TryHackMe Advent of Cyber 2024 (All Tasks Write-up, Updated Daily) 🎄 | by Daniel Iwugo | Dec, 2024 | InfoSec Write-ups
TryHackme’s Advent of Cyber 2024 — Day 01 Writeup | by Nanda Siddhardha | Dec, 2024 | InfoSec Write-ups
Firmware Penetration Testing Checklist | by Ajay Naik | Dec, 2024 | InfoSec Write-ups
iDRAC to Domain Admin. Hello all! | by Jevon Davis | Dec, 2024 | InfoSec Write-ups
INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million
Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges
How AI is transforming human risk management
Data scientists create tool to spot fake images
5 Strategies to Combat Ransomware and Ensure Data Security in Microsoft 365
Securing Open Source: Lessons from the Software Supply Chain Revolution
Artificial Intelligence - Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Machine Learning - Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Blockchain - Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
5 reasons to double down on network security
TryHackMe Advent of Cyber 2024 (All Tasks Write-up, Updated Daily) 🎄 | by Daniel Iwugo | Dec, 2024 | Medium
The World’s First OSCP+ Exam Review | by Tunahan TEKEOGLU | Nov, 2024 | Medium
Exploiting Facebook Ads: $2100 Bug Bounty for Role Management DoS | by Kiril Krivoguz | Dec, 2024 | InfoSec Write-ups
World Wide CTF 2024 | Forensics Challenges | by أحمد ناصر | Dec, 2024 | Medium
How threat actors can use generative artificial intelligence?
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22
Why Simulating Phishing Attacks Is the Best Way to Train Employees
Novel phising campaign uses corrupted Word documents to evade security
newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION
THM Sticker Shop Walkthrough. Exploiting Blind XSS to Capture the… | by 0verlo0ked | Nov, 2024 | InfoSec Write-ups
Exploiting Facebook Ads: $2100 Bug Bounty for Role Management DoS | by Kiril Krivoguz | Dec, 2024 | InfoSec Write-ups
OSINT Guide for Tracking Malware and Ransomware Activity | by Jason Jacobs, MSc. | Nov, 2024 | InfoSec Write-ups
Faster Than Dilithium And Much Smaller Keys: Meet FAEST | by Prof Bill Buchanan OBE FRSE | Nov, 2024 | Medium
Android Pentesting: Unleashed Exploring Mobile Vulnerabilities | by th3.d1p4k | Nov, 2024 | Medium
Hackers stole millions of dollars from Uganda Central Bank
Top AI Trends of 2025 Businesses Should Be Ready For
SpyLoan Android malware on Google play installed 8 million times
FBI-Wanted Hacker Behind Global Ransomware Attacks Arrested in Russia
SpyLoan Android apps on Google play installed 8 million times
The Sticker Shop | TryHackMe | Walkthrough | by Shakhawat Hossain - 0xShakhawat | Nov, 2024 | Medium
Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia
Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested
How I found 4 IDORs in the same target | by Ahmed Hussein | Nov, 2024 | Medium
Advanced Google Dorking | Part7. Wordpress CMS Information disclosure | by AbhirupKonwar | Nov, 2024 | System Weakness
Network monitoring for AWS. Hey everyone, today we will be going… | by Dhiraj Ambigapathi | Nov, 2024 | Medium
GenAI x Sec Advent. 24 Days of AI Shenanigans in Cyberland | by Thomas Roccia | Nov, 2024 | SecurityBreak
New Rockstar 2FA phishing service targets Microsoft 365 accounts
New Windows Server 2012 zero-day gets free, unofficial patches
Russia arrests cybercriminal Wazawaka for ties with ransomware gangs
Bologna FC confirms data breach after RansomHub ransomware attack
Cybercriminals target Black Friday shoppers with AI-made fake online stores
Design flaw in Fortinet VPN server lets attackers hide logins
High severity RCE flaws among several newly addressed IBM bugs
U.K. launches AI security lab to combat nation-state cyber threats
Terms & Acronyms pt.2 – SWN Vault
Phishing-as-a-Service Rockstar 2FA continues to be prevalent
Godot Engine Exploited to Spread Malware on Windows, macOS, Linux
WUTH Cyberattack Forces UK Hospital Network to Postpone Procedures - Security Spotlight
OnePoint Patient Care Breach: 800,000 Patients Affected, Law Firm Launches Investigation - Security Spotlight
Fake Betting Apps Using AI-Generated Voices to Steal Data
How Python Software Development Enhances Cyber Defense
C2 Hunting: How to Find C2 Servers with Shodan | by Adam Goss | Nov, 2024 | InfoSec Write-ups
A cyberattack impacted operations at UK Wirral University Teaching Hospital
AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections
Ransomware Gangs Seek Pen Testers to Boost Quality
Debunking three cloud storage security myths
INC Ransom Claims Cyber-Attack on UK Children’s Hospital
Cyber-Attacks Could Impact Romanian Presidential Race, Officials Claim
From Email Spam to Ransomware: Hunting Social Engineering in Microsoft Teams | by Hiren Sadhwani | Nov, 2024 | Medium
Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks
Protecting Tomorrow's World: Shaping the Cyber-Physical Future
UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds
The $2,200 ATO Most Bug Hunters Overlooked by Closing Intruder Too Soon | by Mohsin khan | Nov, 2024 | Medium
Hearts Stolen, Wallets Emptied: Insights into CryptoLove Traffer’s Team | by TRAC Labs | Nov, 2024 | Medium
How I passed OSCP+ in two months. In this blog, I will share my exam… | by 0xKhaled | Nov, 2024 | Medium
How I abled to get users/admins PII Disclosure | by Ahmad Yussef | Nov, 2024 | Medium
Explore topics
Pretend AI, aka Microsoft Recall. “If you want to keep a secret, you must… | by Prof Bill Buchanan OBE FRSE | Nov, 2024 | Medium
Towards Zero Trust and Attribute-Based Encryption | by Prof Bill Buchanan OBE FRSE | Nov, 2024 | Medium
The $300 Journey from RFI to RCE that Changed Everything | by Dhabaleshwar Das | Nov, 2024 | Medium
