experience next-generation protection: from secure folder zipping and AES encryption, to DCT-based steganography and quantum encryption. Stegno ensures your sensitive data is hidden
Sera Antivirus is a modern, lightweight, and powerful antivirus solution developed by Yash12007 — designed to protect your system with intelligent scanning, real-time threat detection, and customizable security settings.
A powerful, self-hosted web panel for managing OpenVPN servers, users, resellers (sub-admins), and multi-node deployments with a feature-rich UI and full API support.
Automatically mirror all your Forgejo repositories to GitHub or any Forgejo instance (Mirror of https://hack.helveticanonstandard.net/helvetica/forgesync)
🎉 This repository is dedicated to Proof of Concept (PoC) exploits, CVE reports, and cybersecurity research, aimed at educating and empowering security researchers, penetration testers, and ethical hackers. 🚀
Ansible playbooks to automate Linux server setup, Docker installation, and basic security hardening.
A modern, hackable task scheduler for developers
A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.
Tic-Tac-Toe over WebRTC for the Purdue Hackers P2P Workshop.
Proof of concept for a CAG-based project at 1177
A comprehensive PDF analysis and malware detection tool for security researchers and IT professionals
An application security aggregation and vulnerability management platform (ASPM) that includes Penetration Testing management.
QuickSight Row Level Security Manager
A full-stack online messaging app. Security and efficiency are the main focus. Currently in development.
proof of concept
A proof-of-concept for the council-of-models method, which allows you to mix several LLMs together and have them discuss over a problem.
一个基于 AI 的 Hacker News 中文播客项目,每天自动抓取 Hacker News 热门文章,通过 AI 生成中文总结并转换为播客内容。
Note : This app is a proof-of-concept project. It intentionally disrupts device functionality for educational purposes. Do not use it irresponsibly or distribute it as a real tool.
Send event data from your PHP application to tirreno security analytics.
NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt messages securely and effortlessly.
A collection of high-performance, modular utilities for enhancing testing, transactional consistency, efficiency, security and stability in cloud-native Go applications.
Content Security Policy for Brave sites
Multi language Bazel monorepo proof of concept
Hush Security helm charts
Example project (Proof of Concept) with Event Sourcing in PHP using the Dynamic Consistency Boundary (DCB) pattern.
This project is an open-source proof of concept implementing a (Meme) Token Launch project. The primary goal is to allow users to mint ERC20 tokens as "Meme Tokens" on the Rootstock (RSK) network.
Take Down the Headache of Remembering Passwords
Use PostgreSQL large objects for file storage (proof of concept).
Proof of Concept project, to demonstrate the integration of the chosen tech stack to customers.
The Tor Network Toolkit (TNT) is a multi-OS demonstration framework that showcases how to interact with the Tor network programmatically and how to run local packet-crafting operations using Scapy. Tor traffic and Scapy traffic remain strictly separated,
This project is an open-source proof of concept implementing a Runes Mock Bridge
A curated archive of my security reviews.
The app displays the list of the latest 10 news stories available via the Hacker News external service API. By using a "Load more" button, the app allows the user to view the next 10 news stories. - https://angular-news-app.vercel.app
🥚 Manage your supply chain efficiently with Huevos Kikes, a Django-based system for eggs, featuring security, inventory control, and sales management.
A modular, production-ready C#/.NET utility library and toolkit for rapid development.
Proof of concept for getting basic geolocation data
A proof-of-concept to test the LINDAS + R + GitHub + Datawrapper tech stack.
A project for the 2023 BRHS Hacks Hackathon
📊 Analyze and enhance your Rust gameplay with detailed performance and security metrics for informed tactical decision-making.
Welcome to the SIEM (Security Information and Event Management) GraphQL-based project! This project is designed to provide a powerful and flexible security monitoring solution by leveraging the capabilities of GraphQL and TypeScript.
🚀 Build a serverless To-Do API using AWS Lambda, API Gateway, and DynamoDB, perfect for beginners exploring Python and cloud integration.
