| Comprehensive security vulnerability analysis of an Automated Insulin Delivery (AID) System using OWASP Top 10 framework. Educational documentation for penetration testing and secure software development. |
| security-cicd-demo |
| DevSecOps in a Box (dsoinabox) - an application security tool |
| Research project: Building a CTF benchmark to assess LLM security vulnerabilities and prompt injection attacks |
| Website hacked-by-gundu - Deployed to Vercel |
| Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable |
| Show common security flaws with JWT (Token Relay Attack, Signature Tampering) |
| Bedusec | Securing Digital Frontiers Offensive security testing, social engineering assessments, and vulnerability discovery. |
| game strategi deck-building hack simulation bertema dunia cyberpunk 2087. Kamu berperan sebagai Kai, mantan anggota UNDERDOGS yang kembali menantang dominasi AI raksasa bernama VAULT—sebuah sistem yang kini mengendalikan dunia dengan algoritma dingin dan |
| security_cockroach |
| Proof of Concept for Steve |
| 😃😋Maximisez vos interactions sur Instagram avec Insta-follow 😁😗 totalement 💯 free gratuit |
| Energy & Climate Hack |
| Penetration testing toolkit for detecting end-of-life frameworks and libraries |
| Startup Infra Accelerator is a demo project that showcases a production-ready CI/CD pipeline for modern startups, including a 3-tier app, automated testing, security scans, and cloud deployment via infrastructure-as-code. It’s built to be a reusable templ |
| Enhance the security of your KeyAuth ImGui example by implementing server-side controls, packet encryption, and single-use packets, offering robust protection against unauthorized access. |
| security |
| FastAPI + Next.js AWS ECS Deployment POC: This is a Proof of Concept (POC) project demonstrating how to deploy a FastAPI backend and Next.js frontend to AWS ECS Fargate using Terraform. |
| # Lango - Multilingual Healthcare AI Assistant [![Hacking and consu |
| AsyncRAT stands as a Remote Access Tool (RAT) conceived for the purpose of distant supervision and command over remote computers through an encrypted connection ensuring security. |
| sundai hack Nov 16 |
| Cyber-Security-Ethical-Hacking-Internship-Task-5 |
| FiveM hacks provide tools like god mode, no recoil, and speedhack for players. Mod menus and cheat scripts are widely used in GTA V, offering customizable and undetected gameplay experiences. |
| advanced_features_and_security |
| Proof of Concept for AI Ad Gateway |
| eCommerceAppliction build in Microservices with Java, Spring Boot, Spring Cloud, Docker, Kubernetes, Okta, Spring Security, CI/CD, GCP |
| A next-generation WordPress security framework providing deep hardening, malware detection, integrity monitoring, and guided server-level remediation. |
| A curated collection of cybersecurity projects, labs, and tools developed during my studies at Flatiron School and beyond. This repository showcases hands-on work in threat detection, vulnerability assessment, ethical hacking, and secure system design. |
| security |
| A proof of concept for a map where citizens can safely navigate high-crime neighbourhoods through the safest possible route, by fetching real time crime statistics. |
| A modern and customizable password generator built with React. It allows users to instantly create secure passwords by adjusting length, enabling numbers, special characters, and more. Designed with a clean UI, fast performance, and a focus on security. |
| SHS Expo Proof-of-Concept |
| Proof of concept for LP hedging strategy |
| Proof Of Concept of MAF using ASP.NET |
| A proof of concept for a map where citizens can safely navigate high-crime neighbourhoods through the safest possible route, by fetching real time crime statistics. |
| Security-audit-app |
| Vibe coding for the sprint hack ND |
| HACK // UTEC |
| A hacked around versio of AYAB-desktop t send single lines using a web server and curl |
| Ultimate WiFi & Bluetooth Security Testing Framework |
| Small proof of concept application for a Workspace component that can house child components which use a shared workspace state. Clicking Ping will disable Ping and enable Pong, clicking Pong will disable Pong and enable Ping. The Workspace can be copied |
| A collection of reconnaissance and security research tools for penetration testing and bug bounty hunting |
| Two-Factor Authentication (2FA) extension for FOSSBilling - Enhanced security with TOTP |
| This repository contains the Proof of Concept (PoC) for the VoidFrameX Kernel, an Object-Capability Multikernel with an asynchronous design, targeting the x86 architecture. |
| A LAN with basic Security features and IT Services |
| Arborist is an rshell manager for the game Grey Hack allowing mass deployment and management of rshell connections. |
| This is a Simple Blockchain Implementation in C++ with wallet functionality, cryptographic security, and an interactive command-line interface. It demonstrates core blockchain concepts including proof-of-work mining, digital signatures, and transaction va |
| User-mode-security-tool |
| Secure Post & Comment Management System Using Spring Boot Security |
| Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable |
| Security2 |
| Proof of concept of an embedding-based boardgame recommender. |
| Proof of concept web application for adding out of office messages to Canvas LMS |
| Hands-on walkthroughs, notes, and writeups from my TryHackMe learning journey, covering offensive security, blue teaming, networking, malware, SOC skills, and practical cybersecurity labs. |
| A To-Do List application with a fully automated CI/CD pipeline built using Jenkins. This project demonstrates source code management with GitHub, automated builds, testing, linting, security scans, and deployment to a web server. Designed for learning Dev |
| Nuevo portfolio web en React + Vite con TailwindCSS, completamente rediseñado y más profesional que el anterior. Estética hacker con colores neón, tipografía monoespaciada y animaciones interactivas. Arquitectura modular y UX mejorada para un portfolio mo |
| security-shield |
| A room security system project written in python to program a PIR sensor via a Raspberry Pi 4 B's GPIO pins for motion detection, snap a photo of the intruder using a USB camera module, and sending an email with the photo attached using Python's smtp libr |
| A research project investigating secure and privacy-conscious processing of real-time metadata from network cameras. Focuses on designing protected data flows, reliable communication layers, and interactive visualization tools that enable analysis across |
| Security- |
| Privilege Escalation Security Audit Tool for LINUX |
| Connect TradingView alerts to automated trading bots, APIs, and external services. |
| Springboot-Security-JWToken |
| A comprehensive web-based campus security management system designed to digitize and streamline security operations for educational institutions. |
| NetStrike - Professional Network Security Testing Framework for Educational Use |
| Git visualisation application (Proof-of-concept) |
| Submission for the Hack@UCI Tech Team |
| Demo app that includes mobile demo app , pipelines, security scan and testing |
| kyxel-security-frontend |
| Face recognition proof-of-concept with a FastAPI backend (InsightFace + SQLite) and an Expo React Native app that lets you register and authenticate users by sending selfies to the API. |
| Shared Claude Code hooks for Revity - Security guardrails, workflow automation, and compliance controls to standardize AI-assisted development across the organization |
| CloudGuard-Anomaly is an agentic AI–powered framework for analyzing cloud security posture, detecting misconfigurations, and explaining configuration drift across multi-cloud environments |
| Web Application Vulnerability Scanner — MVP A lightweight, beginner-friendly vulnerability scanner for educational and authorized testing. This project is a minimal viable product (MVP) of a custom web vulnerability scanner built in Python. It detects c |
| Corrupt-Court-of-Pasay.-Security-guards-locked-the-door-and-don-t-let-me-go-home |
| Proof of Concept Replication of the Incident |
| -lia-security-platform |
| Comprehensive Web Application Security Assessment & Implementation Project |
| Terdiri dari 8 kolom : Location, Profit, Income, Disp_Income, Birth_Rate, Soc_Security, CV_Death, Pct65 |
| A portable toolkit practitioners can run locally or in CI to assess AI systems’ security, governance, and operational readiness |
| Python desktop app for DFA/NFA simulation with GUI and full security stack: bcrypt password hashing, progressive lockout (1 min/1 h/24 h), forced password reset, TOTP-based 2FA, email alerts, RBAC roles, JSON-based secure storage, and full activity loggin |
| Cybersecurity Practice Repository – Daily challenges, research notes, and practical project work in ethical hacking and defense. |
| 🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡 |
| API Security Testing & GraphQL Vulnerability Framework |
| Task 1 - Nmap scanning results |
| 🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡 |
| GCC 15.1 COBOL + musl proof-of-concept tests |
| This project is designed as a fast, secure, and accessible static website, with the main purpose of enabling users to analyze password security and generate strong passwords. The tool is built following the Performance First (maximum speed) policy and all |
| Personal cybersecurity portfolio showcasing projects in network security, digital forensics, Nmap, Wireshark, Linux, and Python. |
| An elite communication fortress for the digital underground. Where hackers, operatives, and the dark web army converge in encrypted shadow channels. Built with cutting-edge tech to ensure absolute anonymity and zero-trace operations. |
| 🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡 |
| ADAPT is an open, modular framework for building agentic AI–driven root-cause analysis (RCA) and proactive troubleshooting workflows in modern cloud, SaaS, and security environments |
| Suraksha is a women’s safety web application featuring one-tap SOS alerts, real-time GPS tracking, incident reporting, and emergency contact notifications to enhance personal security. |
| Hack Camp 2025 project |
| A simple security vulnerability & incident tracker web app built with Flask and SQLite. |
| 🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡 |
| Proof of Concept for the paper "Triangulated Relativistic Quantum Computation: A Curvature--Modulated Unification of Quantum and Relativistic Computing" |
| Proof of concept for new dronecan peripherals architecture |
| Our Apex Legends hacks and cheats stand out as some of the most accessible and dependable options in the online realm. Sign up on our platform, ascend to VIP membership, and acquire access to our suite of hacks. With our instant delivery system |
| Network penetration testing project using metasploitable 2 as a target demonstrating security assessment of various services (FTP, SMB, JAVA,VNC, IRC, ingreslock). Includes Nessus vulnerability scans, exploitation evidence, and comprehensive security repo |
| 🔗 Simple Blockchain Implementation: A simplified, educational implementation of a blockchain from scratch. ⛓️ Demonstrates concepts like hashing, blocks, and proof-of-work. 💡 |
| A Learning Management System WordPress plugin with security best practices |
| jwt-security-auth-role-refresh |
| hws course projects |
| UAC bypass, Elevate, Persistence methods |
| A collection of cheatsheets for networking, personal security, and other topics |
| A proof of concept demonstrating Claude Sonnet 4.5's ability to execute Standard Operating Procedures (SOPs) using simple agents with tool calling, without complex orchestration frameworks like LangGraph. |
| Cybersecurity + Data Analytics Portfolio — SOC labs, cloud security projects, threat detection demos, SQL workflows, optimization, and machine learning analysis. |
| Local password cracker for a game called "grey hack" |
| A standalone, AI-powered security platform with a custom 'Matrix' GUI. Features a pure NumPy neural network for live training and anomaly detection. Includes real-time system monitoring, 3D visualizations, and threat heatmaps. A self-contained AI 'foundry |
| Proof-of-concept Lua script injector for Where Winds Meet using a dinput8 proxy DLL and Frida Gadget to hook the game’s internal lua_load / lua_pcall and open debug / GM features. |
| Hacker Toolbox MSI 1.0 |
| CS2 hacks offer advanced options such as glow, third-person view, and fast crouch for competitive gaming. Permanent and temporary spoofers ensure undetected performance alongside source code integration. |
| Implementing the Proof of Concept for a (10, 10, 1) Network (Hard Label setting implementation) |
| Network-Security-Research |
| Proof of concept of an embedding-based boardgame recommender. |
| EHICAL_HACKING_SIXTH_ASSIGNMENT |
| A minimal, operator-friendly way to set a Raspberry Pi’s Ethernet settings directly from Bitfocus Companion on a StreamDeck XL—no external apps, no HID hacking. |
| HealthPredict is a proof-of-concept project demonstrating the application of Supervised Machine Learning to address the United Nations Sustainable Development Goal (SDG) 3: Good Health and Well-being, specifically Target 3.4 – Non-Communicable Diseases (N |
| A Terraform-based Infrastructure-as-Code repository containing reusable modules and real-world examples for provisioning AWS resources such as VPCs, EC2 instances, security groups, load balancers, IAM roles, and S3 buckets. Ideal for DevOps automation, cl |
| MCP server powering Quality Clouds LivecheckAI. Real-time code validation for AI-generated content with governance, security, and platform-aware rules . |
| Elliot's dream honeypot that he would have loved to use while hacking E-corp |
| Travel Management System deployed on AWS EC2 using PHP, MySQL, HTML, CSS, and JavaScript. Features include user authentication, tour listings, bookings, and an admin dashboard. Hosted on Ubuntu with Apache and secured via SSH and AWS Security Groups for r |
| Great Agent Hack 2025 |
| Shared repo for locus hack |
| A collection of my cybersecurity projects, labs, tools, and hands-on practice. |
| security_system |
| Repo for Hack NYU |
| Proof-of-Concept .NET bot implementation for Delta.Chat |
| A proof-of-concept bot for unconventional memecoin marketing. |
| Next-generation social platform combining chat, feed, video, mini-apps, marketplace and AI features — built for speed, security and scalability. |
| A repository where I store all of the scripts that I made for the game Grey Hack. |
| Hybrid Search Proof of Concept - Problem-oriented search system for regulatory documents |
| What the chess hack |
| security_dependencies_CI |
| Built a Splunk-based security analytics dashboard to detect and analyze SSH activity (inbound attempts, failed logins, lateral movement, protocol mismatches, and possible C2 beaconing) from simulated log data (secure_logs). The project involved field extr |
| Hello World Hack Project |
| Aegis AI Security Analysis for CSOs. Built at Junction Hack Finland |
| securitytest |
| bookmark-manager-security-assesment |
| IT-Career-Network-Automation-Security-Cloud |
| Matrix Hacker OS for ESP32-S3 TDongle - WiFi analysis, network tools, and cyberpunk interface |
| This is the chess hacks |
| For Cutie Hack 2025, I decided to build a Student Spending Budget Analyzer |
| Open source HIDS tailored for Microsoft Active Directory and Workstations |
| SEGTEC-SECURITY |
| Security-Audit-with-OpenVAS |
| REST API service with multi-layered security, role-based access control, MFA authentication, and audit logging. |
| Proof-of-Concept: Unrecoverable Disk Wipe (Educational Only) |
| Our hack for Technica 2025. |
| Chess Hacks repo |
| Hi, am Anas Fred a full-stack engineer experienced in React, Next.js, Node.js, and Web3 integrations. I build high-performance applications with a focus on reliability, security, and seamless user experience. |
| Custom AWS VPC architecture with public subnet, Internet Gateway, route table, security group, and EC2 instance. Includes network diagram built using draw.io for understanding basic AWS networking. |
| PredixAI is a proof-of-concept Industrial IoT platform designed to disrupt the traditional equipment maintenance market, dominated by incumbents like L&T. |
| Programs to make life easier. |
| A proof-of-concept project to demonstrate how to create and use an agent using MCP. |
| All the codes for 24CYS213. Authored by Sivaa S Hari Charan |
| Hands-on cybersecurity tasks completed during my Oasis Infobyte internship, covering network scanning, SQL injection, Wireshark analysis, and vulnerability assessment. |
| A comprehensive case study analysing how the core architectural design of Android and iOS influences performance, security, user experience, and ecosystem behaviour. Includes research insights, documentation review, and a detailed comparison of both mobil |
| Cette application est un Proof of Concept (POC)d’une plateforme bancaire distribuée basée sur une architecture micro-services utilisant Spring Boot et Spring Cloud côté backend, et React côté web. |
| 👩💻 Hi, I'm Hafsa — DevOps & AWS Cloud Enthusiast. Skilled in Linux, Bash scripting, and AWS services (EC2, S3, Lambda, VPC, CloudFormation). Exploring Jenkins, Docker, Terraform & Kubernetes to build secure, scalable, automated environments. Passionate a |
| Security-Department-Salary-App |
| Emory Hacks 2025 Hackathon |
| Monitors security policy surface seen by OpenAI's codex CLI |
| A real-time facial detection and home security system using a hybrid Siamese Neural Network and CNN. The model extracts deep facial features with a CNN and performs similarity comparison with a Siamese architecture, enabling accurate verification of autho |
| Proof of concept "ROS-Like" (more like Redis) PubSub + Protobuff on a 4 Wheeled Amazon-bought robot that runs on hopes and dreams (we ran out of hope). |