Exploiting CSRF and OTP Reuse: How Weak Token Management Enables Password Reset Attacks, Leading to Account Take Over | by iPsalmy | Nov, 2024 | Medium
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
- YouTube
1934361 - ICP-Brasil: Mis-issued certificate
Pro-Russian hackers hit Japan with DDoS attacks over military ties to the US | TechRadar
Critical Vulnerabilities: The Dark Side of Pacemaker Technology | Newsinterpretation
The fascinating security model of dark web marketplaces
How Digital Fraud Has Evolved: Key Takeaways for CISOs
- YouTube
OPENSSL - Forensicfossil
Remote Code Execution with Spring Properties
A security researcher stumbled upon 600,000 sensitive files left in the open by data broker | ITPro
Altenen - Trust and Safety
Surge in SpyLoan Apps Raises Concerns for Mobile Users • Decrypt LOL
- YouTube
- YouTube
- YouTube
@infosecnews.bsky.social on Bluesky
Dozens of Machines Infected: Year-Long NPM Supply Chain Attack Combines Crypto Mining and Data Theft
Arizona State Database Leak, Users Sensitive Data Exposed
ProjectSend CVE-2024-11680 Exploited in the Wild - Blog - VulnCheck
The Dark Side of Domain-Specific Languages: Uncovering New Attack Techniques in OPA and Terraform - Blog | Tenable®
Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested
Linux Malware Development: Building a one liner TLS/SSL-Based reverse shell with Python - Mohit Dabas’s Blog
- YouTube
MDSec Releases Nighthawk C2 Framework Version 0.3.3 • Decrypt LOL
Mimic Ransomware: What You Need To Know | Tripwire
- YouTube
Imagining Private Airspaces for Bluesky - Dhole Moments
Researchers discover "Bootkitty," the first UEFI bootkit for Linux | TechSpot
MSSQL Identified as Vulnerable to Emoji String Exploitation • Decrypt LOL
Molti dati sensibili della squadra di calcio del Bologna sono stati sottratti in un attacco informatico - Il Post
Scammers use you're fired lures in phishing campaign • The Register
- YouTube
Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
Dissecting JA4H for improved Sliver C2 detections
GitHub - xairy/lights-out: Tools for controlling webcam LED on ThinkPad X230
U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency
Cloud-Computing-Security-and-Customization-in-Multi-Tenant-Environments-Comprehensive-Review
VoteCast is a secure online voting system built with Spring Boot and React. It allows users to vote in elections, while admins can manage users, candidates, and elections, ensuring transparency and security.
Quickly made proof of concept of the opensync project for learning purposes.
EV_Hacking
Seguridad
Proyecto académico realizado con el lenguaje Java y las herramientas Spring Boot y Spring Security. Este módulo del Backend presenta la lógica del negocio, siendo la base para interactuar con cuestionarios de inglés, listar recursos multimedia, entre otr
Spring Security for Native App
Proof of concept app of how I can use live passthrough on the Meta Quest 3
Roblox Royale High Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofa
Roblox Ball Tower Defense Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP
Bunni is a premier Roblox exploiting platform, renowned for its cutting-edge tools, rapid updates, and robust support. Developed by experienced professionals, it ensures maximum efficiency, security, and a seamless user experience with features like HWID
CyberSecurity
Type inference in Hack can sometimes lead to unexpected type errors, especially with generics.
This project is created to test the Local File Inclusion security issue and Insecure File Upload using Javascript
🔒security tools in your CLI
Spring-rest-security
Use: Spring security, Oauth02 Client(with google), Sprnig MVC, Spring Rest API.
Shell script that checks email security policies for domains by verifying their SPF, DKIM, and DMARC records.
Creating a simple login page
Testing for Logical and Security Vulnerabilities, also performing load and stress testing on the Flask API provided by the company
by using the Robotic Process Automation (RPA) selenium library automation the UiPath Calculate Client Security Hash assignment
Shell script that checks email security policies for domains by verifying their SPF, DKIM, and DMARC records.
SECURITY-PATERN
security_codes
Lab3-Security
Proof of concept Android app to control presentations using the Samsung S-Pen of the Galaxy S24 Ultra
Development/Proof of concept version for the Finite Magma Game.
A powerful, Python-based Cross-Site Scripting (XSS) vulnerability scanner built for ethical hacking and security testing.
backend-clone-amazon-security
Proof of Concept for Art Gallery
simulation and verification of HTTPS and DNS services in a secured network environment project
Proof of concept for the project automatic speech recognition for medical documentation using contextual word embedding
Web安全服务渗透测试模板 免费下载
My take at implementing a Proof Of Concept of the given Problem Statement.
Cipher Vortex - A suite of cyber security and penetration testing tools
Spring-Security
Custom Caddy build with security plugin enabled.
itmo-information-security
Welcome to the official repository for Assignment 2 of the System & Software Security course, part of the Master’s program at Leiden University.
Proof-of-concept web application for a shopping cart using JS
Proof of concept of implementing OpenTelemetry in a minimal API with ASP.NET
Mr. CrackBot AI uses the NVIDIA Jetson Nano 4GB to perform AI-driven penetration testing. It combines GPU-accelerated password cracking with Wi-Fi deauthentication and handshake capture. Blending AI with traditional security tools, it offers a powerful, c
综合安防管理平台安装部署手册 免费下载
A Docker-integrated YARA-based malware scanning tool for container security, leveraging diverse open-source and commercial threat intelligence feeds to detect malicious indicators in Docker images.