Password/passphrase strength and health checker
Red Hat Linux NVMe/TCP Boot proof of concept
SilentButDeadly
Webchat with strong security options & WebRTC support
A step-by-step guide to building a Bitcoin & Lightning node, and other stuff on a personal computer
🔒 Encrypted Data Gateway Engine - Command-line Integrated Security Suite written in Go (OpenSSL compliant)
Naming brain-storming service for individuals (Proof of Concept)
ScanPro - NMap Scanning Scripts ~ Network Mapper
🕵️♂️ Grab sensitive data from various platforms for educational purposes, helping analysts understand credential theft and cyber security vulnerabilities.
🗓 Check out & sign up for Purdue Hackers events.
WebRTC proof of concept of data channels with room hosts
Various wordlists, tools and scripts written/compiled by me to use while doing bug bounties, and hacking/security in general.
security
CrowdSec is an open-source cyber security tool. This plugin blocks detected attackers or display them a captcha.
The digital home of engineer, educator, event organizer, security nerd, and artist Nicholas Young.
A ROM hack of Pokemon Crystal using the pokecrystal disassembly from pret.
A free Minecraft hacked client (utility mod) for Fabric
Various shell script utilities I've come to write over the years to make life easier
Runtime data collection for the StackRox Kubernetes Security Platform using eBPF
A Hacker News clone built with React and Next.js.
WebAuthn4J Extension for Spring Security
A collection of simple POCs (Proof of Concept).
Ansible role to setup Falco, behavioral security with sysdig
A powerful obfuscator for JavaScript and Node.js
⚡️ Official docker image for Wallarm Node. API security platform agent.
Sentry, feature-complete and packaged up for low-volume deployments and proofs-of-concept
Ultimate Hacking Keyboard firmware
Proof of concept app that demonstrates use of KeenASR SDK in ObjC. WE ARE HIRING: https://keenresearch.com/careers.html
Collaborative forensic timeline analysis
:star2: Website for the Chi Hack Night.
jSQL Injection is a Java application for automatic SQL database injection.
Mirror of FreeIPA, an integrated security information management solution
CVE-2025-14182 -- A vulnerability has been found in Sobey Media Convergence System 2.0/2.1. This vulnerability affects unknown code of the file /sobey-mchEditor/watermark/upload. The manipulation of the argument File leads to path traversal. The attack can be initiated rem
CVE-2025-14183 -- A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The
CVE-2025-14184 -- A vulnerability was determined in SGAI Space1 NAS N1211DS up to 1.0.915. Impacted is the function RENAME_FILE/OPERATE_FILE/NGNIX_UPLOAD of the file /cgi-bin/JSONAPI of the component gsaiagent. This manipulation causes command injection. The attack may be
CVE-2025-14185 -- A vulnerability was identified in Yonyou U8 Cloud 5.0/5.0sp/5.1/5.1sp. The affected element is an unknown function of the file nc/pubitf/erm/mobile/appservice/AppServletService.class. Such manipulation of the argument usercode leads to sql injection. The
CVE-2025-14186 -- A security flaw has been discovered in Grandstream GXP1625 1.0.7.4. The impacted element is an unknown function of the file /cgi-bin/api.values.post of the component Network Status Page. Performing manipulation of the argument vpn_ip results in basic cros
CVE-2025-14187 -- A weakness has been identified in UGREEN DH2100+ up to 5.3.0.251125. This affects the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. Executing manipulation of the argument path can lead to buffer overflow.
