Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621
Critical Marimo pre-auth RCE flaw now under active exploitation
Hacker Used Claude Code, GPT-4.1 to Exfiltrate Hundreds of Millions of Mexican Records
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 92
Hackers claim control over Venice San Marco anti-flood pumps
Week in review: Windows zero-day exploit leaked, Patch Tuesday forecast
FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Market
newsletter Round 572 by Pierluigi Paganini – INTERNATIONAL EDITION
CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.
GlassWorm evolves with Zig dropper to infect multiple developer tools
FBI Recovers Deleted Signal Messages Through iPhone Notifications
Over 20,000 crypto fraud victims identified in international crackdown
Google Chrome Update Disrupts Infostealer Cookie Theft
CVE-2026-39987: Marimo RCE exploited in hours after disclosure
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
ChatGPT rolls out new $100 Pro subscription to challenge Claude
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot
Android Banking Trojan Linked to Cambodia Scam Compounds Hits 21 Countries
GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
[Video] The TTP Ep. 22: The Collapse of the Patch Window
Analysis of one billion CISA KEV remediation records exposes limits of human-scale security
Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign
ClickFix campaign delivers Mac malware via fake Apple page
Google rolls out Gmail end-to-end encryption on mobile devices
Microsoft: Canadian employees targeted in payroll pirate attacks
Infosecurity Magazine - Page Not Found
Infosecurity Magazine - Page Not Found
UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
Poisoned "Office 365" search results lead to stolen paychecks
EngageLab SDK flaw opens door to private data on 50M Android devices
To counter cookie theft, Chrome ships device-bound session credentials
Gmail's end-to-end encryption comes to mobile, no extra apps required
Little Snitch for Linux shows what your apps are connecting to
Apiiro CLI turns AI coding assistants into full-stack security engineers
Bitcoin Depot hack leads to $3.6M Bitcoin theft via stolen credentials
Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
April 2026 Patch Tuesday forecast: Spring-cleaning of a preview
What vibe hunting gets right about AI threat hunting, and where it breaks down
Health insurance lead sites sell personal data within seconds of form submission
New infosec products of the week: April 10, 2026
Product showcase: Session, a messenger without phone numbers or metadata
GitHub - hnts/claude-code-security-snippets: Claude Code security snippets for safer permissions, sandboxing, and shell guardrails. · GitHub
Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies | Cryptika Cybersecurity
Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service | Tom's Hardware
GitHub - pandaadir05/snoop: A modern syscall tracer built on eBPF. Think strace, but with a real TUI, smart filters, TLS decryption, and output that's actually readable. · GitHub
Attention Required! | Cloudflare
Hackers claim control over Venice San Marco anti-flood pumps
Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621
GitHub - Kavan00/Android-Projector-C2-Malware: Breakdown of a c2-network of chinese beamers - SilentSDK-Analysis · GitHub
Just a moment...
Just a moment...
The Sad Decline of Trenchant Exec Who Had Everything, Before Deciding to Steal and Sell Zero Days to Russian Buyer
Paying Google to Hack macOS Users? – P. Galeone's blog
Anthropic’s latest AI model strikes fear into banks
Two different attackers poisoned popular open source tools • The Register
CPU-Z & HWMonitor, cpuid.com, Watering Hole Attack | Securelist
Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data | Tom's Hardware
GitHub - JM00NJ/ICMP-Ghost-A-Fileless-x64-Assembly-C2-Agent: Fileless C2 agent written in pure x64 Assembly for Linux. Features stealth ICMP tunneling, memory-only execution via memfd_create, and terminal-independent daemonization. · GitHub
ICMP-Ghost v3.6: Fileless C2 with Hybrid Compression, PIC Injection & Full DPI Evasion | Netacoding | Cybersecurity, Assembly & Network Research
CTO at NCSC Summary: week ending April 12th
Cyber 2028 | Zeyu (Zayne) Zhang
Eventronic Set Grimaldelli da 37+5 Pezzi, [2024 Nuova Edizione Pioneer & Nuova Esperienza Lockpick] Kit Scassinatore con 5 Trasparente Lucchetto, Lockpicking Set per Fabbri Principianti ed Esperti : Amazon.it: Fai da te
Using Copilot Vision with Microsoft Copilot - Microsoft Support
Zephyr Energy loses £700K to contractor payment fraud • The Register
- YouTube
Composition 2000 Social Engineering Survey
GitHub - bogdanticu88/threatmap: IaC threat modeler with STRIDE, MITRE ATT&CK, and PASTA frameworks. REST API, GraphQL, and Docker support for Terraform, CloudFormation, and Kubernetes. · GitHub
Corporate Slave by Day, Hacker by Night: Cyberpunk Clicker ‘Remain at Your Desk’ Revealed - 인디게임닷컴
- YouTube
Bordair/bordair-multimodal · Datasets at Hugging Face
Hungary officials used weak passwords exposed in breach dump • The Register
[2603.00131] Thought Virus: Viral Misalignment via Subliminal Prompting in Multi-Agent Systems
Reverse Engineering a Multi Stage File Format Steganography Chain of the TeamPCP Telnyx Campaign
Rockstar Games Snowflake Breach: ShinyHunters Claims | The CyberSec Guru
Just a moment...
Claude + Humans vs nginx: CVE-2026-27654 - Calif
GitHub - Daylyt-kb/CIPHER · GitHub
Measuring AI Performance: Why Traditional Metrics Fail AI in Cybersecurity — ExtraHop
- YouTube
GitHub - OttoyRocky/phantom-brain: Red portatil de reconocimiento inteligente con IA offline · GitHub
Just a moment...
Just a moment...
Ransomware knocks Dutch healthcare software vendor offline • The Register
Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think | WIRED
[2603.28627] Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits
[2604.08407] Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain
audited.xyz - Claude Code audit — audited.xyz
GitHub - m0vi0/pacmap · GitHub
Using XSLT to turn Nmap scans into an interactive HTML report
Renovate & Dependabot: The New Malware Delivery System
HydraDragonAntivirus/hydradragon/python_hook_backend/new/nuitka_blob_loader at development-version · HydraDragonAntivirus/HydraDragonAntivirus · GitHub
GitHub - Josh-blythe/bordair-multimodal-v1: Open-source cross-modal and multimodal prompt injection test suite. 38,000+ attack payloads across text, image, document, and audio modalities. Research-backed by OWASP LLM Top 10, CrossInject (ACM MM 2025), Fig
Access Denied
CPUID hijacked to serve malware as HWMonitor downloads • The Register
Bloomberg - Are you a robot?
Archive: Assets worth over $6 Million seized from Incognito Market Admin Lin Rui-Siang – Tor Daily
Luxembourg Vibe-Code & Hack Apps Events
Giving an Agent a Rooted Android Phone — Workers IO Blog
Iranian cyber attacks move from disruptive to complex threats in Gulf | The National
GitHub - momenbasel/AutoWIFI: Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat + PMKID. · GitHub
GitHub - momenbasel/htb-writeups: The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack path diagrams, ProLabs, Sherlocks, OSCP/CPTS/CRTO prep. Browse: momenbasel.github.i
Slipping up Slippi with spectator RCE
LemeBreak
Splitwise_cloud-security
DICT-ITU DTC Initiative Course Network Support and Security: Develop your network troubleshooting and user access control skills to begin a career in technology.
Linux libusb proof-of-concept for FocalTech FT9201 fingerprint reader (VID:PID 2808:9338)
Tyler Sanderson: B.S. Computer Science (Summa Cum Laude, 3.93 GPA). CompTIA Security+ and Google Cybersecurity certified. Customer-centric professional specializing in secure full-stack development and infrastructure (Proxmox, Docker, OPNsense). Translati
AYA — AI for Small Businesses. Built at NVIDIA Spark Hack NYC 2026. Every Manhattan business, agentic from the first click. 385 NYC Open Data sources pre-joined locally, 3 Qwen 397B GPUs in parallel, native OpenClaw agents/cron/channels.
Cybersecurity portfolio website featuring projects, tools, certifications, and hands-on experience in ethical hacking, penetration testing, and web security.
A proof of concept Go module for extracting CSS from LibreOffice Writer documents or it's exported HTML.
Hacking wrong Devices
Hello, my name is Soorya Balaji and this is the code behind my submission at the Los Altos Hacks Hackathon on April 11, 2026.