Secury is a robust encryption and security application designed to ensure data privacy and access management. It features data encryption (Caesar Cipher, AES) and implements advanced Identity and Access Management (IAM) techniques, including Role-Based Ac
In this repo my cyber security second week tasks are here, Also provide the code and there Screenshots in this repo!
MotionGuard_Security_Motion_System
You can use him to inject my world's bedrock version hacker / 我的世界基岩版黑客注入器
Proof of concept Data Catalog for price statistics researchers
Proof of concept to validate the arguments from printf in order to avoid UB
security-app
A proof of concept integrating Firebase Realtime DB, Firestore, Authentication, and Cloud Messaging for real-time data, user authentication, and push notifications.
spring-security-telusko-you-tube
Designing and Implementing a Proof-of-Concept Cloud Solution Based on a Client’s Needs
using dynapyt to analyze the security issues in python projects
AnizottiSecurity.EXMPL
CSRF-Demo-Security-Lab
Teapot Hacker Isolation
This repository documents the exploration, analysis, and ethical hacking of a sandboxed e-commerce website intentionally designed with vulnerabilities. The project is a culmination of the Cybersecurity and Ethical Hacking Internship Program, applying theo
IoTifyHome is a smart home app that lets you control and automate connected devices in your home. Easily manage appliances, lighting, and security from one platform. Designed for flexibility and seamless integration with various IoT devices,.
Security
information-security
Proof Of Concept Mountable Darkrai in Cobblemon
springSecurity
securityProjects
Proof of concept Shiny app to correct drift in continuous water quality monitoring data
Try And Hack Me research and write up
Proof-of-concept web application for buying tickets with JS
Proof of concept to display artwork in AR
Python Snowflake Hacks
Spring Security 6
CloudSecurityFinal
Welcome to the official repository for Assignment 2 of the System & Software Security course, part of the Master’s program at Leiden University.
CordellSecurity.EXMPL
spring-la-mia-pizzeria-security
Free Code Camp Info Security App
Innovative-Security-Framework-for-Enhancing-Data-Protection-in-Mobile-Cloud-Environments
VRV_Security_RBAC
VRV-Security-Task
securityaudits
Login, Sign form in Next js with complete OAuth, reset password, and route security
Hacker
ResponseToSecurityIncidentUsingNIST
Simple proof of concept vtt
信息安全管理体系ISO_IEC27002_2022中文版下载 免费下载
SecureFence AI is an advanced AI-powered border defense system designed to enhance national security by automating intrusion detection, classification, and response mechanisms. The system integrates a variety of sensors, including vibration, ultrasonic, a
Proof of concept app of how I can use live passthrough on the Meta Quest 3
Защите сети
Security-lab
Todo management project using Java, Spring Boot 3, Spring Data JPA, Spring Security, JWT, MySQL
RBAC-VRV-Security-s
Western Hacks 2024 Entry
CarSecuritySystem
VRV_Security_Assignment
V2V-Security
cryptomator
Developed a University Gate Pass System using Java (JSP) and MySQL to manage visitor entry and exit. The system allows students to request gate passes, which are approved by the administration, with real-time tracking and database management. Designed to
CYBER-SECURITY2
Authify0: A secure authentication backend using Node.js, Express, MongoDB, and Mongoose. Features include signup, OTP-based email verification, login, logout, profile management, account deletion, and password recovery. It leverages JWT for authentication
SecurityVecicle
This repository is a comprehensive collection of tools, resources, and websites for Open-Source Intelligence (OSINT). This repository is designed for investigators, security researchers, and enthusiasts looking to enhance their OSINT skills. 🚀
spring-security-app
Machine-learing-Network-security-analysis
The **Fraud Detection System** is a machine learning tool for identifying fraudulent transactions. It uses Logistic Regression, Random Forest, SMOTE for handling data imbalance, and SHAP for interpretability. With visualizations and a user-friendly interf
Ethical-hacking-Simulator
netology-java-securitydata-sql-join
workflow-security-test-111
Payment Card Industry Data Security Standard STUDY NOTES
SystemSecurity2024
A hospital management site streamlines operations with features like patient registration, appointment scheduling, doctor and staff management, billing, and medical records. It offers a user-friendly interface for seamless communication, real-time updates
HomeSecurityMobile
Proof of concept of image editing with Cornerstone React.
Game suite for the Muse EEG headset. Made during hack western 11
Proof_of_Concept_Music_Recommendation_Algorithm_Semisupervised_AI
securityaudits.github.io
network-security-final-project
security
Mobile_Application_security
In this repo you can find the notes for application security course
Create Secure banking system web application with Spring security, Go-lang and Django, The application contains both mobile money transaction, Bill payment and cryptocurrency trading
SecurityProtector
Fanshawe College Information Security Management ISM1 Course Content
基于Spring+SpringMVC+Mybatis+Spring Security的Java资源权限管理系统设计源码 Java Spring SpringMVC Mybatis Spring 该系统是一款基于Spring、SpringMVC、Mybatis及Spring Security框架构建的Java资源权限管理系统。项目源码包含23个文件,其中Java源文件15个,涵盖系统核心逻辑;其他文件类型包括Git忽略、JAR包、配置文件等,共同构成了一个完整、高效的权限管理解决方案。
SpringSecurity
SocialSecurityExample
This repository contains writeups for the labs from PortSwigger Web Security Academy.