| A proof-of-concept bot for unconventional memecoin marketing. |
| proyecto_AICAD_JPereira |
| Resources-for-learning-Hacking |
| LaTeX Template for Documentation (IT Security) |
| Senior Software Developer | Network Security Expert | Game & VFX Creator | برنامهنویس ارشد | متخصص امنیت شبکه | توسعهدهنده بازی و جلوههای ویژه |
| intelligent-security-system |
| First security steps on fresh system. |
| Junction Hack Finland |
| Cutie Hack 2025 Project |
| Security Operations as Code Framework Community Version |
| Esta é uma POC (Proof of Concept) que demonstra a migração de um sistema ASP Clássico para uma arquitetura moderna |
| Ethical-Hacking |
| Apuntes para Hackers, desde las trincheras de Internet con amor. |
| Creating a hack dash mini project where you can travel through the universe, but at a cost. |
| Team Anderrsens at Chess Hacks '25 |
| SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. A low privilege user with CreateChild permissions over any Organizational Unit (OU) in the Active Directory domain with write a |
| CyberGuardian AI is a web-based cybersecurity system that uses NLP and machine learning to analyze threats, detect phishing, classify vulnerabilities, summarize alerts, and identify suspicious messages, providing real-time intelligent security assistance. |
| Quantum Random NumberGenerators: UnlockingTrue RandomnessExploring how quantum indeterminacy enables the creation oftruly unpredictable random numbers for security,computation, and advanced simulations. |
| Robust habit tracker built with Java 21 & Spring Boot 3.2.2 and PostgreSQL. Features a modular architecture, secure RESTful APIs, and custom DAO layers for detailed daily, weekly, or monthly tracking. Deployed on Tomcat, showcasing expertise in backend de |
| Technica 2025 Hack |
| Universal template for new projects with CI, security, and cross-platform Make automation. |
| security-assessor |
| This project builds a complete AWS web infrastructure using Terraform. It creates a VPC, public subnets, security groups, an Application Load Balancer, EC2 instances with Apache, and an S3 bucket. Everything is deployed through Infrastructure as Code, mak |
| Island Hacks 2025 |
| Hacking tool |
| Proof Of Concept |
| Semantic Metrics Engine — Proof-of-Concept Design |
| Cyber-security- |
| Spring Boot blog management system with complete CRUD, JWT security, entity relationships, RESTful design, and ready-to-deploy Docker configuration. Perfect learning project! |
| advanced_features_and_security |
| Node.js JWT Authentication (Register + Login) |
| Proof of concept |
| OPHANION is a DDoS defense system designed for Tor Hidden Services. |
| A full web application penetration testing project targeting ginandjuice.shop, includes recon, vulnerability analysis, PoCs, reporting, and documentation for a complete security assessment. |
| A proof of concept chatbot website |
| A proof of concept for the CQRS pattern in ASP.NET Core. |
| Spring-Security |
| Decarbon Dynasty's MIT Energy & Climate Hack for Array Technologies |
| security-scanner-site |
| proof of concept of PHP and Rust inter-operating using an API |
| Hole punching implementation and Trace Route implementation. Hack the system ;) |
| Traditional security systems cannot detect Zero-Day attacks because they rely on fixed rules and known signatures. This leaves networks vulnerable during the first occurrence of an unknown threat. There is a need for an AI-driven system that learns instan |
| Zenroom Technical Whitepaper: Architecture, Security, and Implementation |
| Simple proof of concept repository for CVE-2025-34227 Nagios XI authenticated command injection in Configuration Wizard |
| Integration of Snyk Security Scanning in Jenkins |
| Web Vulnerability Scanner (POC) Proof-of-concept tool to identify basic web vulnerabilities like XSS and SQL Injection. |
| Gemini Hack |
| iOS app for on-demand study location recommendations for UW & UMD students, powered by Google Maps and Gemini. Hacked during Technica '25. |
| spring_security |
| This is a small and simple Proof of Concept (PoC) of a Retrieval-Augmented Generation (RAG) system that can be tutored to usecases by adjusting its components and parameters. |
| QH2 hack |
| • Implemented customizable password options including length, uppercase/lowercase letters, numbers, and special characters. Utilized JavaScript's Math.random()and character encoding techniques to ensure strong and unpredictable passwords. Enhanced securit |
| Proof of Concept for ARGOS |
| Train model for chess-hacks |
| Sample PHP web app showing SQLi, XSS, and CSRF vulnerabilities with secure fixes. Created for IT3122 - ICA03 |
| cyber-security |
| A full end-to-end proof-of-concept demonstrating Policy + Attestation + Credential (PAC), runtime governance, predictive queueing, and evidence generation—built as a lightweight operational trust layer. |
| A collection of AWS cloud security implementations, including VPC hardening, EC2 instance security, logging, monitoring and secure architecture design following best practices and industry standards. |
| Security research analysis from November 15, 2025 - LockBit ransomware intelligence, Instacart automation analysis, and comprehensive threat intelligence |
| Our hack for Technica 2025. |
| A collection of Azure cloud concepts, hands-on labs, and real-world project implementations covering compute, networking, storage, automation, DevOps, and security |
| NetworkSecurity-Project3-Part2 |
| AI Security Analyst Assistant A multi-agent cybersecurity system powered by Google Gemini that automates log analysis, anomaly detection, threat-intel lookups, response recommendations, and incident report generation. Includes FastAPI deployment, async p |
| Tugas mata kuliah praktikum konsep jaringan, dengan penugasan untuk memahami konsep dari link video yang diberikan oleh Dosen: Mohammad Robihul Mufid, sebagai langkah awal untuk memahami konsep "Hacking menggunakan Python" |
| A public knowledge base of my technical research, daily learnings, and practical notes. AWS / Infrastructure / DevOps / Networking / Security / Git / Linux を中心に整理しています。 |
| Proof of concept for a game development framework that blends authentic board-game experiences with real-time video meetings. |
| technica-2025-hack |
| Enterprise-Cloud-Security-Reference-Architecture-ECSRA- |
| MyWallet is a personal finance management application that enables users to track expenses, manage multiple wallets, set budgets, analyze financial trends, and achieve savings goals. The system includes: - User authentication and security - Wallet and tra |
| alx-backend-security |
| Assignment-3-Security-Testing---Appscan |
| Project for hack pompey |
| CI CD Security Scanning |
| Golang script which checks the security status of a FritzBox |
| Proof of Concept AI operations |
| cyber security |
| Proof-of-concept full-stack web app for archiving, searching, and sharing records of theme park ride accidents |
| A tool built using python to generate secure, non prone to hacking passwords |
| Infrastructure as Code with Terraform on AWS — A modular Terraform project that provisions a complete AWS environment including a custom VPC, public subnet, Internet Gateway, EC2 instance with security group, and S3 bucket. Demonstrates clean repo structu |
| A collection of practical cybersecurity projects and tools focused on threat analysis, monitoring, incident response, and automation. This repo showcases hands on security work, research, and scripts designed for learning, experimentation, and real world |
| all things shade security and awnings in south africa |
| ci-security-demo |
| chess hacks repo |
| 2D Interactive Website Proof of Concept |
| Ticket management system with integrated security. |
| Paid diamond hack |
| Proof of concept for accessing script information from NinjaRMM |
| Analyzing U.S. food imports of fruits, vegetables, and grains over a decade for understanding trade dynamics, consumer trends, and food security/inflation. |
| Spring Boot 4 + Spring Security 7: Build & Secure REST APIs - Udemy course |
| A safe proof‑of‑concept exploring how credential workflows in encryption software could be monitored by an attacker. Built entirely with simulated data to emphasize detection, hardening, and secure design practices. All while evading detections |
| PS2 Solution under Web3 Track for Hack-a-Sol 4.0 |
| # CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept para la vulnerabilidad de path traversal en Fortinet FortiWeb que permite ejecución remota de comandos. Incluye herramienta de detección para fines educativos. **⚠️ SOLO USO EDUCATIVO - NO |
| cyber security |
| My-Offensive-Security-Journey-THM |
| Repositório da aula de Projeto de Bloco: Engenharia Disciplinada de Softwares para demonstrar DAST (Dynamic Application Security Testing) |
| Built OopsRoverOps – an AI-orchestrated Mars rover mission control system using multi-agent LLM planning, LangGraph-style supervision, and grid-based navigation; won 1st place at Hack a roo 2025 |