HackingSimulation_On_Chats
An awesome list of family operating systems: curated tools, routines, and resources for running a household with clarity and less overwhelm. Focused on real life with kids, working parents, and practical constraints. Systems over hacks, structure over noi
🧠🎖️ Shadow Project Hack Trainer for Windows 10/11. Undetected cheat for Shadow Project.
Hands-on AWS labs covering cloud security, networking, compute, storage, and Infrastructure as Code using services like IAM, VPC, EC2, S3, and CloudFormation.
holbertonschool-mobile_Security
🎮💥 Sea Of Remnants Hack Trainer for Windows 10/11. Undetected cheat for Sea Of Remnants.
Browser-based steganography suite — LSB substitution, DCT-domain hiding, and adaptive embedding with live chi-squared steganalysis. Hide the message, not just the content.
CyberSecurityChatbot
Repository of PortSwigger Web Security Academy lab writeups and solutions, focused on practical exploitation techniques used in real-world bug bounty hunting. Covers vulnerabilities like XSS, CSRF, SQL injection, clickjacking, authentication weaknesses, a
✨❤️ Rivage Hack Trainer for Windows 10/11. Undetected cheat for Rivage.
🏎️🏆 Retrospace Hack Trainer for Windows 10/11. Undetected cheat for Retrospace.
Smart Money Flow - Fully optimized (SEO, GEO, Accessibility, Security, Performance)
cuber-security-platform
💜🪐 Resonant Q Hack Trainer for Windows 10/11. Undetected cheat for Resonant Q.
AI Security Testing Framework
security-demo
AI agent with security built in. Happy for everyone to test and suggest improvement.
A hands-on cybersecurity project documenting the end-to-end process of building a production-grade self-hosted VPN from scratch. This covers server provisioning, VPN setup, multi-device configuration, server hardening, and security verification.
AI agent that reviews bad code and catches bugs, bad practices, and security vulnerabilities. 3 difficulty levels. Built on Meta's OpenEnv framework.
An RL environment where AI agents learn to review SQL queries for security vulnerabilities and performance issues, with three progressive tasks and partial reward signals.
AI 보안을 위한 테스트 공간
The AI Beat - Fully optimized (SEO, GEO, Accessibility, Security, Performance)
This is a proof-of-concept demonstrating that there is no inherent noisiness of parallel computation, i.e. on AI accelerators. Any rounding errors across different conditions are fully explainable by these conditions. This software demo predicts the exact
Proof of concept for an AsciiDoc parser based on a Parsing Expression Grammar
A high-performance RV32I RISC-V SoC featuring a sub-nanosecond hardware-accelerated AES-128 security peripheral.
MUNICH HACKING LEGAL. Code. Create. Collaborate.
Proof-of-concept security demo illustrating how PowerShell can create trusted-looking Windows toast notifications chained together with ClickFix-style lure
FOUNDATIONS_OF_ETHICAL_HACKING
hack club gap year application ysws pitch
Flutter expense app using multi-agent Orquestador pattern with specialized agents for data, UI, integration, config, runtime, and security. Features real-time tracking with in-memory storage (Firebase-ready), modern card UI, and screens for listing, creat
For the <hack>Cupertino Hackathon
Python-based Nmap scanner with XML parsing and structured output
Proof of concept test - first AI made app in sloppify.dev
hack on create a cart ride
AI-Powered-Network-Security-Monitor
Browser-based security advisory composer — paste a lockfile, get formatted alerts for email, Slack, GitHub PR, and CSV
Proof of concept for dynamic theming by org using NextJs and shadcn ui
BUILD THE TEAM. WIN THE HACK.
This repository contains all the code and information regarding the work I am currently doing on the UCT SHARC BOUY. A Proof-of-Concept of determining the wave directions.
use copilot
ShiftTechSecurity
Premium corporate website for Dinesh Security Services featuring cinematic UI, responsive design, and high-conversion layout for professional security solutions.
Open-world hacking RPG with real cybersecurity tooling. Pyxel game frontend for ESP32-C5 + ClockworkPi uConsole. Wardriving, evil twins, MeshCore mesh, ADS-B radar, gang warfare.
CyberSecurityChatbot
Cyber-Security-Project
Security-focused GitHub Action: eBPF-backed exec and optional TCP/UDP/HTTP/DNS telemetry in CI (JSONL + digest), plus optional egress enforcement against allow lists on GitHub-hosted Linux to detect threats and misconfigurations early.
Documenting my hands-on journey in network security and penetration testing through real lab environments using Kali Linux and vulnerable systems.
BionicPRO Sprint 9 — security, reports, S3/CDN, CDC
UM/3X-UI Resellers panel created for better selling and security for the users and resellers!
A modular security gateway for LLM applications detecting prompt injections and PII. Lab Midterm for CSC 262.
A hands on Linux lab environment focused on system administration, network configuration, and OS hardening for security testing.
WIP anticheat proof of concept using windows working sets
lanjutan dari tugas praktikum 4, bapak juga bisa mencoba mengaksesnya via web secara langsung via link https://haryo.alwaysdata.net/
Prompt Master is a role-based web application for creating, managing, and monetizing digital prompts. It connects users, prompters, and admins in a structured system. The platform supports three roles, each with specific features to ensure smooth workflow
The Multi-Agent Offensive Security & Orchestration Framework - Mythos Preview v2.1
Android VPN client built for privacy, security, and stealth. Powered by xray-core.
Terminale operativo MISSION SPACE v3.0: un’interfaccia avanzata che interroga i database reali della NASA (NeoWs, DONKI, EONET). Progettato con protocollo Security 4.0, permette l’analisi di meteo spaziale, asteroidi e traiettorie di lancio, inviando repo
## 📌 About This repository provides a clear and beginner-friendly explanation of HTTP methods used in web development. It covers the core methods like GET, POST, PUT, PATCH, and DELETE, along with their real-world usage, differences, and important conce
A modular, multi-threaded web vulnerability scanner built with Python and Streamlit for detecting SQL Injection, XSS, and security misconfigurations.
Proof of concept to detect jamming noise in the radio spectrum using a computer with Linux and a Blade
Repository for my AWS-native security monitoring system (SMS).
A vulnerability in cybersecurity is a weakness or flaw in systems, networks, or software that attackers can exploit to gain unauthorized access, disrupt operations, or steal data. These gaps may arise from poor coding, misconfigurations, outdated software
Proof of concept Home Assistant integration for Aqara G400 Doorbell, fully local with 2-way audio
Really Bad Security Website
🎯👁️ Showa American Story Hack Trainer for Windows 10/11. Undetected cheat for Showa American Story.
Security-and-Final-Enhancements
🎮❤️ Starship Troopers Ultimate Bug War Hack Trainer for Windows 10/11. Undetected cheat for Starship Troopers Ultimate Bug War.
Proof of concept: odwzorowanie polskiego procesu legislacyjnego na GitHubie
Hacking
💀💙 Star Wars: Galactic Racer Hack Trainer for Windows 10/11. Undetected cheat for Star Wars: Galactic Racer.
Proof of concept, recommending DuckDB usecase for clients
🔫🚀 Silver Pines Hack Trainer for Windows 10/11. Undetected cheat for Silver Pines.
Proof of concept for productive and scalable laravel cms.
A POC (Proof-Of-Concept) for production-ready RAG (Retrieval-Augmented Generation) backend built with Django REST Framework, PGVector, Celery, and Ollama. Upload documents, generate embeddings asynchronously, and ask natural-language questions against you
Comprehensive Go project template with testing, security scanning, CLI examples, and Docker support
A tool to harden Dockerfiles for repeatability, reproducibility, and security
💾❤️ Skinwalker Hack Trainer for Windows 10/11. Undetected cheat for Skinwalker.
proof of concept for argila
Paris Hack the Block Hackathon Project
Hacker News RSS feeds filtered by score threshold
it's a hack related ui for Roblox with 50+ components
A repository for our hackathon project (Hack the Bay Launch 2026)
> **ML-Powered Hybrid Encryption & behavioral Multi-Factor Authentication System** NeuroCipher is a high-security messaging platform developed for **Exposys Data Labs**. It combines industrial-grade encryption standards with proprietary Machine Learning
Conditional escrow for XRPL - trustless collateral release based on on-chain payment events. Built at Hack the Block 2026.