CalculateClientSecurityHash-RPA
Proof of concept for a deferred binding approach to event management.
Proof of concept for a centralized event manager.
YouTube Premium Mod APK is a modified app offering free access to premium features like ad-free videos, offline downloads, and background playback. Use cautiously to ensure device security.
A collection of codes which are example of common commands within Windows Terminal, Powershell and Kali Linux Terminal. This is a collection to use as a reference as I study my Degree at Leeds Beckett University in Cyber Security
A comprehensive project exploring Advanced Google Hacking (Google Dorking) techniques. It includes a detailed website showcasing practical examples, historical milestones, ethical considerations, and educational content about enhancing cybersecurity pract
JWT 토큰 , Security 등
This is a repository where I show all my proof of concepts for Semester 3 Media Design
PP_3_1_3_Bootstrap_Boot_Security
Completed tasks from PwC Virtual Experience Program on Forage, showcasing skills in Risk Management , Network Security, Presentation Prep
security-build
The Random Password Generator is a secure web app that creates 12-character strong passwords using uppercase, lowercase, numbers, and symbols. It ensures complexity for better security. With a "Copy" button, users can easily copy passwords to their clipb
spring-security
This project automates the setup, configuration, and benchmarking of AWS EC2 instances with Elastic Load Balancer (ELB) support, including security groups, instance provisioning, routing, and health checks.
SpringSecurity
This repository contains the source code and assets for a business website designed to showcase our products, services, and company information. The website is built using modern web technologies and follows best practices for performance, security, and r
Software-Supply-Chain-Security
proof of concept
Proof of concept component to render any type of list with fiter/list/search capabilities
A proof of concept side-scroller game for Freedom Toons
PDF parser proof-of-concept
Welcome to the RandomUtilityKit! This versatile repository includes a collection of randomization tools designed to add an element of chance and security to your projects. Whether you're looking to generate random passwords, simulate a dice roll for gamin
vrv_security
spring-security-mysql-db-roles-based
his project is a Hotel Reservation System developed using Spring Boot for the backend and React for the frontend. The application enables users to book rooms, view booking details, and manage their reservations. Spring Security and JWT (JSON Web Tokens) a
VRV Security’s Backend Developer Intern Assignment
This repository contains the tasks, projects, and assignments completed during the Cyber Security Internship at Prodigy InfoTech. Through this internship.
Proof of Concept: ESP32-based Access Control System with NFC and Mobile App
Spring Security Project
progect
VRV-Security-s-Backend-Developer-Intern-Assignment
A lightweight Spring Boot application demonstrating basic authentication and security configuration using Spring Security.
SpringBoot-Security-SBM01-AuthenticationUsingDataBase
Roblox Anime Defenders Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Au
penta-security-assignment-back-end
Roblox Horse Race Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofar
Custom Rules Elastic Security
VRV-SecurityRBAC-TaskRound
Roblox Royale High Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofa
Power Hack Hackathon - Flutter Educational Platform
This project performs 4 different attacks on the NSL-KDD dataset (Network Security, Information Security, Cyber Security). These are the following performed attacks: 1. DoS attack 2. Adversarial attack 3. Membership inference attack 4. Trojan/Backdoor at
company dedicated to computer and laptop repairs we help people with digital problems
SecurityPlayground
A C/C++ package managing extension for Zig Build System. Proof-of-concept stage.
SecurityPlayground
My-Student-Project-AI-Social-Media-Filter-Proof-of-Concept
File Integrity Checker (FIC) - Proof of Concept for verifying and computing file hashes using MD5, SHA-1, and SHA-256
A proof-of-concept application that demonstrates PDF text extraction, AI-powered analysis, and interactive visualization capabilities. This project uses modern NLP techniques to analyze PDF documents and present insights through a Streamlit dashboard.
Roblox Warrior Cats: Ultimate Edition Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-che
Roblox Horse Life Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofar
Firefox addon that adds Dracula theme to Hacker news and improves comment threads.
Roblox Anime Card Battle Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP
Roblox Jailbreak Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofarm
Backend Developer Intern - Assignment - VRV Security
Roblox Tower Defense X: BETA Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara
Roblox Driving Empire Car Racing Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat So
Roblox NFL Universe Football Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara
Roblox Anime Shadow Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autof
ORWA-BNB-HACK-BANGKOK-V0
Roblox Greenville Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofar
GenshinImpact hacks hack cheat cheats infinite-stamina ESP speedhack teleport infinite-health god-mode auto-loot cooldown-hack infinite-energy auto-heal item-ESP chest-ESP wallhack fly-hack damage-hack auto-quest auto-kill mob-ESP
security_consol
Roblox Tower Defense RNG Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP
Roblox Bee Swarm Simulator Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara O
DBTester is a repository designed to provide a testing environment for studying database behavior, particularly focusing on web security. This repository includes environments for various databases and a login-enabled web application.
Roblox Anime Reborn Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autof
Roblox Anime Vanguards Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Au
spring-la-mia-pizzeria-security
Roblox Pet Simulator 99 Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP A
Roblox PETS GO Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofarm A
Multimodal-AI-Security-System
Roblox Anime Defenders Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Au
Roblox Sols RNG Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofarm
Roblox Fisch Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofarm Adm
SecurityAudit
chaos-crawler is a shell script that automates the downloading of subdomain data for bug bounty programs from Project Discovery's Chaos dataset. It organizes the data into a structured directory hierarchy, making it easier for security researchers and bug
git-security-test
FORTNITE All in One Cheat - Aimbot, ESP, Ragebot hack, Skinchanger & more! Regularly updated.