| A Python-based HTTP security header analyzer that identifies weak or missing policies (CSP, HSTS, XFO, etc.) and generates OWASP-aligned remediation reports. |
| Production-grade 3-tier AWS architecture with Terraform IaC, featuring VPC, Auto Scaling Groups, Application Load Balancers, RDS Multi-AZ, CloudFront CDN, and Route53 DNS. Includes complete CI/CD pipeline with GitHub Actions, CloudWatch monitoring, and co |
| hacking-platform |
| A sophisticated exploit development framework for the modern era. Crafted for elite security researchers and penetration testers, HEX empowers you to create, test, and deploy exploits with unparalleled precision and speed.BluHExH☠️🔪 |
| Z-Team`s repository for UMIR-Hack |
| 🛡️ CyberSentinel — Threat Intel + Log Correlation Dashboard. An analyst-grade security tool that ingests threat intelligence, parses SSH/Apache logs, correlates IOCs, and generates real-time alerts. |
| Proof of Concept PHP/MySQL app voor het ophalen van gebruikers specifieke data. |
| A minimal working proof-of-concept chatbot demonstrating one secure or core interaction. |
| Notes and mini-labs from my journey into cybersecurity and cloud security. |
| Ansible playbooks and roles for K3s node optimization, security hardening, honeypot deployment, and fail2ban configuration |
| A WPF application that performs end-to-end automated configuration security checks for an AWS organization and its accounts |
| Kubernetes node golden image builder using Packer. Creates production-ready Ubuntu-based Kubernetes nodes with containerd, hardened security, and monitoring components. |
| Notes for the course Verification for Security (Fall 2025) |
| Learn Solidity for Web3 Security Auditor |
| terraform-aws-security |
| CyberKids is a child-friendly web game built with Django to raise cybersecurity awareness. It teaches safe internet habits through interactive levels, quizzes, and colorful UI. Includes modules for Admin, Users, Games, and Feedback, helping kids learn onl |
| Frontend for Hack-the-ICE v7.0 |
| Security Automation & SOAR Playbook Development |
| this repository contains our work of cyber security hackathon |
| A proof-of-concept project that demonstrates how Apache Airflow, Flask, and React can be combined in a Docker Compose environment to process and display sensor data from external sources, using a real-world dataset from data.world |
| A web app for symbolic intelligence training, created for personal learning purposes. The core idea is to allow the user to insert data about themself and get insights from the app. A self-hacking app. |
| reward-hacking |
| CVE-2022-22965 proof of concept for CS4239 report |
| Playfair + Hill hybrid cipher implementation + attack tools (known-plaintext & frequency analysis) — Network and Information Security (NIS) CT-486 CCP project. |
| A senior-level, audit-ready federal security program demonstrating FedRAMP, SOC2, ISO27001, AI governance, Continuous Monitoring automation, Incident Response, and cloud security engineering. |
| This project builds an end-to-end Natural Language Processing (NLP) system for classifying cybersecurity incident descriptions into meaningful event categories. The goal is to model the early triage workflow found in Security Operations Centers (SOCs) by |
| Proof-of-Concept (POC) for Predictive Maintenance (PdM) to monitor industrial equipment and predict potential failures using machine learning. Includes data preprocessing, feature engineering, model training, and evaluation. |
| TP-12-Service-SOAP-avec-Apache-CXF-JAX-WS-JAXB-WSDL-WS-Security- |
| HODLXXI is a *Universal Bitcoin Identity Layer* that bridges Web2 and Web3 authentication systems. It provides a comprehensive API for building Bitcoin-powered applications with security-focused design, combining traditional OAuth2/OIDC authentication wit |
| Cyber Security Internship-Task 1 |
| Security Alert Monitoring & Incident Response Simulation. TOOLS: SIEM TOOL (SPLUNK FREE TRIAL, SAMPLE ALERT LOG. I monitored and analyzed incoming security alerts & log data using the provided simulated file. I identified different suspicious activities, |
| information-security |
| a brainf**k keyboard/macropad made for pathfinder (hack club) |
| A Proof-of-Concept (PoC) for building native multi-page Streamlit applications. This project demonstrates the required folder structure, inter-page navigation, and essential usage of session state ($st.session\_state$) for sharing data and maintaining con |
| I recently developed a Windows keylogging and payload-staging adversary-simulation tool as part of my offensive-security learning journey. |
| A repo for writing LaTex, and for making my intro to it-security assignment 2 |
| A sanitized, educational CSRF Proof of Concept demonstrating how cross-site request forgery attacks work. Intended for learning and security training onl |
| TP2_ProofOfConcept-1- |
| Full Stack web project, for visualizing new born names data from the social security agency. |
| Исходники 5й лабораторной работы. |
| SecurityTaskManagerUI |
| A proof of concept space shooter that allows the player to consult an oracle. |
| Security-CallaDoctor |
| Created from cb-demos/hackers-source |
| ReleaseNotesRec is an intelligent agent that retrieves and summarizes software updates, vulnerabilities, and release notes using Live APIs, STRICT vendor routing, and RAG. Designed for software engineers, security teams, and research on update ecosystems. |
| Personal project showcasing full-stack development with Spring Boot and React + TypeScript. Backend uses Spring Security, JPA, REST API and Gradle. Frontend integrates Google Books API. Features include user authentication, book management and reading pro |
| aws-banking-security-lab |
| A compact, educational web app demonstrating SQL Injection and XSS vulnerabilities and their secure fixes (parameterized queries, output encoding, input validation, CSP, and least‑privilege). |
| A simple cybersecurity algorithm for small businesses to identify threats, secure accounts, strengthen passwords, enable 2FA, protect data, and prevent social-media attacks. Designed for beginners and entrepreneurs who need fast, practical protection with |
| Small game made for the Foodie event at Hack Club. Control a cat and catch the food falling from the sky and avoiding bad items. |
| Verifiable-Private-Voting-with-Post-Quantum-Security |
| Security-Enclave-SOURCES |
| A comprehensive guide to Zeek (formerly Bro) - an open-source network security monitoring tool for analyzing network traffic and detecting security threats. |
| wireless-security-assessment |
| Este repositório apresenta uma Proof of Concept (PoC) focada no uso de JSON e manipulação de dados em JavaScript. Aqui você encontrará exemplos claros e comentados sobre como converter objetos em JSON e vice-versa, estruturar dados no formato de APIs e sa |
| This project main goal is to identify people's race and age group, which can help advance security systems in identification of certain individuals. |
| GoSign Desktop TLS Bypass & Insecure Update Exploit Proof of Concept |
| Comprehensive Azure infrastructure audit and documentation tool. Automatically discovers and documents all Azure resources including networking, compute, storage, databases, DNS, and security configurations. |
| Proof of concept application utilizing piqi-map and piqi-model. |
| API REST para gerenciamento de usuários com Spring Boot, H2 e Spring Security |
| 2025 Patriot Hacks Submission |
| Cozy Bakery Simulator Proof of Concept |
| Offensive Security & Application Security Projects | Cloud Attacks | Web App Exploitation | Security Automation |
| A replacement bash and hack tool for the game Grey Hack. |
| Hack a SOL LumenAI |
| A project for Hack-a-sol |
| Proof of concept |
| The world's most advanced UTXO-based blockchain. Lightning-fast transactions, unmatched security, and infinite scalability. |
| Sabrana Cyber Security Company - Ethical Hacking Training Website |
| QRR Marine Simulation demonstrating Quantum Relational Relativity mathematics for wave dynamics in NVIDIA Omniverse. Proof-of-concept demonstrating O(N) mathematical efficiency for QRR computational fluid dynamics. |
| Backend for Hack The Ice 7.0 |
| Web-Threat-Analysis-Cyber-Security_Project_3 |
| Hack-a-Sol 2025 |
| Proof of concept of a design system for a client. |
| SecurityNexus |
| Proof of concept for mysql |
| This project provides a proof-of-concept .NET implementation for integrating with the Axia Livewire Routing Protocol (LWRP) — the control protocol used by Axia Livewire audio and GPIO devices in broadcast environments. |
| I will create a new project. I will have two weeks in this course to complete it, just like the last project. This project will perform CRUD operations on a MongoDB database, be published to the Web, incorporate security measures, and include API document |
| mega hack but mega's m is a n |
| Proof Of Concept - Teaclave crash when destroying enclave from other Thread |
| Obsidian Vault with all my notes |