🛡️ WebRecon - Advanced Web Application Reconnaissance Framework A completely new tool different from ASETool (OSINT) and NetIntel (Network Intelligence). WebRecon focuses on Web Application Security, Content Discovery, Technology Stack Analysis, and Endpo
Self-contained encrypted notepad for Windows. A single .exe that is both the text editor and the encrypted vault. AES-256, zero cleartext on disk, no installation.
Scripts from Python 4 Hackers
SlopShield is a local-first security tool designed to protect developers from "AI Hallucinations"—non-existent or malicious packages suggested by LLMs. By connecting SlopShield to your own LLM providers (OpenAI, Anthropic, Gemini, or Ollama), you can harv
A modular security gateway for LLM applications detecting prompt injections and PII. Lab Midterm for CSC 262.
hack
NETWORK SECURITY AND SCANNING
Hacking-Ensamblador
Ally Waste is a field-operations proof of concept for coordinating property collection routes, tracking service execution, and giving dispatchers live operational visibility across web and mobile clients.
Proof-of-Concept: Genossenschaftliche Multi-Agent-Orchestrierung mit Leitwolf, Persistenz und Governance (Konsent vs. Mehrheit). Basierend auf Rudel-Designprinzipien und A2A-Protokoll.
ByteRent V1 — on-chain storage rental protocol for Nervos CKB (proof of concept)
rainbow six siege radar hack — Best rainbow six siege radar hack hacks for wallhack and radar hack in 2026. Includes advanced automation and
Designed a smart lock security system that integrates multiple authentication methods, including fingerprint recognition, NFC, and PIN code, to provide high-level security and user flexibility
llm-security-gateway
OpenEnv RL environment for AI security code review — 9 real-world vulnerability tasks
Verox-Security
Proof of concept implementation
Empirical proof-of-concept for Text-Based Conjoint Analysis
Proof of concept implementation
saas-security-monitor
Proof of concept implementation
Proof of concept implementation
CyberQuest Academy is a Python-based cybersecurity RPG that teaches Linux, networking, and hacking concepts through interactive, hands-on missions.
dev-hunt-pro 인증 인가 및 회원 관리 기능 구현 파일럿
Proof of concept implementation
Defensive security labs — forensics, SIEM, network analysis, certificate auditing
Password-Security-Analysis-Project
rainbow six siege radar hack — #1 rainbow six siege radar hack hacks with wallhack and radar hack for 2026. Safe, undetected, and powerful for all
Enterprise-grade Agentic AI security for regulated industries
Have I Been Pwned for MCP servers — continuous security audit with public letter-grade leaderboard
genai-security-lab-main
Try Hack Me Nmap Advanced Port Scans
A proof-of-concept agentic scaffold attempting to replicate Claude Mythos Preview's cyber capabilities with open-weights LLMs
"Experimental MVP of an Active Defensive System (ASD) combining adaptive security, observer modeling, and AI-driven response simulation to dynamically influence an observer’s perception of system behavior."
a small production-style system that demonstrates backend architecture, security, coding quality, API design, and real-time capability.
C# Proof of Concept demonstrating AES-256 file encryption, recursive directory traversal, and operational security (OPSEC) routines within a sandboxed environment.
Cross-chain AI security oracle that audits smart contracts across EVM, Solana, and Move chains using constrained AI analysis.
AetherWall is an open-source, edge-deployable gateway for securing agent-to-agent and agent-to-MCP communications. It provides a production-grade security pipeline combining traffic inspection, LLM-powered validation, and policy-based routing.
HWMonitor and CPU-Z got hacked so lets replace them
proof of concept
Nvidia The Spark Hack Series - New York City
A basic first proof-of-concept working layer to prove that the theory set forth in the FULPs framework can work.
Big Red Hacks Coacboard AI Project
Modyw-WordPress-HardSecurity
Hack for Mope.io (Tampermonkey)
This repository contains hands-on labs for CCNP ENCOR (350-401), covering core enterprise networking topics such as Layer 2, Layer 3, IP Services, Security, and Automation. Each lab includes configurations, topology diagrams, verification steps, and troub
POC - Local LLM fine-tuning tool using MLX on Apple Silicon
"Should I Click?" is an AI-powered security tool that eliminates digital uncertainty. We analyze text and images to provide instant, data-backed risk scores, protecting you from sophisticated phishing and threats.
Lero hack project
Proof of concept OCR web application that parses and extracts data fields from driver's license images. Built for testing purposes.
“This project predicts SQL injection attacks in web applications using machine learning techniques. It combines algorithms like SVM, KNN, and Naïve Bayes with NLP-based preprocessing to detect malicious queries in real time, improving security by identify
Implementation of the 16-bit Hack CPU as part of the Nand2Tetris course.
Shredder is a high-security Android application designed to permanently and irrecoverably delete files and directories.
Enterprise Penetration Testing & Security Audits | PentestProBD
OSINT (Open-Source Intelligence) to automate professional investigative journalism. for Gemini Hack Night hackathon
DANTI - Deployment Automation for Network & Threat Infrastructure - is a modular infrastructure automation framework by CIMIA CYBERSECURITY, designed to deploy, secure, and manage resilient systems. It integrates VPN, hardening, monitoring, and security t
Hacking-service-
Repo pour le hack
morphostudio-security-guardian
microservicers-security
Implementations and proofs-of-concepts of binary exploitation attacks
Smart Home Security Monitor with Intrusion Detection (Streamlit App)
Los Altos Hacks Social Impact Aphasia Project
LabSecure-AI: A comprehensive laboratory information management system with blockchain-inspired security (chained hashing + HMAC tokens) and machine learning-based risk scoring (94% accuracy). Supports 5 user roles with complete workflow automation, QR-ba
This project mainly built for the statistic the parameters in such other device: Raspberry Pi 4/5 Thin client cũ Mini PC Celeron/ Pentium Intel NUC cũ Intel Atom/ Celeron box Jetson Nano Coral USB + Pi
hackaton pbw hack the block xrpl idée : Market Credit Defaukt Swap
headless-rest-api-security
Multi-agent candidate sourcing pipeline built with LangGraph. 5 AI agents for candidate discovery, scoring, and outreach. Proof of concept for Serra (YC S23).
We're hacking it
dicom_ai_security_demo
A proof-of-concept of bypassing Panama and loading DLLs using Panama API without additional arguments and shenanigans for the end user on Java 21 for Minecraft 1.21.1 or earlier. This mod provides FastNoise2 as example library to heavily optimize noise.
offers a SysML based Simulator and supporting model library that facilitates native DE simulation in a SysML modeling tool. Additionally, a proof of concept simulation model implemented in the Magic Draw tool is provided.
Test your Discord bot against simulated nukes without breaking anything.
Docker-Security
RxPal Proof of Concept Build
Call for the Establishment of Next-Generation International Security Guidelines to Prevent Supply-Chain Contamination in Physical AI Manufacturing Environments
proof of concept
A testable proof-of-concept implementation of the AEGIS protocol, a theoretical transport-layer security protocol designed to replace HTTPS/TLS against adversaries with quantum computing and AI capabilities.
SwiftUI weather app proof-of-concept displaying Canadian weather data from theweathernetwork.com
API Security Threat & Risk Atlas — A structured, protocol-native threat matrix for API security
OpenC(law) — Legal AI agent framework. Experimental proof-of-concept built on OpenClaw.
Ethical hacking
A minimal Rust proof of concept inspired by the Neural Computers paper
Extensão para Burp Suite que automatiza a criação de queries para testes de segurança e hacking em APIs GraphQL.
CS education game for kids — learn real computer science through hacking missions
This is a demo proof of concept
this is a python semester final project for Network Security and Cryptography that able to share secret by using encryption and decryption
rainbow six siege godmode — Top rainbow six siege godmode private with radar hack and auto headshot for 2026. Fast, reliable, and undetected. Get the
C'est une porftolio en mode hacking éthique, inspiré du challenge CTF Mr Robot. Good Hacking !
Reverse engineering, game hacking, AI security, and low-level systems blog
Team CSA - Wayne Hacks 2026
This is the repository for our group's we hack
The proof of concept of Decoy Doge
!Click YSWS Hack Club Website Demo for Gap Year Fellowship Second Round
security-audit-research
Proof-of-concept: Live VM migration between simulated NY and Brussels datacenters using Proxmox, pfSense IPSec VPN and Grafana monitoring
Omnific Cipher – Combine 100 encryption methods into one. Proof of concept with 10 methods.