IOCTL fortnite driver source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legends,
Updated Fortnite Zoid Source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legends,
Updated Fortnite Ethify Source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legend
This plugin enhances the security of your WordPress website by seamlessly integrating Wordfence and Cloudflare. It automatically synchronizes blocked IPs from Wordfence and adds them to the Cloudflare firewall blocked list, providing an additional layer o
Updated Fortnite Wampus Internal Source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, ape
Updated Fortnite Vane.cc Source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legen
Open Source Security Report Platform
Updated Enigma Public (green) | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legends
Updated Fortnite TimeFN Source | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legend
BSMS centralizes building management processes into one user-friendly platform. Designed for administrators, tenants, and contractors, it aims to boost efficiency, transparency, and security in every aspect of building operations.
Онлайн-хакатон \"Hack & Change by Changellenge >>\" состоится 29 ноября - 1 декабря 2024 года.
31_player1_Surveillance-and-Security-Systems
42-CyberSecurity
Role Based Application
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
justInvest-security
Secury is a robust encryption and security application designed to ensure data privacy and access management. It features data encryption (Caesar Cipher, AES) and implements advanced Identity and Access Management (IAM) techniques, including Role-Based Ac
Ejercicio 11 - Security inDataBase, Validar usuarios y asignar roles en DataBase
A up-to date python spywares which sends the victims data to a discord channel. These spywares will get upgrades each year.
Spring-Security
rainbow-six-siege-hack rainbow-six-siege-esp rainbow-six-siege-cheat r6-cheat r6-hack r6s-cheat rainbow-six-cheat r6s-hack r6s-esp rainbow-six-siege-hack-free free-r6s-hack rainbow-six-hack-free r6s-hack-free rainbow-six-siege-hacks rainbow-six-siege-chea
This ORG hosts @pkgforge's Official Security Tools & Research
An Internet Security & Privacy project that employs cryptography to solve an issue in the legal industry
security
Un sistema de seguridad* con láser utilizando un ESP32-WROOM-32 para activar una alarma sonora cuando el láser es interrumpido.
ECEA-5385-IIOT-Markets-and-Security
Network-Security-Project
Ethical Hacking tool
Pre-configured apps&tools package, providing optimal, easy to use, security setups for beginners; on the other hand, it’s scalable, edit&customize available till advanced security protection for users, who knows what actually they are doing or want to do.
An intelligent video surveillance system using deep learning to detect and classify human behavior as normal or suspicious. It automates real-time anomaly detection with 95.3% accuracy and sends alerts to authorities. Applicable in academic and public spa
This is a sample hotel booking project, this contains the api's built using SprinBoot, Spring Data Jpa, Spring Security. The UI of this project which consumes this api's is present on another repo.
Network_Security
ComputerSecurityProject
vulnerable-target
Projeto de back-end com o frame work Spring Security, que faz a validação do usuário junto ao banco de dados. Projeto este destinado a um sistema de pedido de entrega de marmita.
A tech-driven solution designed to ensure food security and improve food distribution. This platform leverages technology to promote efficient, fair, and sustainable food systems while addressing critical challenges like food insecurity and waste.
Encrypt and decrypt your file using chess moves in a gamified way. It can lock and unlock any file having any extensions such as .txt, .docx, .pdf, .jpg etc. It provides mechanism to encrypt the file with your own style of playing chess. This ensures the
An intelligent phishing email detection system using FastAPI for the backend and a responsive frontend. The project leverages machine learning to classify emails as phishing or safe, enhancing email security for users.
Automated Security Pentesting Simulation
A collection of cryptographic algorithms used in blockchain technology, including RSA, ECC, hashing, and more. Focused on learning and implementing key concepts for blockchain security and decentralization.
An extensible tool designed to monitor systems for attacks
Secure AI-Powered Customer Service Chatbot for E-commerce
Use your Android phone as a security camera by Termux
Security-UseCases
docker based modular pentest and security lab
Spring-Security
Spring Boot,Spring Security,Spring Data,JWT
Ultralytics, known for its development of advanced YOLO models, is a leader in real-time object detection and computer vision solutions. Their tools enable efficient, high-performance image analysis, making them ideal for applications in diverse fields su
Hack, learn, and secure the future of decentralized tech.
A Flask-based web application for managing Cloudflare email routing rules. This app allows users to view, create, and delete email routing rules efficiently, with authentication and security features. The application is containerized using Docker and conf
이 프로젝트는 Spring Boot 3와 Spring Security를 사용하여 JWT (JSON Web Token) 기반 인증을 구현하는 학습용 프로젝트입니다. JWT 토큰을 이용한 인증 및 권한 설정, URL 접근 제어 등 다양한 보안 기능을 포함하고 있으며, 실제 애플리케이션에 필요한 보안 설정을 학습하는 데 중점을 둡니다.
Cyber security and data privacy course - 2024
Practice Cybersecurity Free Tutorials | This repo collects 74 of free tutorials for Cybersecurity. Cybersecurity is crucial in our increasingly connected world. This Skill Tree presents a comprehensive learning path for aspiring security professionals. St
Hacking-Course-Resources
This Learn Lab explores the fundamentals of Django including: models; views; features; security; and building REST APIs.
Guard is an open-source cloud security tool. It scans for misconfigurations, vulnerabilities, and compliance issues, offering actionable AI-driven remedies. Guard makes cloud security simple, scalable, and accessible for all teams.
Spring Boot 3 기반의 Spring Security 학습 프로젝트입니다. 인증, 권한 설정, URL 접근 제어 등 다양한 보안 기능을 구현하고, 실제 애플리케이션 보안 설정에 필요한 다양한 개념들을 학습합니다.
a hackable HTML interface for interacting with AI models 🦜
AIT 670 George Mason University: Improving Cloud Security Posture With Azure Sentinel: A Real Time Threat Detection Solution
Projekt für das Fach Kryptoanalyse und Methoden-Audit im Cyber Security Dual-Studium
KuyHack
central-security-api
HACK ME vulnerable application!