CVE-2025-14188 -- A security vulnerability has been detected in UGREEN DH2100+ up to 5.3.0.251125. This impacts the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. The manipulation of the argument path leads to command injec
CVE-2025-14189 -- A vulnerability was detected in Chanjet CRM up to 20251121. Affected is an unknown function of the file /tools/jxf_dump_table_demo.php. The manipulation of the argument gblOrgID results in sql injection. The attack may be performed from remote. The exploi
CVE-2025-14190 -- A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument cu
CVE-2025-14191 -- A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formP2PLimitConfig. Such manipulation of the argument except leads to buffer overflow. It is possible to launch the attack
CVE-2025-14192 -- A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The
CVE-2025-14193 -- A vulnerability was determined in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file /view_personnel.php. Executing manipulation of the argument per_id can lead to sql injection. The attack can be lau
CVE-2025-14194 -- A vulnerability was identified in code-projects Employee Profile Management System 1.0. This issue affects some unknown processing of the file /view_personnel.php. The manipulation of the argument per_address/dr_school/other_school leads to cross site scr
CVE-2025-14195 -- A security flaw has been discovered in code-projects Employee Profile Management System 1.0. Impacted is an unknown function of the file /profiling/add_file_query.php. The manipulation of the argument per_file results in unrestricted upload. The attack ma
CVE-2025-14196 -- A weakness has been identified in H3C Magic B1 up to 100R004. The affected element is the function sub_44de0 of the file /goform/aspForm. This manipulation of the argument param causes buffer overflow. Remote exploitation of the attack is possible. The ex
CVE-2025-14197 -- A security vulnerability has been detected in Verysync 微力同步 up to 2.21.3. The impacted element is an unknown function of the file /rest/f/api/resources/f96956469e7be39d of the component Web Administration Module. Such manipulation leads to information dis
CVE-2025-13292 -- A vulnerability in Apigee-X allowed an attacker to gain unauthorized read and write access to Apigee Analytics (AX) data and access logs belonging to other Apigee customer organizations.
CVE-2025-14117 -- A vulnerability has been found in fit2cloud Halo 2.21.10. Impacted is an unknown function. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor
CVE-2025-14126 -- A vulnerability has been found in TOZED ZLT M30S and ZLT M30S PRO 1.47/3.09.06. Affected is an unknown function of the component Web Interface. Such manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. T
CVE-2025-14133 -- A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function AP_get_wireless_clientlist_setClientsName of the file mod_form.s
CVE-2025-14134 -- A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file
CVE-2025-14135 -- A vulnerability was identified in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function AP_get_wired_clientlist_setClientsName of the file mod_form.so. The manipulation
CVE-2025-14136 -- A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function RE2000v2Repeater_get_wired_clientlist_setClientsName of the f
CVE-2025-14139 -- A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Impacted is the function strcpy of the file /goform/formConfigDnsFilterGlobal. Such manipulation of the argument timeRangeName leads to buffer overflow. The exploit has been disclosed
CVE-2025-14140 -- A vulnerability was detected in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/websHostFilter. Performing manipulation of the argument addHostFilter results in buffer overflow. The attack is possible to be carrie
CVE-2025-14141 -- A flaw has been found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formArpBindConfig. Executing manipulation of the argument pools can lead to buffer overflow. The attack may be performed from remote. The ex
CVE-2020-36876 -- ReQuest Serious Play F3 Media Server versions 7.0.3.4968 (Pro), 7.0.2.4954, 6.5.2.4954, 6.4.2.4681, 6.3.2.4203, and 2.0.1.823 allows unauthenticated attackers to disclose the webserver's Python debug log file containing system information, credentials, pa
CVE-2020-36877 -- ReQuest Serious Play F3 Media Server 7.0.3 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands as the web server user. Attackers can upload PHP executable files via the Quick File Uploader pa
CVE-2020-36878 -- ReQuest Serious Play Media Player 3.0 contains an unauthenticated file disclosure vulnerability when input passed through the 'file' parameter in and script is not properly verified before being used to read web log files. Attackers can exploit this to di
CVE-2020-36879 -- Flexsense DiskBoss 11.7.28 allows unauthenticated attackers to elevate their privileges using any of its services, enabling remote code execution during startup or reboot with escalated privileges. Attackers can exploit the unquoted service path vulnerabi
CVE-2020-36880 -- Flexsense DiskBoss 7.7.14 contains a local buffer overflow vulnerability in the 'Reports and Data Directory' field that allows an attacker to execute arbitrary code on the system.
CVE-2020-36881 -- Flexsense DiskBoss 7.7.14 contains a local buffer overflow vulnerability in the 'Input Directory' component that allows unauthenticated attackers to execute arbitrary code on the system. Attackers can exploit this by pasting a specially crafted directory
CVE-2020-36882 -- Flexsense DiskBoss 7.7.14 allows unauthenticated attackers to upload arbitrary files via /Command/Search Files/Directory field, leading to a denial of service by crashing the application.