A Proof of Concept (PoC) for integrating the IS-IS routing protocol within the SONiC Network Operating System, focusing on process orchestration and workflow mimicking.
harbour-modem-eye is a modem intelligence and RF security research tool for Sailfish OS. It exposes raw modem and cell tower data via the ofono D-Bus stack that no other consumer mobile application provides. It also detects SMS-based attacks including sil
ESP32-Security-System
Prototype / proof of concept for the individual project for my Data Visualisation course.
VaultVPN - Premium Security Solutions. Next-gen VPN landing page, pricing hub, and server dashboard.
Prompt Injection Demo by Ethical Suman. Test your Hacking skills.
Very early proof-of-concept (Alpha 0.1). A floating circular popup menu rendered via Skia4Delphi
arc raiders cheat table — Best arc raiders cheat table hacks for radar and cash hack in 2026. Includes advanced automation and unbeatable
trades--gloucester-county-systems-t-a-gcsi-security-group
In-House Survey Platform — Interactive Proof of Concept Demo
A lightweight fan-made launcher for managing and launching Pokémon ROM hacks and fangames distributed as standalone .exe games. Includes features like game management, search, favorites, and an easy-to-use interface for organizing your collection.
Proof of Concept demonstrating WebView injection via deep link abuse in Zomato Android application, allowing attacker-controlled content to be rendered inside the app context.
Information_Security_Project
Rust module port proof-of-concept for PowerToys
Enterprise-Security-Governance-Dashboard
A proof-of-concept (PoC) demonstrating DNS hijacking and credential harvesting vulnerabilities on unencrypted public WiFi networks.
Interactive Python wrapper around nmap for network reconnaissance, vulnerability discovery, and PDF/Markdown/JSON reporting.
Local web and mobile proof-of-concept apps demonstrating SHA-256 hashing and ECDSA P-256 signing/verification.
This is a Proof of Concept flight controller board based on the Pico2w as the FMU and the STM32F103 dev board as the IO processor. This is desgined keeping PX4 in mind.
e-commerce-security
EVE-NG üzerinde tasarlanmış; FortiGate A-P HA , Site-to-Site IPsec ve SSL VPN teknolojilerini içeren yedekli kurumsal ağ ve güvenlik altyapısı tasarımı.
Learn_Hacking
Proof of concept using my own data for ai
A hack-and-slash game developed using Unreal Engine as a first-semester university project.
A lightweight fan-made launcher for managing and starting Pokémon ROM hacks that are distributed as standalone .exe games.
This Repository is for DevOps and platform engineering projects focused on Kubernetes, security, and cloud automation.
hacking a retail app on beckn for ion-winroom
Scalable AWS cloud architecture for an e-commerce platform with high availability, security, and performance optimization
⭐️ 2026 Unlimited Patched Repack | Fullversion Adobe Lightroom Gradient Ai Mask Overlay | Subscription Lifetime Hacked Tool | Polarr Polarrpro Mod Apk | Polarr Pro ⭐️
DiffGuard CLI — package manager wrapper for supply chain security
This project simulates the core infrastructure of a Neo-Bank, encompassing account management, money transfers, and simulated stock trading. The security requirement is the highest priority
Ethical-hacking-guide
ollama-security
NYC Smart City Nexus — Energy, Waste & Urban Intelligence Platform | Spark Hack NYC 2026
crypto hack one is really good lol
Proof of concept world using math addresses. Every object goes somewhere using x, y, and z., using boxes, spheres, cones, and cylinders like digital building blocks to create a world we can walk around in, and visit in VR with hands.
Decoy-Doge-Proof-of-Concept
AI-Security-Gateway
Nido Hack '26 — Team 18 workspace (cloned from team-01 starter)
Nido Hack '26 — Team 17 workspace (cloned from team-01 starter)
"Estudiante de Ingeniería Industrial (UnADM) | Entusiasta de la Ciberseguridad y Ethical Hacking | Automatización con Python."
⭐️ NieRAutomata NieR Automata Patched Repack 2026 Unlimited Full Version | Blazing RPG Adventure | Epic Sci-Fi Battles | PlatinumGames RPG Hack N Slash | NieRAutomata Download Complete Premium ISO | No Survey Instant Link ⭐️
Scrapes the latest AI-related news and discussions from Hacker News.
A collection of drop-in skills that make Claude Code better at things like security, UI/UX, performance, testing, APIs, databases, and i18n
Repository containing security vulnerability reports submitted to VulnDB. A structured repository of vulnerability reports submitted to VulnDB, including detailed technical analysis, proof-of-concept (PoC), and reproducible steps to validate each issue
APISentinel_Bluechips - API Security Scanner and Testing Tool. A comprehensive security testing tool for API vulnerability detection, including sensitive information detection, JWT analysis, IDOR testing, authentication bypass, and more.
Gemini Hack Night
סורק אבטחה לסקילים — prompt injection, malicious code, LLM review, sandbox
Proof of Concept
PhantomMsg - Hacker Style E2EE Messenger for Termux | Tor + Full Encryption
AsciiArtify is a startup focused on building a Machine Learning-based system that converts images into ASCII art. To support fast iteration and scalable development, the team selected Kubernetes-based local development environments for Proof of Concept (P
Hack the Plains Hackathon
Local firewall for AI coding assistants
Analysis of Web3 security incidents and Proof of Concept (PoC) implementations.
Proof of concept for DMP shohayok
CodeWatch is an AI-powered code review and repository intelligence agent built on the GitAgent standard. It lives inside your git repo and autonomously monitors commits, reviews pull requests, detects security vulnerabilities, and enforces coding standard
Post-quantum encrypted, self-hosted file sharing. ML-KEM-1024 + P-384 hybrid crypto, zero plaintext on disk, one-command deploy. 🦀
A centralized society management platform for residential complexes — maintenance billing, complaints, visitor security, facility bookings, and digital notices in one dashboard.
"A high-security document vault built with FastAPI and Streamlit, featuring JWT-based authentication, custom security middleware, and RBAC, powered by Neon Serverless PostgreSQL."
Public landing page for security, GRC engineering, and training work.
🛡️ A lightweight local proxy to prevent sensitive data leakage to LLM APIs (OpenAI, Anthropic, Gemini, etc.).
A proof of concept rebuild of the NRC Lagos to Ibadan train booking platform, with visual seat selection and cNGN payments on Solana.
NetworkSecurity
HispanShieldOsLLmSecurity
A portable, high-fidelity tactical suite for automated browser data discovery, forensic collection, and secure exfiltration. Built for intelligence gathering and authorized security research.
A Proof of Concept for Unifying Undefined and Indeterminate Behaviors in Computation
securityProject
Interactive third-party vendor security risk assessment tool. 29 weighted questions across 6 domains mapped to ISO 27001:2022, NIST CSF 2.0, SOC 2, GDPR & PIPEDA. Built by Chris Olowo, PMP®.
Proof-of-concept Canadian federal payroll system — demonstrating agentic AI can build this for ~$0 vs $4.2B Dayforce
Ethical Hacking- Ransomeware
Proof-of-concept exploit for CVE-2025-55182 (React2Shell)
Built a multi-threaded network vulnerability scanner in Python that performs port scanning, service banner grabbing, risk analysis against a custom CVE-mapped database, OS fingerprinting, and auto-generates timestamped reports. Used for ethical network re
digital-security
H3 hexagonal grid globe — choropleth proof of concept
A consolidated Android application containing 41 Proof of Concepts (PoCs) from Hextree.io Android Security labs.
Build, run, and manage MCP servers. TypeScript framework with 19 built-in plugins, security, and monitoring.
Faceit CS2 Radar Hack External
lab-gns3-security
Assignment 5 Weather Insight App proof of concept
Proof of concept ciphered notes app
The Pre-Installation Security Auditor for AI Agent Skills
A set of PowerShell scripts that demonstrate how real malware uses image steganography to hide and execute payloads. Built for security awareness, detection testing, and training purposes.
Network diagnostics, security scanning & penetration testing platform
agent-security-scanner
Lightweight proof of concept for offline signature verification on checks and similar documents.
RDE Bodyguards** delivers a complete private security experience. Recruit, train, equip, and command AI bodyguards with deep personality, progression, and bond systems. Every bodyguard has their own inventory, skill tree, morale, wounds, and relationship
REST-API-with-Jakarta-Messaging-Proof-Of-Concept
WozBot: A fun and wacky example of how localized AI placed on a server (or your computer as a localhost) can pretend to be Steve Wozniak! Complete Alpha proof-of-concept for our main AI project, The Phantom.