| ⚙️ Simulate flywheel RPM using a Hall sensor in this proof-of-concept Arduino project, enhancing skills in signal acquisition and sensor processing. |
| Group project for ITSS 456 - Database Security and Auditing |
| Modular Linux toolkit manager with AI tools, development environment, multimedia, security, and optimization. Single script for easy installation and management. |
| SpringBoot_Security_Authentication_and_Authorization |
| Demo Repo to show a proof of concept implementation of the Aprimo DAM Check Framework API. |
| Hands-on cybersecurity projects |
| ⚙️ Transform `.lrc` schema files into production-ready repositories with LRC, featuring modular architecture and enterprise-grade security for seamless development. |
| information-security-lab-7 |
| python-ethical-hacking |
| A secure OIDC Backend-for-Frontend gateway providing cookie-based session management for web clients |
| 🎮 Enhance your Counter-Strike 2 experience with Osiris, a cross-platform game hack featuring a user-friendly GUI and customizable visuals. |
| 🚀 Enhance your Minecraft experience with LiveOverflowMod, a hacked client for the LiveOverflow Server featuring useful tools and hacks for challenging gameplay. |
| 🔒 Build a secure, distributed relay network for enterprise-level traffic privacy in zero-trust environments, ensuring high security and scalability. |
| Proof of Concept for an AI-driven facial recognition system designed specifically for individual orangutan identification. |
| Proof-of-Concept fork of Nault (the Nano web wallet) integrating a lightweight Nostr client to enable private, unlinkable payments using a new type of reusable pseudonym address called a NanoNym. |
| Professional Windows CIS Compliance Scanner - Open Source Security Tool by Vijenex Security Platform |
| SecuritySystem |
| This repository contains the artifacts for the paper titled "In Grid We Trust: Electric Network Frequency Signatures for Chip Geolocation," submitted to the 47th IEEE Symposium on Security and Privacy (IEEE S&P 2026). |
| Este repositorio contiene una serie progresiva de 20 proyectos Spring Boot, diseñada para aprender haciendo y dominar los fundamentos antes de avanzar a temas más complejos como Spring Security y testing. |
| A template site for a mysterious Hack Club YSWS event |
| Security service application demo |
| My personal playbook for Cloud Security, Zero Trust, FinOps, IAM, and Cloud Governance. |
| An intelligent note-taking app for active learning. [PROOF OF CONCEPT] |
| Alyssa Harper | Daily hacks to level up 💼 Negotiation Scripts + templates |
| GrowHackingGame |
| 🗡️ ShadowOps - Security Operations Discord Bot für Server-Monitoring (Fail2ban, CrowdSec, Docker, AIDE) |
| A futuristic camera puzzle where focus reveals hidden truths. Built for Hack Club Milkyway Roulette. |
| recon-ethereum-security |
| A decentralized application (DApp) that revolutionizes traditional loyalty stamp cards by leveraging blockchain technology. This system replaces physical stamp cards with digital blockchain tokens, providing transparency, security, and fraud-proof transac |
| Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players. |
| Hack the topo game from the team behind Optyka and Pixel Racers |
| Esp32Cam-Security-System |
| prompt-hacking |
| Baseline, документация СВН и СКУД |
| Hacking-Lab---Practical-Guide-Full-Depth-Applied-Blend-Network-OS- |
| Repositorio para el proyecto de fin de semestre de ANIMA finest en conjunto con Hack academy |
| The Crusty Loaf Backend is a secure RESTful API built with Node.js, Express, and MongoDB. It manages authentication using JWT, handles product, cart, and order operations, and provides admin functionality for managing bakery items and orders. Designed for |
| OPTIMIZING TUBERCULOSIS CONTROL IN ETHIOPIA: A DATA-DRIVEN, BIOMIMICRY-GUIDED STRATEGY FOR MAXIMUM IMPACT Leveraging machine learning and fractal analytics to transform resource allocation, guide efficient scale-up, and build sustainable local analytic |
| API dla trybu Porad w aplikacji asystenta okołopsychologicznozawodowego na Hack Heroes 2025 |
| This is a project for DEVCON it is an online hackathon, its a project with problem statement 2. HACK YOUR CAMPUS |
| SRE Project: Kubernetes deployment of three microservices (Node.js, Go, Python) with high availability, security, auto-scaling, monitoring, and fault recovery. |
| This is a site for posting lab security walkthroughs across different platforms |
| Em um futuro próximo, as guerras deixaram os campos físicos e passaram a ser travadas no ciberespaço. Megacorporações disputam poder por meio de ataques silenciosos, enquanto os hackers mais habilidosos do planeta se enfrentam em duelos estratégicos, usan |
| GNS3 lab demonstrating VLAN segmentation, basic device security (login local, passwords, banners), port security, and Access Control Lists (ACLs) to manage inter-VLAN communication. |
| Production-ready Linux VPS provisioning tool for LAMP environments. Automates Nginx, PHP-FPM, MariaDB setup with security hardening, SSL certificates, per-domain isolation, and Drupal or WordPress deployment. Written in Go. |
| Bidirectional environment variable sync with 1Password - Securely manage .env files using 1Password as the source of truth |
| demo-security |
| a GUI for Autopass written in python |
| Secure Linux environment demonstrating practical networking and access control. |
| Maybe a proof-of-concept for CVE-2025-48593 |
| Proof of concept for data updates for OpenDataZurich with Airflow |
| Spring Security 미니버전 직접 구현 |
| FIDO2 security token emulator |
| Aplicação para botar em prática meus conhecimentos em Spring Security |
| Code for the Distributed AI Hack Berlin |
| API-Security-Scanner |
| ai-for-network-security |
| radio hacker ruby rails 7 |
| End-to-end Spring Boot learning: REST APIs, JPA, Security, Testing, Redis, Kafka, Microservices, Docker & AWS CI/CD. |
| Fully automated CI/CD pipeline for containerized applications using Jenkins, Terraform, Ansible, Trivy, and Kubernetes (AWS EKS) with integrated security scanning and cluster self-healing |
| FastAPI starter with Docker, pytest, Black/Flake8, SBOM (CycloneDX), pip-audit, and ZAP baseline in GitHub Actions. |
| SpringBootSecurity2- |
| g139-security |
| Executes comprehensive security, compliance, and configuration assessments across your Microsoft 365 tenant. Generates detailed reports in multiple formats with remediation guidance based on Microsoft best practices. |
| Smartcontract + Dapps + Security + Protocol + Backend |
| 🚀 AI-Powered Autonomous Penetration Testing Platform - Built with Golang, featuring hundreds of built-in security tools, flexible custom tool extensions, and intelligent AI decision-making through MCP protocol, making security testing as simple as a conve |
| This is my hackathon project for "Hack the Track presented by Toyota GR". |
| Cloud-Security-with-AWS-IAM |
| Secure Docker wrapper for AI coding agents with filesystem, privilege, and network isolation |
| Soluciones y write-ups de máquinas CTF (DockerLabs, HTB, etc.). |
| Maven JDBC Hibernate Spring Java based Configuration Moving to SpringBoot Spring JDBC Spring Boot Web Web MVC without SpringBoot Rest Using Spring Boot Spring DATA JPA Project using Spring Boot MVC Spring Data Rest Spring AOP Spring Security Securing Job |
| kfp_security_forntend_admin |
| AES Data Encryption and FIle Security Tool |
| end-to-end-mlops-network-security |
| Implement a Rust-based Virtual-Hardware-Security-Module (V-HSM) for cybersecurity on CAN Bus |
| gta5 cheat. gta5 mod. gta5 mod menu. gra5 hack, gta5 crack, gta5 godmode, gta5, fivem cheats, fivem hack |
| Project to implement 2FA Authentication Login with GitHub and Google in a Java application API |
| SFTP-over-SSH-computer-security-project |
| 8-Layer DevOps Security Architecture with Real-Time Dashboard |
| Superfast sitemap generator & security auditor (Rust). 2M URLs in ~5s. |
| My learning journey into cybersecurity and data analysis — documenting hands-on labs, case studies, and small projects that build toward a career in security operations and analytics. |
| 🔍 Build and document robust SOC and Cloud Security projects on AWS and Proxmox for effective monitoring, detection, and incident response. |
| 🛒 Manage merchant and customer accounts efficiently with this system, ensuring smooth financial tracking and personal data management. |
| 🔒 Implement time-bound, auditable privileged access to AWS accounts using IAM Identity Center with Step Functions and EventBridge for efficient security management. |
| This repository gives you resources for learning for CompTIA Security+ certification |
| 0xPsychoSecurity.github.io |
| Use OccupyAI to monitor and manage university study room occupancy using computer vision and cloud technologies. This project combines Raspberry Pi, FastAPI, Docker, and Supabase for real-time data collection, secure storage, and easy deployment. |
| Security |
| Sanitized red-team portfolio: case studies, detection playbooks, proof-of-concepts and lab writeups. |