FeedApp is a prototype application for managing polls and votes in real-time. Developed as part of the DAT250 course, this project uses a modern technology stack including Java with Spring Boot for the backend, Svelte for the frontend, and technologies su
building-security-system
Cyber security study plan
Introduction to Cybersecurity with Hands-On Labs | This repo collects 10 of programming labs exercises for Introduction to Cybersecurity with Hands-On Labs. Explore the basics of cyber security through interactive, beginner-friendly labs. Get hands-on exp
PQC Security Design for federated-learning
Hacker Rank Problem solving
Proof of concept for SV genotyper using Novoalign MAPQ
Lime is an old hacked client that got rebranded into Exire
Minecraft 1.8.9 Hacked Client
e-commerce website built using Spring Boot, Spring MVC, Spring Security (Form Authentication), Spring Data JPA, and Spring Session.
SoftwareSupplyChainSecurity_HW1
This project demonstrates how to implement JWT (JSON Web Token) based authentication and authorization using Spring Security. It includes different user roles (Admin and Employee) and public endpoints for accessing secured resources.
spring-boot-security-oauth
projects-security-inspection-system
A proof-of-concept for an USB-HID attack
holbertonschool-cyber_security
🎇Composition for Information Security Red Team🎇
Proof of Concept of a bug present in Gevent but not Flask
Repository for general projects and proof of concepts
Lets-Learn-Spring-Security
The hotel booking platform enables users to search for hotels, view details, and make reservations. Frontend: ReactJS, JavaScript, HTML, CSS. Backend: Java, Spring Boot 3, MySQL. Authentication: JWT with Spring Security.
Springboot 3.x REST API WEB APP with mybatis, jpa, springdoc, spring-security, jwt ...
A modern C++ library for hacking.
A comprehensive framework built in Python that serves as a library containing various implementations of cryptographic and mathematical algorithms. It is also designed to help you solve cryptography challenges for any CTF platform.
BOB is a hybrid L2 that combines the security of Bitcoin with the versatility of Ethereum
A comprehensive collection of security services, tools, and information catering to a wide variety of uses
Security Log Anomaly Detection Analysis Project
XssPy is a tool designed to help security researchers and ethical hackers identify potential Cross-Site Scripting (XSS) vulnerabilities in web applications. It automates the process of testing for XSS vulnerabilities by analyzing web pages and submitting
Spring Boot 3: Learn Spring 6, Spring Core, Spring REST, Spring MVC, Spring Security, Thymeleaf, JPA, Hibernate, MySQL
A highly secure and customizable password generator. With an easy-to-use interface, it allows you to generate robust passwords that meet the highest security standards.
Agentic LLM Vulnerability Scanner / AI red teaming kit
holbertonschool-cyber_security
Security-Privacy-Trust (SPT) A.G.E. Website.
Test your AI model's security through CLI
Proof of concept to upload to Azure event hub at scale
WARNING: This is a proof-of-concept idea - it might be removed again
UCLA ACM Cyber's Fuzzing Lab
Daily challenges and weekly deep dives into Web, Crypto, Misc, and Reverse to sharpen skills for information security.
vuls-data-raw-debian-security-tracker-salsa
Proof of concept of the BrowserDataProtection architecture proposed in my dissertation implemented as a WebExtension
ZTE Router Config Extractor
proof of concept for JIT routine built upon zpc
Proof-of-Concept implementation of ALBA protocol, connecting the Lightning Network to Ethereum.
A portfolio website like hacker terminal
Safari iOS IPC proof of concept
Community curated list of search queries for various products across multiple search engines.
Cybersecurity Projects
Programming Fonts (Hack + IBM Plex Sans JP + Nerd Fonts)
The real screensaver/lock for terminals
Web design code snippets, examples, design experiments, proof-of-concepts, etc
CyberSecurity-Tools
We provide powerful yet easy-to-use tools on the clash platform to protect your privacy and security online.
Community home page
🛡 Automatically configure your app to follow OWASP security patterns and principles by using HTTP Headers and Middleware
Generate JSON Web Key.
Miltrack: perstat simplified. A full-stack web application proof-of-concept / MvP used to illustrate and address a common proble that is present in all military branches which is that all your resources that need to be tracked are scattered throughout mul
Artifact Processor Complex - Sync packages and artifacts for offline / airgapped consumption
Proof of concept for a typing speed tester and tutor
a simple eCommerce web app that developed using spring boot, thymeleaf, mysql and spring security
A practical approach to Privacy and Security
Open source toolkit for scraping, OSINT and more.
My first Intellij plugin (and vsCode extension): a Proof of Concept for gematria. Based on https://github.com/JetBrains/intellij-sdk-code-samples/tree/main/editor_basics
Public Website Proof of Concept
🕹️ A proof-of-concept project made during my studies to manage game dedicated servers using the Source RCON protocol through a web interface.
A simple utility for retrieving and storing securities data from IBKR
Refer to this repository to use a containerized security workflow or build your custom workflow with these containers as a base.
US birth data from 2000 to 2014, as provided by the Social Security Administration.
International Securities Identification Numbers for various Indian Securities
code-examples is a collection of Java/Spring based software projects implemented as POCs (Proof Of Concept)
Common Security Advisory Framework (CSAF) Verification, Validation, and Application Programming Interface (API).
A personal filterlist of mine with additional filters for Adguard to block third-party, tracking, annoyances, anti-adblock, resource-abuse and all other unwarranted resources from loading.