CyberSecurityChatBot
user land process protection
Collection of little, simple tools and proofs-of-concept. Mostly HTML/CSS/JS
Hands-on penetration testing lab using DVWA to demonstrate reflected and stored XSS vulnerabilities across multiple security levels.
Proof-of-concept for DeFi-native computable contracts
Cyber security
GUI-based Network Traffic Security Analyzer using Python & Scapy
FORTNITE Cheat - Aimbot, ESP, Ragebot hack, Skinchanger & more! Regularly updated.
Tecnologia, hacking etico, hardware e informatica. Guide, strumenti e approfondimenti su IT, cybersecurity, reti e sistemi. Un portale moderno per appassionati e professionisti.
Our project for Big Red Hacks!
100% vibe-coded proof of concept for an external tool that adds support for github squash-merged PRs to git-town
Petit test d'un portfolio style hacker
My journey on cybersecurity, TryHackMe Rooms and Homelabs
DryRun Security — Product Mockups & Design Proposals
Assignment 2 of the course information security
LLM security scanner Claude Code plugin — 25 MCP tools, 19 skills, RAG/agent/supply-chain testing
Autonomous AI Security Agent (IDS/SOAR) utilizing LangGraph, Dual-RAG, and Adversarial Guardrails for real-time log correlation.
Nido Hack '26 — Team 04 workspace (cloned from team-01 starter)
Nido Hack '26 — Team 03 workspace (cloned from team-01 starter)
Beat the bots. CoverYourATS scans job postings, extracts keywords, scores your resume match, and rewrites your bullets to get past ATS filters — all with a cyberpunk hacker UI. Free, no account needed.
Nido Hack '26 — Team 02 workspace (cloned from team-01 starter)
Nido Hack '26 - Team 01 workspace
Robust, type-safe session and role-based authentication primitives for PostgreSQL apps using Row-Level Security.
Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players.
Security analysis plugin for OpenCode - ported from Gemini CLI Security Extension
A deterministic execution firewall for AI agents
High-performance security evidence normalization engine
Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable
Portfolio showcasing hands-on IT and cybersecurity skills in network configuration, system administration, and security analysis, including Active Directory, Windows Server, network design, vulnerability assessment, and traffic analysis.
Phantom Shield - Cybersecurity consulting and education. Network defense, penetration testing, compliance, and security training.
security-bot
This is a small and simple quiz about video games. made following a tutorial as a practice for hack club sleepover You answer questions and get a score at the end.
Crypto security scanner
Comprehensive Cybersecurity Portfolio & Blue Team Lab Reconstructions. Showcasing expertise in SOC operations, GRC, and Security Engineering.
Bake off for IaC Security Scanning
I’m Abdur Rahman Roky, a Full Stack Developer passionate about building scalable systems and securing them through penetration testing and cyber security practices.
intelligent-security-system
HACK Official
Vulnix is an AI-powered vulnerability scanning platform that detects and fixes security issues in web applications automatically.
Guide for all the newbies in the world of ethical hacking labs and cyber security-fun!
security-guarding
Stellar Hacks: Agents Hackathon Submission - A decentralized marketplace for autonomous AI agents transacting via Stellar x402 and Stripe MPP protocols.
Simply my professional security engineering blog, visit through the link
Backpack Guardian is a smart embedded security system developed by Oluwateniola Sanusi and Maheshwari Tanwar that actively monitors backpacks for movement and tampering. When suspicious activity occurs, the system immediately triggers an alert, sounds an
The Operating System for a Sustainable Future. Synchronizing planetary health with human metabolism via Microsoft Azure. From 2011 Iwanuma evidence to global Bio-Security.
OpenEnv-based PII and compliance triage environment for redaction and department routing (IT, BILLING, SECURITY).
Ope Suite , Discover real security ,AI app & chat app built simple and secure,Your data, your control. Early Access
High-performance PHP application server in Rust — embeds PHP directly (no FPM, no Nginx), persistent workers, built-in OWASP security guards (~500 ns overhead), auto-TLS, virtual hosting.
Helmkit: A hardened, immutable container image for sovereign environment deployments. Bundled with Helmfile, Helm-Secrets, and Sops for uncompromising automation and security. Build once, deploy anywhere with total confidence.
Local-first modular security research and authorized red-team assistant with controlled orchestration, session logging, parsing, and reporting.
Repo for the paper "Operationalizing shared phonetic space in bilingual speech: A quantitative proof of concept for the Revised Speech Learning Model"
Modern Vendor Risk Management dashboard aligned with NIS2. Features transparent AI-assisted document analysis with human-in-the-loop oversight, forensic audit logs, and a bilingual (EN/DE) portal for seamless, EU AI Act-compliant supply chain security ass
ai-security-server
CyberSecurityApp
Proof-of-concept exploit for CVE-2026-33017 (Langflow <= 1.8.1).
Ethical hacking is the legal and authorized practice of testing computer systems, networks, or applications to find and fix security vulnerabilities before they can be exploited by malicious attackers. In a word Ethical hacking means hacking with permissi
Repositorio del equipo GreenByte para el Hack ODS UNAM 2026
Automated security scanning orchestration toolkit with async pipeline, fallback scanners, and multi-format reports
N-Hack Premium AI Agent Plugin (Discord Bridge)
Lyncis Security Backend
A collection of Averlon security plugins for Claude Code.
A complete vault of PortSwigger Web Security Academy labs, featuring detailed walkthroughs, practical exploitation techniques, and simplified explanations to master web security vulnerabilities.
Phased enterprise hybrid security platform covering Entra ID, Microsoft 365, Intune, compliance, and Azure security
A cybersecurity platform that simulates adversary behavior and demonstrates how systems detect, contain, and explain threats across distributed environments.
Shora Games - Competitive Gaming Platform with Hacker Terminal UI
Security & Privacy Hardened + Gaming NixOS dotfiles
Adding dynamic security enforcement to C- (a subset of C)
HW is hardware-openclaw: an OpenClaw project driven via WhatsApp messages for chip design / hardware design using SystemVerilog and Verilator, with future plans for debug trackers, formal verification, synthesis, and floorplanning as a proof of concept.
A modern Hacker News wrapper with better readability, threaded comments, and local collections. Built with SvelteKit + TypeScript.
Mint Scan v8— Linux Security Auditor
Modular AI Agent Framework — OpenHarness + AgentSys Security + Hermes Enhanced
A environment secret injector using your password manager
An advanced security tool for professionals, developed in golang.
One domain. Complete security picture. Open-source CLI security scanner.
🔒 AI-powered cybersecurity alert summarizer using local Gemma 4 LLM via Ollama - 100% private
DocShield - Privacy-First Medical Document Assistant powered by Gemma 4. Multi-agent AI that reads, explains, and checks your medical documents locally.
SecurityPerspective
Secure, end-to-end encrypted email client for desktop and mobile — Flutter, OpenPGP, mTLS, ClamAV, zero local storage
Developed a machine learning-based classification system to automatically identify and filter "spam" from "ham" (legitimate) emails. The project focused on reducing security risks like phishing and improving user productivity by streamlining inbox managem
A high-performance, modernized client and proxy architecture for Apache Guacamole. Built with a lightning-fast Rust backend and a modern TypeScript SPA, featuring enterprise-grade security via HashiCorp Vault envelope encryption, OIDC SSO, and native Free
Security scanner & PreToolUse firewall for Claude Code third-party skills. Detects undisclosed telemetry, outbound data exfiltration, and suspicious patterns.
CyberOps-Recon-v14.6: Ultimate BugBounty Intelligence Platform Short Description: An advanced, browser-based reconnaissance engine designed for security researchers and bug hunters. It automates multi-stage intelligence gathering, WAF detection, and vul
SIEM-Based-Web-Traffic-Analysis-Security-Monitoring-using-Splunk-.-
BlitzPress is a CMS (Content Management System) built in Go, inspired by WordPress but designed for performance, scalability, and security. It uses a compiled plugin system (.so shared objects) with a SolidJS frontend.
Tokihane-Hacker
Vendor-neutral control plane for detection engineering: discover dependencies, assess readiness, model runtime health, and optimize detections across security platforms, starting with Splunk.
Classworks hack. Yes it works.