CVE-2025-13426 -- A vulnerability exists in Google Apigee's JavaCallout policy https://docs.apigee.com/api-platform/reference/policies/java-callout-policy that allows for remote code execution.
CVE-2025-14052 -- A vulnerability has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected by this vulnerability is the function getMemberById of the file /mall-ums/app-api/v1/members/. The manipulation of the argument memberId leads to improper access controls. The
CVE-2025-14085 -- A vulnerability has been found in youlaitech youlai-mall 1.0.0/2.0.0. This impacts an unknown function of the file /app-api/v1/orders/. The manipulation of the argument orderId leads to improper control of dynamically-identified variables. Remote exploita
CVE-2025-14086 -- A vulnerability was found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is an unknown function of the file /app-api/v1/members/openid/. The manipulation of the argument openid results in improper access controls. The attack can be executed remotely. The
CVE-2025-14088 -- A vulnerability was determined in ketr JEPaaS up to 7.2.8. Affected by this vulnerability is an unknown functionality of the file /je/load. This manipulation of the argument Authorization causes improper authorization. The attack is possible to be carried
CVE-2025-14089 -- A vulnerability was identified in Himool ERP up to 2.2. Affected by this issue is the function update_account of the file /api/admin/update_account/ of the component AdminActionViewSet. Such manipulation leads to improper authorization. The attack may be
CVE-2025-14090 -- A security flaw has been discovered in AMTT Hotel Broadband Operation System 1.0. This affects an unknown part of the file /manager/card/cardmake_down.php. Performing manipulation of the argument ID results in sql injection. It is possible to initiate the
CVE-2025-14091 -- A weakness has been identified in TrippWasTaken PHP-Guitar-Shop up to 6ce0868889617c1975982aae6df8e49555d0d555. This vulnerability affects unknown code of the file /product.php of the component Product Details Page. Executing manipulation of the argument
CVE-2025-14092 -- A security vulnerability has been detected in Edimax BR-6478AC V3 1.0.15. This issue affects the function sub_416898 of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to os command injection. The attack can be initiat
CVE-2025-14093 -- A vulnerability was detected in Edimax BR-6478AC V3 1.0.15. Impacted is the function sub_416990 of the file /boafrm/formTracerouteDiagnosticRun. The manipulation of the argument host results in os command injection. The attack can be launched remotely. Th
CVE-2025-14094 -- A flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit ha
CVE-2025-14105 -- A vulnerability was determined in TOZED ZLT M30S and ZLT M30S PRO 1.47/3.09.06. This impacts an unknown function of the file /reqproc/proc_post of the component Web Interface. Executing manipulation of the argument goformId with the input REBOOT_DEVICE ca
CVE-2025-14106 -- A vulnerability was identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected is the function zfilev2_api.CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. The manipulation of the argument safe_dir leads to command injec
CVE-2025-14107 -- A security flaw has been discovered in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this vulnerability is the function zfilev2_api.SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation of the argument sa
CVE-2025-14108 -- A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes co
CVE-2025-14111 -- A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of
CVE-2025-14116 -- A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The
CVE-2025-27389 -- A flaw exists in the verification of application installation sources within ColorOS. Under specific conditions, this issue may cause the risk detection mechanism to fail, which could allow malicious applications to be installed without proper warning.
CVE-2025-34291 -- Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cook
CVE-2025-66418 -- urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps le
CVE-2025-66471 -- urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by r
CVE-2025-66562 -- TUUI is a desktop MCP client designed as a tool unitary utility integration. Prior to 1.3.4, a critical Remote Code Execution (RCE) vulnerability exists in Tuui due to an unsafe Cross-Site Scripting (XSS) flaw in the Markdown rendering component. Tuui all
CVE-2025-66566 -- yawkat LZ4 Java provides LZ4 compression for Java. Insufficient clearing of the output buffer in Java-based decompressor implementations in lz4-java 1.10.0 and earlier allows remote attackers to read previous buffer contents via crafted compressed input.
CVE-2025-66581 -- Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.41.0, a flaw in the server-side authorization logic allowed authenticated users to perform actions beyond their assigned roles across multipl
CVE-2025-6966 -- NULL pointer dereference in TagSection.keys() in python-apt on APT-based