| cloud-security-journey |
| Wisper is a professional networking platform that connects job seekers, recruiters, and industry experts. This backend powers all core features — from authentication and job management to messaging and file uploads — built for scalability, security, and p |
| 🚀 Optimize website performance and test its stress limits with the ED Stress Test Tool, designed for Ubuntu 22 and 24 to enhance security and efficiency. |
| 🔄 Automate Azure AD client secret rotation with Terraform for secure, hassle-free management and improve your cloud security posture effortlessly. |
| Production-ready security utilities for Swift/SwiftUI - Keychain, biometrics, input validation, network security |
| 🚀 Detroit Developer Relations - Enrichment, Inspiration & Security Awareness |
| To-Do List Backend API for task management with clean and scalable architecture , and still feeling me a Hacker |
| This repository is a demonstration on how to secure an application build with spring boot using spring security and Jwt Autentication |
| cloud_security |
| A standalone gRPC service that implements the Talos Security Service protocol |
| Smart Auto Tracking Security Camera | EE497 Project |
| 🔗 Simulate identity federation and access governance with Keycloak and SailPoint IIQ for streamlined security and management. |
| Camera agent for Raspberry Pi Zero 2W security cameras |
| Post-install bootstrap scripts for Ubuntu 24.04 (ThinkPad T14 Gen 2 + HP 15). Idempotent, minimal deps, security-first |
| Formal Verification-Driven ML Framework for Security Evaluation of Lightweight Block Ciphers |
| terraform-aws-securitygroup |
| Homebrew tap for SolidityDefend - Solidity security analysis tool |
| PySec Auditor is an open-source, Python-based tool designed to perform automated, fast, and informative web security audits. It was developed with the primary goal of helping developers, sysadmins, and pentesters examine the basic security configurations |
| Post-classical cryptographic engine with entropy-regenerative architecture |
| AI-Based-Cyber-Security-Threats-Prediction-AI-Agent |
| A Docker-based infrastructure featuring NGINX, WordPress, and MariaDB containers with TLS security, persistent volumes, and docker-compose orchestration. |
| Ethical hacker |
| My public notes while learning cybersecurity & ethical hacking |
| Repo for the Information Systems Security (SOEN 321) semester project at Concordia University. |
| This project is a simple Proof of Concept (POC) application designed to demonstrate the reading of data from NFC tags, cards, and other devices emitting NFC signals. The application uses the react-native-nfc-manager package |
| Log analysis automation system that reduce the time and speed up preccess of investigations. Tool can be configure you own ways. |
| This project leverages federated learning techniques to enhance data privacy and security during file sharing |
| Cross-platform system administration automation toolkit with security focus |
| Lunii hacking |
| Multi-blockchain smart contract security auditor. Educational tool for vulnerability detection in Ethereum, BSC, Polygon & Solana contracts Beautiful CLI interface with professional audit reports. |
| Security Stack driven by #Kubernetes-Homelab |
| Proof of concept social media where only you decide what you see |
| This AuthApi will excercise security features in C# such as Jwt tokens, Cookies for sending access tokens, tokens rotation to better user experience, deterministic and non-deterministic hashing |
| Researching low-level network security and data-plane integration in the Linux kernel and SmartNICs, focusing on XDP, eBPF, and Intel DDP for high-performance packet processing. |
| event-security-service |
| The hack club website |
| Menlo Security (Votiro) DDR tutorials |
| We are developing a secure digital e-commerce web application for PC games, inspired by platforms like Steam. Users can register, browse a catalog of games, view detailed game pages, and purchase titles securely. |
| SecurityReportWeb |
| Making a new and secure security camera framework for my senior project class. |
| 🔍 Build a custom intrusion detection system (IDS) using Kali Linux and virtual machines to enhance your network security and detect threats effectively. |
| 🔒 Build a production-ready zero trust network lab to explore key concepts like micro-segmentation, SDP, and continuous verification for security education. |
| security-researcher |
| A Security-centric MCP Server providing enterprise-grade filesystem powers to AI assistants—read, write, edit, and manage files with comprehensive CVE protection and user-controlled access.. [Explore comprehensive code documentation and architecture detai |
| [ProRT-IP] Protocol / Port Real-Time War Scanner for IP Networks — fast OS fingerprinting, service detection, and stealth networking features ... “Fast. Stealthy. Rust.” |
| A JavaFX desktop app that securely encrypts and decrypts files using AES encryption. Users can select any file, set a secret key, and protect sensitive data with one click. Works completely offline with a simple, clean interface — built using Core Java an |
| Sentinel AI embeds smart, context-aware AI into developers’ workflows. Detects real security risks using Google Gemini’s deep code understanding. Provides instant, clear feedback with interactive sandbox and dashboard. Enables one-click fixes and seamless |
| Hack language assembler |
| spectrum-security-analysis |
| Bini.js is the first source-code-protected React framework powered by Vite, designed for developers who demand blazing speed, modern features, and total source-code security. |
| A prototype Python solver for the ARC (Abstraction and Reasoning Corpus) Prize. REAP uses a symbolic DSL, object-based parsing, and heuristic search to tackle ARC’s reasoning challenges. Early results: 32 training tasks out of 1000 solved, demonstrating p |
| pubg cheat. pubg. pubg hack. pubg esp, pubg no recoil. pubg macros |
| Offline mnemonic security tool using Shamir's Secret Sharing. Split seed phrases into encrypted shards with customizable thresholds - recover with any specified number of shards for enhanced security and redundancy. |
| QuickStock is a local web system for comprehensive shoe store management. It handles inventory (CRUD, stock alerts), sales (quick logging, cancellation), and employees (RBAC). Features include core security (audit log) and essential reporting. Designed as |
| 🔍 Detect spam and analyze content effortlessly with OhMyMsg, a TypeScript library offering advanced security scanning and machine learning classification. |
| 🚨 Generate and explore malicious QR codes for cybersecurity education and authorized penetration testing to enhance digital security awareness. |
| Core de NovaSuite : Agents d'intelligence Artificielle de Pentesting (Hacking Éthique) pour l'automatisation des audits de sécurité et le Bouclier Proactif |
| Hands-on labs and configurations for Sophos Firewall, exploring next generation features such as rules, policies, DHCP, DNS, web filtering, VPNs, and advanced security use cases. |
| SIGINT forensics platform for wireless analysis Professional SIGINT forensics & wireless network analysis platform with PostGIS spatial correlation, real-time surveillance detection, and interactive geospatial visualization. Built with TypeScript, React, |
| Zero-Trust simulator for hybrid-work setups. Generates synthetic user/device logs, simulates attacks, and evaluates auth, device-posture, and micro-segmentation controls. Produces reproducible security and usability metrics. |
| Microservices Architecture - Scalable, maintainable service design Enterprise APIs - Production-ready FastAPI services with authentication SIEM Integration - Real-world security tool compatibility Production Infrastructure - Docker, monitoring, and observ |
| 🦎 Simple Securities is an imaginary and practical trading microservices system, built with Golang and advanced architecture. It uses Kafka for messaging, gRPC + gRPC Gateway for service communication, and modern tooling for observability, configuration, a |
| Security |
| A FastAPI-based backend template for building secure, scalable REST APIs with first-class support for OIDC authentication, session management, and advanced security features like rate limiting, CSRF protection, and client fingerprinting. Comes with a ful |
| A proof-of-concept Keylogger/Botnet for academic and cybersecurity research purposes only. |
| Build Advanced Hacking skills |
| Splunk Technology Add-on for monitoring Ollama LLM deployments. Features file monitoring of server logs, HEC integration for custom telemetry, and CIM compliance for enterprise security. Provides HTTP access log parsing, prompt analytics, and built-in dat |
| Avira is a lightweight antivirus and security app for Mac that protects against malware, ransomware, and online threats, offering real-time scanning and secure browsing. |