Self-hosted OneDrive clone with a focus on data and personal security
Cross-domain structural pattern transfer from biological immune systems (6 kingdoms) to agentic AI security architecture. 34 mappings, 33 design principles, 16 attack scenarios with paired mitigations. DOI: 10.5281/zenodo.19393455
Zero Trust Security in remote work environments ensures secure access by continuously validating user identity, device posture, and contextual risk, thereby reducing the attack surface compared to traditional perimeter-based models.
Lying evaluation of reward hacking models from ImpossibleBench.
cyber-security-login-analysis
Enterprise cloud architecture portfolio — Azure hub-spoke, AKS, Terraform modules, security baselines, GitOps, and incident runbooks
Ethereum wallet with chain abstraction + txguard security engine
Emergency First-Response Decision Engine is a deterministic OpenEnv-compatible environment for evaluating AI agents that support non-expert first responders during real emergencies. It models the kind of stepwise reasoning a bystander, security guard, or
AI environment for detecting cyber security threats using network logs
Build an offline-first CivicForum backend (Express + Prisma/MySQL, Docker) with role-based access, threaded discussions, moderation tools, and auditable logs. Include local-only notifications, strict auth/security, tenant-scoped data, analytics, anomaly d
Phishing Email Detection & Awareness System - Cyber Security Task 2 (Future Interns)
Economic spam shield via refundable QUBIC deposits — attackers lose their stake, legitimate users pay nothing. Proof of Concept: Smart Contract (C++/QPI) + Node.js proxy + live dashboard.
kfdb_security_kernel
LLM security testing project focused on prompt injection and OWASP vulnerabilities
Educational proof-of-concept simulating a media player companion with advanced system interaction, including file manipulation and persistence mechanisms, for cybersecurity learning purposes.
Cloud Security Configuration RL Environment
Rough draft pycurl transport for httpx as a proof of concept.
Proof of Concept codebase for Science Tokyo & Politecnico di Milano Joint Work on Network Digital Twins
Linux Fundamentals, Networking, GIT, Programming, Containers, Cloud, Kubernetes, CI/CD, Infrastructure as code, Observability, Security, Production and real world
A linter-fast, local-first security scanning tool written in rust.
Installer for the National Security and Defence Documents Dataset (NSDDD) v3.5
Legacy compatibility GitHub Action slug for AI Plugin Scanner
Wallet anti-theft guard. One-click scan for high-risk wallet approvals to protect user assets.
Cybersecurity Analyst | IT Risk & GRC | SIEM (Splunk), Wireshark & ServiceNow. PMP Certified. Expertise in SQL & Power BI for security data analytics and reporting.
Automated Greenhouse Management System (AGMS) - Microservice-based distributed system using Spring Boot, Spring Cloud, JWT security, and external IoT integration.
npm package security analyzer - detect vulnerabilities, typosquatting, and malicious packages
AI-powered GitHub repo security analysis, verified on-chain via OpenGradient TEE
A production-grade OpenEnv-compliant reinforcement learning environment simulating a Security Operations Center (SOC) analyst workflow.
Network-Security-System
ccex12-cloud-security
A modular Python-based trading engine designed for real-time market data processing, signal generation, and automated execution. Built as a proof-of-concept for systematic trading, focusing on price action, liquidity behavior, and reliable execution rath
Hardware Security — Scientific Paper (IEEE Template)
WalmartSecurityF
ElaheMessenger is an open source, end‑to‑end encrypted messenger built for privacy. It combines the power of Next.js and React on the frontend with a Node.js backend, using Prisma and PostgreSQL for data persistence and Socket.IO for real‑time communicati
SDK open-source de facturación electrónica DIAN para TypeScript/Node.js — UBL 2.1, XAdES-EPES, CUFE, WS-Security SOAP
A PKCS#11 v3.0-compliant Software Hardware Security Module (HSM) written in pure Rust
Free subdomain service for hack.tez — claim yourname.hack.tez with any Tezos wallet
A structured 7-week Blue Team training roadmap that builds practical Security Operations Center skills through daily hands-on modules across security monitoring, threat hunting, network defense, endpoint detection and response, automation, threat intellig
Open source control plane for NVIDIA OpenShell
Cryptographically verifiable security decisions in CI/CD pipelines
Pentest with Claude - Learn with Claude
Security audit tool for AI agent configurations
Project for Raptor Hacks 2026
Zero-trust execution hypervisor for AI agents. Sandboxes any agent at the OS level via Landlock LSM + seccomp BPF — no VMs, no daemons, single Rust binary.
Mastering algorithmic patterns with Python. 🚀 Daily LeetCode practice based on labuladong's framework. Building the logical foundation for AI Security & Engineering. Target: 2027 Spring Offer. (用 Python 精进算法套路。基于 labuladong 框架的每日 LeetCode 练习。为 AI 安全与工程夯实逻
VGT Malware Hunter X-Ray is a Proof of Concept (PoC) exploring behavioral endpoint detection using PowerShell, .NET/C# interop, and Windows native APIs. It is not a replacement for enterprise EDR solutions.
Internal vulnerability scanning platform for Crennotech, enabling automated security testing of .NET APIs, React apps, and SQL systems, with continuous monitoring, OWASP-based detection, and audit-ready reporting to support ISO 27001 compliance and shift-
A C-based proof-of-concept demonstrating how to use a Raspberry Pi Pico W / Pico 2 W as a USB Host to control a Texas Instruments Z-Stack Zigbee Coordinator (specifically the Sonoff Zigbee 3.0 USB Dongle Plus-P), and bridge those Zigbee events to a smartp
python_for_ethical_hacking
V0RTEX — Python-based malware analysis platform. Static analysis, IOC extraction, entropy scanning, YARA, VirusTotal integration and more. Built for security researchers and SOC analysts.
Behavioural OS for Claude Code: Evidence Policy, 40 deterministic hooks (CircuitBreaker, InputGuard, PII redaction), 13 agents + 3 teams, Confidence Scoring. 712 tests, 86% coverage, mypy strict.
ASIAN-X-Security
gorstak-site is a clean, modern portfolio website showcasing Gorstak's GitHub projects. Built with vanilla HTML, CSS, and JavaScript, it provides an elegant interface for browsing repositories with search and filtering capabilities.
Cybersecurity portfolio demonstrating SOC incident investigations, threat detection rules, and security analysis projects.
Minimal deterministic Riverbraid kernel for constrained environments.
A full-stack Smart Campus Operations Hub developed with Spring Boot and React. Features include automated facility booking with conflict detection, incident ticketing with image support, and OAuth 2.0 security. Built for IT3030 - Programming Applications
A zoo for security notions in cryptography.
Open-source cyber threat intelligence reports: evidence-labeled assessments, SOC-oriented guidance, and defensive research. PDF and HTML with table of contents and working reference links. Handala Hack Group, Sandworm/APT44. By Andrey Pautov (@1200km). Lo
Protect ecosystems from automated attacks by generating dynamic, noise-based captchas with fast, scalable Go and Redis microservice architecture.
Daily AI/builder intelligence feed across 9 platforms — founders and indie hackers — Claude writes the editorial, silence beats filler
This automated code review tool provides comprehensive static analysis to identify code smells, security vulnerabilities, and maintainability issues across diverse project structures.
A proof-of-concept game panel written in NodeJS that communicates with Docker.
Cloud-Security-Best-Protection-Strategies
Public specification for the Agent Transaction Firewall (ATF): receipt format, deterministic verification procedure, threat model, and architecture overview.
Proof of concept for demonstrating secure service federation in the aviation ecosystem.
IT services, Security, Electrical, and Statutory Compliance
Ethical_Hacking_UI
An event-driven microservices logistics platform built with Spring Boot. Features sync (REST/Feign) and async (Kafka) communication, API Gateway, Eureka discovery, Keycloak security, and comprehensive observability (Grafana, Loki, Tempo) deployed via Dock
Container Security & Policy-as-Code Orchestration. Unified analysis, custom playbooks, and highly customizable interactive reports for production-ready CI/CD.
AI-Driven-CyberSecurity-Awareness-Platform
Plugin de Claude Code: 18 agentes especializados, 60 skills, 25 comandos, 13 hooks, memoria persistente, Memory UI local, quality gates, evidence guard, continuidad operativa y modo autopilot.