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Regulatory Oversight Management - Transportation Security / Gestion de la surveillance reglementaire - Sûreté des transports Web Resources
Tools to assist with the configuration and management of fapolicyd.
web sec | bug bounty | web安全 | 网络安全
WITCHCRAFT is a toolkit for cybersecurity. It handles forensic research, OSINT, scanning, backups, data copying, and penetration testing for apps and APIs, serving as a flexible platform for diverse security tasks.
:key: Hash type identifier (CLI & lib)
A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
Track Government of Canada domains for adherence to digital security best practices and federal requirements.
Enhanced and security-focused fork of Signal.
Cybersecurity requirements for telematics systems developed in collaboration with motor freight carriers, telematics service providers and cybersecurity experts.
CyMaIS streamlines Linux-based system setups and Docker image administration, perfect for servers and PCs. It offers extensive solutions for system initialization, admin tools, backups, monitoring, updates, driver management, security, and VPNs.
A proof of concept demonstrating a compile-time mapping mechanism with placeholders in C++.
Proof of concept for hotstar.com premium subscription bypass
An implementation of webauthn components for Rustlang servers
Chef Automate provides a full suite of enterprise capabilities for maintaining continuous visibility into application, infrastructure, and security automation.
A collection of AWS Korea Startup SA team materials for hands-on labs.
Fetches all available ERC20 balances for one or many ETH addresses from Ethplorer API and returns them as securities
Solutions for adventofcode.com programming puzzles containing incredibly hacked-together code.
Confluent Platform Demo including Apache Kafka, ksqlDB, Control Center, Schema Registry, Security, Schema Linking, and Cluster Linking
Address Book Spring Boot Security Angularjs
Main Sigma Rule Repository
Customizable and hackable json-validator and json-schema utilities for traversal, data generation and validation
Memory-Hacking Software (MHS) X, the new from-scratch MHS, the next most-popular RAM-searching/debugging/game-hacking tool after Cheat Engine.
:bulb: Sharing insights, experiences, and thoughts as a Senior Backend Engineer.
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
Proof of concept of modern and stylish interpreted programming language for the JVM ⚜️
Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
WordPress plugin that provides instant switching between user accounts.
Since 2011, IPBan is the worlds most trusted, free security software to block hackers and botnets. With both Windows and Linux support, IPBan has your dedicated or cloud server protected. Upgrade to IPBan Pro today and get a discount. Learn more at ↓
CVE-2024-11856 -- A security vulnerability in HPE IceWall products could be exploited remotely to cause Unauthorized Data Modification.
CVE-2024-20116 -- In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-
CVE-2024-20125 -- In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MS
CVE-2024-20129 -- In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue
CVE-2024-20130 -- In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: M
CVE-2024-20132 -- In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue
CVE-2024-20133 -- In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issu
CVE-2024-20134 -- In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09154589; Issue ID: MSV
CVE-2024-20135 -- In soundtrigger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09142526; Issu
CVE-2024-20136 -- In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID:
CVE-2024-20137 -- In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch
CVE-2024-20138 -- In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS0899829
CVE-2024-20139 -- In Bluetooth firmware, there is a possible firmware asssert due to improper handling of exceptional conditions. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Pat
CVE-2024-53605 -- Incorrect access control in the component content://com.handcent.messaging.provider.MessageProvider/ of Handcent NextSMS v10.9.9.7 allows attackers to access sensitive data.
Vulners.com -- CVE-2024-53773
Vulners.com -- CVE-2024-53778
Vulners.com -- CVE-2024-53786
Vulners.com -- CVE-2024-53774
Vulners.com -- CVE-2024-53766
Vulners.com -- CVE-2024-53767
Vulners.com -- CVE-2024-53771
Vulners.com -- CVE-2024-53772
Vulners.com -- CVE-2024-53760
Vulners.com -- CVE-2024-53763
Vulners.com -- CVE-2024-53764
CVE-2024-12007 -- A vulnerability, which was classified as critical, was found in code-projects Farmacia 1.0. This affects an unknown part of the file /visualizar-produto.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack
CVE-2024-45520 -- WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 allows a remote Denial of Service because of memory corruption during scanning of a PE32 file.
CVE-2024-53742 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Prism I.T. Systems Multilevel Referral Affiliate Plugin for WooCommerce allows Reflected XSS.This issue affects Multilevel Referral Affiliate Plugin for
CVE-2024-53743 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Countdown Timer for Elementor allows Stored XSS.This issue affects Countdown Timer for Elementor: from n/a through 1.3.6.
CVE-2024-53744 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Skybootstrap Elementor Image Gallery Plugin allows Stored XSS.This issue affects Elementor Image Gallery Plugin: from n/a through 1.0.3.
CVE-2024-53745 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ????? – Cosmosfarm ?? ?? ?? By ????? allows Stored XSS.This issue affects ?? ?? ?? By ?????: from n/a through 1.9.
CVE-2024-53746 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Elementor Button Plus allows Stored XSS.This issue affects Elementor Button Plus: from n/a through 1.3.3.
CVE-2024-53747 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NuttTaro Video Player for WPBakery allows Stored XSS.This issue affects Video Player for WPBakery: from n/a through 1.0.1.
CVE-2024-53748 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terry Lin WP Mermaid allows Stored XSS.This issue affects WP Mermaid: from n/a through 1.0.2.
CVE-2024-53749 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plugin Devs Post Carousel Slider for Elementor allows Stored XSS.This issue affects Post Carousel Slider for Elementor: from n/a through 1.4.0.
CVE-2024-53750 -- Cross-Site Request Forgery (CSRF) vulnerability in Maeve Lander PayPal Responder allows Stored XSS.This issue affects PayPal Responder: from n/a through 1.2.