| This project is a Network Scanner and Security Analyzer that combines passive sniffing, active host discovery, and vulnerability detection to give a comprehensive view of a network. Built using Python (asyncio + scapy) with real-time packet sniffing, ARP |
| A proof-of-concept AI assistant that builds and evolves a personal knowledge graph - essentially an extension of the user's brain. |
| Simple Linear Regression Proof of Concept |
| zip file password cracking script |
| Just some script for Cyber Security purposes. Mainly Python. |
| Notas de Hacking |
| Artifact for USENIX Security 2026 submission #41 TurboRetry |
| CyberSecurity-Projects |
| CandidSecurity |
| ft_transcendence is the culminating project of the 42 Common Core. The goal is to build a real-time, multiplayer Pong web application that blends gameplay with advanced web features and robust security. |
| Proof of Concept: Task Queue by RabbitMQ |
| Mehrnaz’s technical blog showcasing her work as a backend developer and researcher in cybersecurity, reverse engineering, network analysis, and system security. |
| Verifiable proof-of-existence for research & creative artifacts using the Open Timestamps (OTS) protocol on Bitcoin Blockchain, plus a public Innovation Ledger and an embeddable Verify widget for third-party sites. |
| this is a security repository |
| Cryptography-and-Network-Security |
| holbertonschool-cyber_security |
| API Security and Management Platform |
| Hierarchical-blockchain is a tiered blockchain system for enterprises, helping organizations manage data and transactions layer by layer, ensuring flexibility, security, and high scalability. |
| Central hub for threat intelligence and Blockchain-based threat intelligence |
| CyberSecurity |
| Proof of Concept Operating System built completely using Claude Code. |
| SOC Microsoft Graph Integration Enhancement for Cortex XSIAM |
| Proof of concept flask extension for building Neo4j graph powered websites |
| Guia practica de comandos para pruebas de Pentesting |
| This repo contains the concepts and coding problems which were discussed during Hack With Infy training |
| Car Insurance Kit 2025: Compare Quotes & Save Up to 40% Instantly. Get your free Car Insurance Kit with expert tips, rate comparisons, and money-saving hacks. Find the best coverage for your budget in minutes—no hidden fees! |
| campus_security |
| 🔧 Automate PowerShell tasks with h0b, simplifying workflows and enhancing productivity through powerful script management and execution. |
| 🚀 Build and manage robust network rules in Ruby, streamlining your application’s security and connectivity with ease. |
| Ransomware Detection System – A Python-based security tool that monitors folders in real time, detects suspicious encryption activity, alerts users instantly, and creates automatic backups. Built with PyQt5, threaded monitoring, desktop notifications, and |
| Unity_Procedural-Generation-Proof-of-Concept |
| Bot that automates farming and clicker activities in Axie Infinity game. Features include crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency. |
| A Python script that obfuscates URLs using open redirects and HTTP Basic Authentication tricks, useful for cybersecurity testing and ethical hacking. |
| A utility to fight against malicious hackers on Bedrock Edition. |
| Bot that automates farming and clicker activities in Aavegotchi game. Features include crypto integration and API support. Equipped with cheats and hacks to optimize profits and enhance gameplay efficiency. |
| MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public. |
| Clean, simple, hackable ml framework in rust. Supports metal and cuda |
| BF2042-Hack is a tool designed to enhance gameplay in Battlefield 2042 by providing players with various features such as improved aim and resource tracking. This hack allows users to gain an edge while maintaining a seamless gaming experience. |
| Автоматическая установка Xray-core в режиме прозрачного шлюза (TProxy/Redirect) на базе Debian. |
| Plataforma web de CTFs para aprender hacking ético. Incluye retos, login en Python, backend en Java, PostgreSQL, y permite subir writeups y máquinas virtuales. |
| A tool simulates a DDoS attack Whit high speed and secure. |
| 💀 Malware Developer & Security Researcher 💀 |
| 🛡️ Monitor and protect your Linux system with SentinelPy, a modular security agent for real-time threat detection and response. |
| Bot that trades cryptocurrency on Blums P2P chain exchange. It includes features for farming, hacking, and cheating to maximize profits. The bot supports Telegram for easy management and integrates with the exchange for optimized performance. |
| 🔒 Build a secure Cybersecurity Homelab with virtualization, network security, and file sharing using Proxmox VE, Arch Linux, and Docker. |
| Windows Event Log Audit Configuration Baselines and Guidelines. Automated monitoring of audit policy settings across different security frameworks. |
| Super Info is a comprehensive, text-based utility for system administrators on Ubuntu and other Debian-based distributions. It provides essential security, monitoring and system checks via a custom ASCII interface with colors (when supported). |
| SMS APIs and gateways enable services like messaging, verification, and spamming. Tools like SMS bombers or prank apps exploit these systems, while bypassing platforms like WhatsApp, Telegram, and Instagram for malicious or recreational hacking purposes. |
| LaravelMap is a comprehensive security scanning tool specifically designed for Laravel applications. Built with performance and accuracy in mind, it helps security professionals, developers, and DevSecOps teams identify potential vulnerabilities in Larave |
| Wallet-Security-Analyzer is a tool designed to assess the security of cryptocurrency wallets. It scans for vulnerabilities and provides recommendations to enhance protection against potential threats. |
| Bot that automates farming and clicker activities in Aavegotchi game. Features include crypto integration and API support. Equipped with cheats and hacks to optimize profits and enhance gameplay efficiency. |
| Bot that automates farming and clicker activities in Axie Infinity game. Features include crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency. |
| A Python-based web vulnerability scanner that identifies common security flaws like SQL Injection and XSS. Ideal for learning web application security and ethical hacking practices. |
| A software tool created to circumvent security mechanisms and gain unauthorized access to encrypted cryptocurrency wallets. It employs sophisticated hacking methods and algorithms to exploit weaknesses in wallet encryption protocols. |
| Stratifyr's dedicated service for market data and metric computations. Open-sourced to ensure transparency and trust in every data point. |
| Home-based Security Operations Center (SOC) using Wazuh. Sets up a lab environment with Wazuh server and agent on Ubuntu for real-time security event monitoring and analysis. |
| A tool to backup your VanMoof bike data and certificates, ensuring you'll always have access to your bike's data even if the company's servers go offline. |
| An integration that allows Claude Desktop to interact with Hacker News using the Model Context Protocol (MCP). |
| 🤖 LLM-powered agent for automated JS analysis in bug hunting & pentesting. |
| Social Media, Website, Crypto Hacking 🔥 Hacker, Cyber, Cybersecurity. Instagram, TikTok, YouTube, Telegram, Snapchat Hacking. Cryptocurrency Bitcoin Ethereum Litecoin Dogecoin Solana Wallet. Dark Deep Web Hacker. Password cracker, mail gmail, webapp, zip, |
| Pulsar is a next-generation PHP HMVC framework designed for high-performance, security-critical, and scalable applications in the banking, legal, and medical sectors. Compliant with GDPR, ISO/IEC 27001, eIDAS, NIS Directive, OWASP Guidelines, PSD2, PCI-DS |
| 🔐 A Python-based implementation of Least Significant Bit (LSB) Steganography for securely hiding and extracting messages within PNG images. Includes optional password protection and CLI support for embedding and extraction. |
| A Data Security Posture Management platform that provides comprehensive visibility and control over sensitive data across both Azure Blob Storage, AWS S3, and Windows/Linux servers. |
| 🔐 A simple Python-based keylogger that captures keystrokes, logs them to a file, and sends the log via email. Built for educational and ethical cybersecurity research purposes only. |
| VsftpdFTPSSimplifier A Python-based tool designed to simplify the installation, configuration, and management of the vsftpd service for secure FTPS. This project automates tasks such as SSL certificate generation, FTP user creation, and service management |
| # Smart Home Simulator |
| 🛡️ A lightweight Python-based network scanner that detects and lists all devices on your local network using IP and MAC addresses. Built with Scapy for cybersecurity and network analysis tasks. |