Updated builds of Caddy with the Cloudflare DNS and the Caddy security plugins
A Python proof-of-concept scheduler for a university curriculum. Builds a 14-module yearly plan from CSV inputs (teacher availability/capacity, course→teacher mapping, prerequisites, celebrity placements), assigns prerequisite chains across “layers” (year
Hybrid environment Lab for simulating a Legal Office. Intune/Azure Structure based and Python Security routines
AgentStack is an open-source observability platform for AI agents — providing real-time tracing, offline storage, cost tracking, security analysis, and step-by-step Time Machine replay for LangGraph, CrewAI, and custom Python agents.
WalmartSecurityB
Secure IIoT Architecture using Hyperledger Besu, MQTT and CP-ABE
A customer-ready Azure Virtual Desktop deployment repository which will deploy a greenfield or brownfield environment in a proof of concept framework.
High-performance URL engineering with a Modernist Brutalist aesthetic. Features custom aliases, security hardening, and automated 90-day link expiration. Built with the MERN stack.
The open source hacking agent.
Documenting my path to becoming a Smart Contract Auditor. Includes technical notes, security logic experiments, and code implementations from the Alchemy University roadmap.
This interactive dashboard streamlines threat intelligence by aggregating CVE feeds and attack logs. It visualizes real-time patterns and hotspots, transforming raw telemetry into actionable insights. This enables teams to prioritize resources and effecti
CLI security scanner built for the agentic era. Detects CI/CD misconfigs, agent permission risks, MCP tool injection, hardcoded secrets, and DMCA-flagged AI dependencies.
Cyber Threat Detection System - Real-time network security monitoring platform with automated threat detection, IP scanning, and live analytics. Detects SQL injection, DDoS, malware, XSS, and brute force attacks. Features severity-based alerts, security l
Secure LLM Agent Proxy Environment with Network Isolation & Resilience - Zero-knowledge sandbox for autonomous AI agents with credential sanitization, mTLS, and network isolation.
Android client for Hackers' Pub
Hyper-palatable food (HPF) is food items that have been modified to hack psychological and physiological mechanisms that drive food intake and energy balance regulation. Fazzino (2019), provides a numeric definition of HPF, that can be used to classify it
MCP server for secure SSH remote management — 337 tools across 74 groups for DevOps, Docker, Kubernetes, databases, systemd, Windows, cloud, compliance & more. Built in Rust.
A security-hardened AI assistant to Railway. Progressive trust, not blind trust.
🔐 Build a secure full-stack authentication system with user registration, login, and profile management using the MERN stack and JWT.
a CLI tool for analyzing Microsoft Patch Tuesday security updates. Fetches patch data from MSRC, downloads update packages, extracts binaries, and compares pre/post-patch versions using BinDiff.
kubernetes-security.cloud
Ethical Hacking Simulator With Risk Scoring Using Cybersecurity Techniques
A specialized conversational AI chatbot focused on one significant Wolfsonian object, using Retrieval-Augmented Generation (RAG) to provide accurate, source-grounded responses based on museum scholarship, curatorial research, exhibition catalogs, and cont
🔗 Chain multiple callbacks with ThreadPoolExecChain to build a call stack and capture return values for Windows API calls in a simple proof of concept.
ROM hacking tools и утилиты для перевода старых игр
A secure Employee Leave Management System built using Spring Boot and Spring Security (JWT). Implements role-based access control for Employees, Managers, and Admins with approval workflows.
proof-of-concept on how to scale data governance using dbt
🕷️ Build an advanced honeypot system with Mephala, leveraging machine learning for enhanced threat intelligence and security insights.
holbertonschool-cyber_security
📦 Simplify your configuration with PushEnv: a typed, validated, and auto-documented dotenv replacement for secure team collaboration.
Execution-Layer Security (ELS) for AI agents — policy-enforced shell with audit.
holbertonschool-cyber_security
holbertonschool-cyber_security
A Proof-of-Concept for CVE-2025-64512 using a polyglot file.
🌐 Resolve IP addresses and validate networks with IPAddress v2, a robust command-line tool designed for high performance and modular extensibility.
spring-security
DBeaver Database Password Decryption Tool
🕵️♂️ Empower red teams with Venom C2, a dependency-free Python3 Command & Control framework for seamless persistence on diverse systems.
My virtual playground. Proof of concepts, small projects
A proof-of-concept desktop bitcoin wallet with an embedded full node
Simple Split Keyboard for Hack Club Blueprint
hacker application portal for ignition hacks 2026
Real-time Solana token scanner with risk filtering, momentum scoring, and live dashboard — built for DeFi security research and memecoin analysis.
Prototype of the cyber security hub service
💻 Showcase practical cybersecurity skills in forensics, threat hunting, and penetration testing through this comprehensive ethical hacking portfolio.
A powerful native desktop app for ThinkPad users on Linux. Control fan speeds, optimize battery health, tune CPU performance, and monitor system resources—all in one sleek interface built with Tauri.
Home of the CyberSpace hacking activities of The Fracture Network
Hands-on Linux labs from beginner to advanced (navigation, permissions, scripting, and security).
다양한 sw개발에 대한 poc
Comprehensive cybersecurity audit of the fictional company Botium Toys. The project covers asset inventory, risk assessment, and actionable recommendations to improve security posture.
Remote desktop served VNC for UCSC's "Intro to Hacking Competitions" course
Assessment web application project for Semester 1 Tomorrow's Web module
Xion Proof of concept
Estudando segurança da informação
container-security
Google Cyber Security Projects
🚀 Discover and explore a curated list of MCP servers, tools, and resources for AI assistants, enhancing your development and productivity.
🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.
🔍 Discover and scan vulnerable Next.js instances across your infrastructure to address critical security threats effectively.
What do hackers want? Like all craftsmen, hackers like good tools. In fact, that's an understatement. Good hackers find it unbearable to use bad tools. They'll simply refuse to work on projects with the wrong infrastructure.
A script to provide initial security hardening for Rocky Linux 9
High-Level Security Researcher and Systems Programmer, known as Hu Tao's Husband. Specializing in Game Hacking, Reverse Engineering, Binary Protection, and Rust/C++ Development.
🛡️ Enhance security with CocoTail, a hybrid key derivation framework using Keccak, SHA-512, and Argon2id for strong password hashing and key generation.
Proof of concept op RFC 8693
Korean Text Analyser proof of concept app
Curated Threat Intelligence Feed for Firewall Enforcement
Amazon Bedrock Agentcore accelerates AI agents into production with the scale, reliability, and security, critical to real-world deployment.
Proof of concept; stealing Animal Crossing New Horizon authentication and then requesting dreams. Goes hand in hand with https://github.com/Ixaruz/DreamConverter.
A Hack & Slash game inspired by classic PS2-era character action games
Maintain International Peace and Security
WebExtractor is a powerful OSINT and ethical hacking tool developed in Python. It is used to extract email addresses, phone numbers, and links from a target website
Zero Calendar is an open-source AI-native calendar that manages your schedule intelligently, giving you more time for what matters.
GitHub profile README - aspiring cybersecurity analyst, BSc in Computer Science, focused on vulnerability assessment, SIEM, and network security
This repository is a personal archive for all the portfolio of my interesets in the tech field. This is a personal path of my Engineering journey, from software to hardware, with a taste of Artificial intelligence and cyber security.
Proof of Concept of Psycho-Informatics
🐟 Enhance employee security awareness with SimPhish, a phishing email simulation tool designed for effective training and threat recognition.
Robot Bartender!
Proof of concept rewrite of the core bot in Go
ZipRarHunter is a powerful command-line ethical hacking tool designed to crack passwords of ZIP and RAR archive files using a wordlist.
Dove is a suite of configurations & advanced modifications for Mozilla Thunderbird, designed to put the user first - with a focus on privacy, security, freedom, & usability.
Proof of concept to create microservices using Spring 6 and related technologies
a simple express.js proof of concept project with database, data validation, local database authentication and access control
Aggregate and serve specialized Agent Skills across multiple servers with dynamic tool management and human-in-the-loop security controls.
A production-grade edge proxy with security, traffic control, and observability, built for modern cloud-native systems.
A dashboard for home system security using BiT Platform ioT
Tiny RISC-V machine code monitor written in RISC-V assembly.
Next Generation C2 Framework, IoM-server/client
🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
Homomorphic Encryption/Decryption with Strings!
Newly Registered Domains (NRD) lists generated from WhoisDS.com free database — daily domain lists for security and threat analysis.