CVE-2024-53752 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berg Informatik Stripe Donation allows Stored XSS.This issue affects Stripe Donation: from n/a through 1.2.5.
CVE-2024-11252 -- The Social Sharing Plugin – Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.69 due to insufficient input sanitization and output esc
CVE-2024-11996 -- A vulnerability was found in code-projects Farmacia 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /editar-fornecedor.php. The manipulation of the argument cidade leads to cross site scripting. The atta
CVE-2024-11997 -- A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file /vendas.php. The manipulation of the argument notaFiscal leads to cross site scripting. It is possible to initiate the
CVE-2024-11998 -- A vulnerability was found in code-projects Farmacia 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /visualizer-forneccedor.chp. The manipulation of the argument id leads to sql injection. The attack can be initi
CVE-2024-12000 -- A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /controllers/updatesettings.php of the component Setting Handler. The manipulation of the argument f
CVE-2024-12001 -- A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is an unknown function of the file /controllers/updatesettings.php of the component Setting Handler. The manipulation of the argument firstname leads to
CVE-2024-12002 -- A vulnerability classified as problematic was found in Tenda FH451, FH1201, FH1202 and FH1206 up to 20241129. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads t
CVE-2024-43702 -- Software installed and run as a non-privileged user may conduct improper GPU system calls to allow unprivileged access to arbitrary physical memory page.
CVE-2024-43703 -- Software installed and run as a non-privileged user may conduct improper GPU system calls to achieve unauthorised reads and writes of physical memory from the GPU HW.
CVE-2024-53738 -- Server-Side Request Forgery (SSRF) vulnerability in Gabe Livan Asset CleanUp: Page Speed Booster allows Server Side Request Forgery.This issue affects Asset CleanUp: Page Speed Booster: from n/a through 1.3.9.8.
CVE-2024-53739 -- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Cool Plugins Cryptocurrency Widgets For Elementor allows PHP Local File Inclusion.This issue affects Cryptocurrency Widgets For Elemen
CVE-2024-53756 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aftab Husain Vertical Carousel allows Stored XSS.This issue affects Vertical Carousel: from n/a through 1.0.2.
CVE-2024-53757 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SocialEvolution WP Find Your Nearest allows Stored XSS.This issue affects WP Find Your Nearest: from n/a through 0.3.1.
CVE-2024-53758 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terry Lin WP MathJax allows Stored XSS.This issue affects WP MathJax: from n/a through 1.0.1.
CVE-2024-53760 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Capitalize My Title allows Stored XSS.This issue affects Capitalize My Title: from n/a through 0.5.3.
CVE-2024-53763 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rejuan Ahamed Best Addons for Elementor allows Stored XSS.This issue affects Best Addons for Elementor: from n/a through 1.0.5.
CVE-2024-53764 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoftHopper Softtemplates For Elementor allows DOM-Based XSS.This issue affects Softtemplates For Elementor: from n/a through 1.0.8.
CVE-2024-53766 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Devnex Devnex Addons For Elementor allows DOM-Based XSS.This issue affects Devnex Addons For Elementor: from n/a through 1.0.8.
CVE-2024-53767 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixobe Pixobe Cartography allows DOM-Based XSS.This issue affects Pixobe Cartography: from n/a through 1.0.1.
CVE-2024-53768 -- Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in IDE Interactive Content Audit Exporter allows Retrieve Embedded Sensitive Data.This issue affects Content Audit Exporter: from n/a through 1.1.
CVE-2024-53771 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sergio Micó SimpleSchema allows DOM-Based XSS.This issue affects SimpleSchema: from n/a through 1.7.6.9.
CVE-2024-53772 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Mail Picker allows DOM-Based XSS.This issue affects Mail Picker: from n/a through 1.0.14.
CVE-2024-53773 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Praca.Pl sp. Z o.O. Znajdz Prace z Praca.Pl allows DOM-Based XSS.This issue affects Znajdz Prace z Praca.Pl: from n/a through 2.2.3.
CVE-2024-53774 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sparkle WP Sparkle Elementor Kit allows DOM-Based XSS.This issue affects Sparkle Elementor Kit: from n/a through 2.0.9.
CVE-2024-53778 -- Cross-Site Request Forgery (CSRF) vulnerability in Essential Marketer Essential Breadcrumbs allows Stored XSS.This issue affects Essential Breadcrumbs: from n/a through 1.1.1.
CVE-2024-53783 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Anzia Ni WooCommerce Cost Of Goods allows SQL Injection.This issue affects Ni WooCommerce Cost Of Goods: from n/a through 3.2.8.
CVE-2024-53786 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codeless Cowidgets – Elementor Addons allows Stored XSS.This issue affects Cowidgets – Elementor Addons: from n/a through 1.2.0.
CVE-2024-53787 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vinoth06 Random Banner allows Stored XSS.This issue affects Random Banner: from n/a through 4.2.9.
CVE-2024-53788 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Portfoliohub WordPress Portfolio Builder – Portfolio Gallery allows Stored XSS.This issue affects WordPress Portfolio Builder – Portfolio Gallery: from n
Vulners.com -- CVE-2024-53980
Vulners.com -- CVE-2024-53979
Vulners.com -- CVE-2024-53865
Vulners.com -- CVE-2024-53848
Vulners.com -- CVE-2024-52810
Vulners.com -- CVE-2024-49360
Vulners.com -- CVE-2024-49806
Vulners.com -- CVE-2024-49803
Vulners.com -- CVE-2024-49804
Vulners.com -- CVE-2024-49805
Vulners.com -- CVE-2024-11992
Vulners.com -- CVE-2024-50357