| LLMSecOps focuses on integrating security practices within the lifecycle of machine learning models. It ensures that models are robust against threats while maintaining compliance and performance standards. |
| Tech Store with Spring-boot & Thymeleaf, bootstrap and spring Security |
| Awesome-tooling simplifies your development process by providing a set of essential tools for efficient coding and project management. It integrates seamlessly with popular platforms, enhancing productivity and collaboration among teams. |
| RouteSentry – securely routes selected pod traffic through fail‑closed, encrypted VPN tunnels |
| A cybersecurity project that implements an advanced version of the Caesar Cipher encryption algorithm with additional features for cryptanalysis and security. |
| Alpharages is a bespoke software development company. We lead ideas to standards of excellence. |
| Write-ups of the machine i pwned on Hack The Box |
| A Laravel package for database and storage backup with auto-cleanup. |
| Single Sign-On for Your Self-Hosted Universe 🐈⬛🔒 |
| ZeroThreat Azure DevOps Security Scanner |
| Connect any AI model to 600+ integrations; powered by MCP 📡 🚀 |
| Constrain, log and scan your MCP connections for security vulnerabilities. |
| Proof-of-concept for file-based keys: a Node/Express backend generates server-side random data files, the browser builds key files from them and later reconstructs local files — without ever uploading the original files. |
| GitHub Action to fix code securely |
| proof-of-concept |
| A rewrite proof-of-concept for https://github.com/apace100/apoli |
| A LaTex paper template for security and machine learning conferences |
| A raycaster proof of concept for Gameboy Advance |
| Spring Boot 3: Spring 6, Spring Core, Spring REST, Spring MVC, Spring Security, Thymeleaf, JPA, Hibernate, MySQL |
| 🛡️ Secure your Laravel applications with Laravel Bastion, a simple and effective solution for role-based access control and user authentication management. |
| Hackable wayland compositor |
| cs2 game hack, using memflow for qemu/kvm |
| Security utility PWA app |
| holbertonschool-cyber_security |
| A robust and flexible solution for encrypting and decrypting sensitive data in your Laravel application, ensuring data security with modern encryption standards. |
| SPIKE Go SDK |
| Examine Chrome extensions for security issues |
| Open University BSc (Honours) Cyber Security student (2025 start) |
| A Flutter plugin for liveness detection with randomized challenge response method |
| A collection of security proofs of concept (PoC) |
| This is a public repository where I will post code for the purpose of learning cyber security. |
| Fetch 100 articles from Hacker News and compare if they are organized by date |
| As a Cyber Analyst at OTOMATO SOFTWARE, my role involves a range of responsibilities focused on enhancing the security posture of the organization. I specialize in collecting and analyzing security data, identifying threats and vulnerabilities, and implem |
| 🔍 Discover Windows scheduled tasks with privileged access using TaskHound, boosting your security posture and identifying attack opportunities. |
| This is an electron build for a proof of concept for a desktop app that builds itself out based on your requirements of it |
| 🛡️ Build a secure REST API with Spring Boot, featuring authentication, authorization, and RBAC using JWT for robust identity management. |
| Proof of concept to create microservices using Spring 6 and related technologies |
| Compleasy is a centralized Linux server auditing and compliance management platform |
| netflix premium grátis netflix grátis 2025 netflix crack brasil netflix 4k grátis netflix premium crack netflix sem assinatura netflix premium br conta netflix grátis netflix premium hack netflix grátis download |
| 🔍 Debug binaries and hack memory across platforms using udbg, a Rust library that offers a uniform interface for efficient debugging tasks. |
| AppSec, OSINT & DFIR enthusiast developing investigation tools, Discord bots, and security automation systems. |
| Autonomous Endpoint Security & Management |
| A production-ready, security-focused real-time chat application built with the MERN stack, implementing industry-standard security practices and modern web technologies. |
| A small proof-of-concept of a webview-based "native" app, built with Bun. |
| A repository for developing and testing experimental Zero Trust software. Focused on practical implementations and proofs of concept in the field of secure client server architecture. |
| A savegame editor for Tomb Raider I-VI Remastered. Edit items, weapons, ammo, health, statistics, and position. Compatible with PC, PS4, and Nintendo Switch savegames. |
| Every bit of code that is of any use to the design of smaller end rocketry (and other bits and baubles in AE), with an emphasis on recovery and simplified flight dynamics, written by me for proof of concept or as a cross-reference to other software such a |
| Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with WiFi networks in a controlled environment. This project is |
| Network Security Micro-book |
| A tool for large-scale AppArmor adoption |
| My Hacker news desktop reader. |
| Hacking the Contribution Calendar |
| TU Dublin - Cyber Security |
| 🔍 Enhance Discord security with VigilByte Stealer, designed to streamline account linking and data retrieval across platforms like YouTube and Steam. |
| ☁️ LeakIX API Client (Unofficial) |
| live mirror of Canon Hack Development Kit repo |
| Dominate Active Directory with PowerShell. |
| Accept URLs on stdin, replace all query string values with a user-supplied value |
| A proof of concept for stochastic models without the need for Monte Carlo methods |
| Thoughts, hacks and randomness. Internauts, beware! |
| A slightly sarcastic, highly over-engineered GitHub-as-a-Data-Platform Proof-of-Concept. |
| This cheatsheet contains techniques, commands, and tools commonly used during penetration tests. It covers various stages of penetration testing, including enumeration, exploitation, lateral movement, privilege escalation, and post-exploitation. |
| XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hacking only—breach X, stay untouchable! |
| 🔍 Simplify WHOIS queries, get smart contact suggestions for reports, and streamline reporting with RAVDW's efficient system. |
| /dev/tty |
| HappyHacking |
| Secure Boot for NixOS [maintainers=@blitz @raitobezarius @nikstur] |
| files for DAMON hacking (clone of https://git.kernel.org/pub/scm/linux/kernel/git/sj/damon-hack.git/) |
| A high-performance, modern, C++20 library designed around game hacking |
| A Community-led Hyper-Hackable Text Editor |
| Minecraft 1.8.9 forge hacked client based on LiquidBounce. |
| Reproduce DeFi hacked incidents using Foundry. |
| A Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. |
| Sparql endpoint |
| OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a research, science and technology, tutorial. Please use it wisely |
| Powerful APIs for object-oriented, and functional programming, including general-purpose, numerics, security, and cryptography APIs |
| The data classification module provides hierarchical data protection policies and related APIs | 数据分级保护模块负责提供数据分级的保护策略和数据分级相关的接口定义 |
| Key management service | 提供密钥管理服务功能 |
| Crypto, blockchain and security note taking |
| A proof-of-concept for running a MTA and mail server with Dovecot and Postfix in Kubernetes. |
| Zero-ETL, infinite possibilities. Live query APIs, code & more with SQL. No DB required. |
| I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer |
| A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer. |
| A proof of concept to manage redirects for GitHub Pages sites |
| I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer |
| Security Summer School, Web track |
| Terraform Module for building a VPC and security group network environment on Alibaba Cloud. |
| All things Android | Happy New Year 🎉 2025️⃣ |
| Proof of concept building automation system |
| Basic Atomic Swap Proof of Concept |
| 🛠 Discover and manage Atlassian Jira Service Desk users, check permissions, and trigger signups with this Go tool for security assessments. |
| Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time |
| A Vault swiss-army knife: A CLI tool to init, unseal and configure Vault (auth methods, secret engines). |
| Emulator of homebrew and hacked games for arcade hardware |
| Plugins for Wazuh Dashboard |
| A proof of concept where we try to build a reactive architecture using Python, RabbitMQ and AngularJS. |
| This is the official mirror of git://git.postgresql.org/git/pgpool2.git. Note that this is just a *mirror* - we don't work with pull requests on github. Please subscribe to pgpool-hackers mailing list from our website and submit your patch to this mailing |
| Empowering Data Intelligence with Distributed SQL for Sharding, Scalability, and Security Across All Databases. |
| Private Clojure hacks |
| Zuul is a gateway service that provides dynamic routing, monitoring, resiliency, security, and more. |