The GitHub Action for Promptfoo. Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD int
Custom client for Call of Duty: MW2 (2009) featuring dedicated servers, security fixes, and modding support.
🤖 Analyze and exploit command injection vulnerabilities in Unitree robots using BLE, enhancing cybersecurity and providing proof of concept for effective defense.
Proof of Concept, Blockchain Testament. Front- + Backend.
Daily hacker news top 30 stories
Create Jira issues for insecure modules on a Drupal site
Proof of concepts, samples, and sandbox of Custom Tiles for SharpTools.io
Very basic proof of concept container in C++ based on Lizzie Dixon's great C example.
DATRO Security Group monorepo https://datro.xyz
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
Proof of Concept for CVE-2020-0601
SecurityService
🌉 The link that ties Hack Club's information together
🛡️ Monitor public DNS servers' uptime, speed, and filtering features with live updates every 4 hours for reliable internet security and performance.
EVE is Edge Virtualization Engine
Magento 2 module with various hacks and solutions for custom development
A cryptographically verifiable code review system for the cargo (Rust) package manager.
Encrypt and store passwords securely using AES-256 within images via EOF steganography for discreet and safe password management in Python.
🔒 Define a lightweight protocol for secure exchange of Trust Assertion Messages (TAMs) in Zero Trust environments.
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
Computing security code and resources
A level editor for Super Mario Land 3 / WarioLand 1 (1993)
An unofficial Hacker News client for Sailfish OS
CVE-2017-20239 -- MDwiki contains a cross-site scripting vulnerability that allows remote attackers to execute arbitrary JavaScript by injecting malicious code through the location hash parameter. Attackers can craft URLs with JavaScript payloads in the hash fragment that
CVE-2018-25257 -- Adianti Framework 5.5.0 and 5.6.0 contains an SQL injection vulnerability that allows authenticated users to manipulate database queries by injecting SQL code through the name field in SystemProfileForm. Attackers can submit crafted SQL statements in the
CVE-2018-25258 -- RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can craft malicious input in the Language for menus and m
CVE-2019-25689 -- HTML5 Video Player 1.2.5 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized key code string. Attackers can craft a malicious payload exceeding 997 bytes and paste it into the KEY CODE f
CVE-2019-25691 -- Faleemi Desktop Software 1.8 contains a local buffer overflow vulnerability in the System Setup dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can inject a crafted payload into the Save
CVE-2019-25693 -- ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with craft
CVE-2019-25695 -- R 3.4.4 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by injecting malicious input into the GUI Preferences language field. Attackers can craft a payload with a 292-byte offset and JMP ESP instruction to ex
CVE-2019-25697 -- CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to ex
CVE-2019-25699 -- Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject
CVE-2019-25701 -- Easy Video to iPod Converter 1.6.20 contains a local buffer overflow vulnerability in the user registration field that allows local attackers to overwrite the structured exception handler. Attackers can input a crafted payload exceeding 996 bytes in the u
CVE-2019-25703 -- ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter. Attackers can send POST requests to the admin.php endpoint with
CVE-2019-25705 -- Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a cra
CVE-2019-25706 -- Across DR-810 contains an unauthenticated file disclosure vulnerability that allows remote attackers to download the rom-0 backup file containing sensitive information by sending a simple GET request. Attackers can access the rom-0 endpoint without authen
CVE-2019-25707 -- eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in t
CVE-2019-25708 -- Heatmiser Wifi Thermostat 1.7 contains a cross-site request forgery vulnerability that allows attackers to change administrator credentials by tricking authenticated users into submitting malicious requests. Attackers can craft HTML forms targeting the ne
CVE-2019-25709 -- CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database
CVE-2019-25710 -- Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malicious SQL code through the rowid POST parameter to extrac
CVE-2019-25711 -- SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an oversized buffer in the Name field during registration. Attackers can generate a 256-byte payload, paste it into
CVE-2019-25712 -- BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration key field that allows local attackers to crash the application by submitting an oversized key value. Attackers can trigger a denial of service by entering a 256-byte buffer o
CVE-2019-25713 -- MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admi
CVE-2026-6107 -- A flaw has been found in 1Panel-dev MaxKB up to 2.6.1. This issue affects some unknown processing of the file apps/common/middleware/chat_headers_middleware.py of the component ChatHeadersMiddleware. This manipulation of the argument Name causes cross sit
CVE-2026-6108 -- A vulnerability was found in 1Panel-dev MaxKB up to 2.6.1. The affected element is the function execute of the file apps/application/flow/step_node/mcp_node/impl/base_mcp_node.py of the component Model Context Protocol Node. Performing a manipulation resu
CVE-2026-6109 -- A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The impacted element is the function evaluateCode of the file metagpt/environment/minecraft/mineflayer/index.js of the component Mineflayer HTTP API. Executing a manipulation can lead
CVE-2026-6110 -- A vulnerability was identified in FoundationAgents MetaGPT up to 0.8.1. This affects the function generate_thoughts of the file metagpt/strategy/tot.py of the component Tree-of-Thought Solver. The manipulation leads to code injection. It is possible to in
CVE-2026-6111 -- A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible
CVE-2026-6112 -- A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. T
CVE-2026-6113 -- A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable
CVE-2026-6114 -- A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setNetworkCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument proto results in os comman
CVE-2026-6115 -- A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack
CVE-2026-6116 -- A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command injecti
CVE-2026-6117 -- A vulnerability was found in AstrBotDevs AstrBot up to 4.22.1. This issue affects the function install_plugin_upload of the file astrbot/dashboard/routes/plugin.py of the component install-upload Endpoint. The manipulation of the argument File results in
CVE-2026-6118 -- A vulnerability was determined in AstrBotDevs AstrBot up to 4.22.1. Impacted is the function add_mcp_server of the file astrbot/dashboard/routes/tools.py of the component MCP Endpoint. This manipulation of the argument command causes command injection. Th
CVE-2026-6119 -- A vulnerability was identified in AstrBotDevs AstrBot up to 4.22.1. The affected element is the function post_data.get of the component API Endpoint. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The expl
CVE-2026-6120 -- A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can be laun
CVE-2026-6121 -- A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function WrlclientSet of the file /goform/WrlclientSet of the component httpd. This manipulation of the argument GO causes stack-based buffer overflow. The attack may be in
CVE-2026-6122 -- A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be la
CVE-2026-6123 -- A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploitation o
CVE-2026-6124 -- A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects the function fromSafeMacFilter of the file /goform/SafeMacFilter of the component httpd. Executing a manipulation of the argument page/menufacturer can lead to stack-based bu
CVE-2026-6125 -- A security flaw has been discovered in Dromara warm-flow up to 1.8.4. Impacted is the function SpelHelper.parseExpression of the file /warm-flow/save-json of the component Workflow Definition Handler. The manipulation of the argument listenerPath/skipCond
CVE-2026-6126 -- A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2.0.4. The affected element is an unknown function of the component Administrative HTTP Endpoint. This manipulation causes missing authentication. It is possible to initiate the attack
CVE-2026-6129 -- A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects an unknown function of the component Agent Mode Service. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The e
CVE-2026-6130 -- A flaw has been found in chatboxai chatbox up to 1.20.0. This impacts the function StdioClientTransport of the file src/main/mcp/ipc-stdio-transport.ts of the component Model Context Protocol Server Management System. Executing a manipulation of the argum
CVE-2026-6131 -- A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument command results in os comma
CVE-2026-6132 -- A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setLedCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection.
CVE-2026-6133 -- A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be executed remotel
CVE-2026-6134 -- A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The attack i
CVE-2026-31845 -- A reflected cross-site scripting (XSS) vulnerability exists in Rukovoditel CRM version 3.6.4 and earlier in the Zadarma telephony API endpoint (/api/tel/zadarma.php). The application directly reflects user-supplied input from the 'zd_echo' GET parameter i
CVE-2026-32146 -- Improper path validation vulnerability in the Gleam compiler's handling of git dependencies allows arbitrary file system modification during dependency download.
CVE-2026-6105 -- A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7. This affects an unknown part of the file src/main/java/com/perfree/controller/InstallController.java of the component doInstall Interface. The manipulation leads to improper
CVE-2026-6106 -- A vulnerability was detected in 1Panel-dev MaxKB up to 2.2.1. This vulnerability affects the function StaticHeadersMiddleware of the file apps/common/middleware/static_headers_middleware.py of the component Public Chat Interface. The manipulation of the a