Google expands Gemini AI use to fight malicious ads on its platform
Most "AI SOCs" Are Just Faster Triage. That's Not Enough.
New ATHR vishing platform uses AI voice agents for automated attacks
Infosecurity Magazine - Page Not Found
Cookeville Hospital Discloses Rhysida Breach Hitting 337,917
AI platform n8n abused for stealthy phishing and malware delivery
OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity
Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
Cisco says critical Webex Services flaw requires customer action
Data breach at edtech giant McGraw Hill affects 13.5 million accounts
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads
From clinics to government: UAC-0247 expands cyber campaign across Ukraine
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
Researchers Say Fiverr Left User Files Open to Google Search
Cybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business
Tails 7.6.2 patches vulnerability that could expose saved files
Google Play is changing how Android apps access your contacts and location
Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug
US nationals behind DPRK IT worker 'laptop farm' sent to prison
More than pretty pictures: Wendy Bishop on visual storytelling in tech
PowMix botnet targets Czech workforce
Automotive Ransomware Attacks Double in a Year
Sweden reports cyberattack attempt on heating plant amid rising energy threats
Two US nationals jailed over scheme that generated $5 million for the North Korean regime
OpenAI updates Agents SDK, adds sandbox for safer code execution
Anthropic tests user trust with ID and selfie checks for Claude
Microsoft: April Windows Server 2025 update may fail to install
UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
GitHub lays out copyright liability changes and upcoming DMCA review for developers
Command integrity breaks in the LLM routing layer
EU cybersecurity standards are at risk if supplier ban passes
Product showcase: Ente Auth encrypts, backs up, and syncs 2FA
Wi-Fi roaming security practices for access network providers and identity providers
What the EU AI Act requires for AI agent logging
Windows is getting stronger RDP file protections to fight phishing attacks
European AI spending set to hit $290 billion by 2029
Anonymizing Network Traffic: A Dive into SOCKS5 and Data Encryption
Critical Nginx UI auth bypass flaw now actively exploited in the wild
WordPress plugin suite hacked to push malware to thousands of sites
New AgingFly malware used in attacks on Ukraine govt, hospitals
Fake Claude AI Installer Targets Windows Users with PlugX Malware
CVE-2026-33032: severe nginx-ui bug grants unauthenticated server access
Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest
Signed software abused to deploy antivirus-killing scripts
OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Fake Ledger Live App on Apple Store Linked to $9.5M Crypto Theft
CISA flags Windows Task Host vulnerability as exploited in attacks
Signed Adware Operation Disables Antivirus Across 23,000 Hosts
ENISA Seeks Top-Tier Status in CVE Program
U.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog
Rolling Networks: Securing the Transportation Sector
Critical Nginx-ui MCP Flaw Actively Exploited in the Wild
Mirax malware campaign hits 220K accounts, enables full remote control
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
Tenable unveils OT discovery engine to expose cyber-physical risks
Webinar: The IT Leader’s Guide to AI Governance | Storyblok
Axonius updates Asset Cloud with AI, exposure management, and asset trust standard
Bitdefender extends GravityZone with continuous email threat protection
Broadcom introduces zero-trust runtime for scalable AI agents
Capsule Security debuts with $7 million funding to secure AI agent behavior
Microsoft fixes bug behind Windows Server 2025 automatic upgrades
Microsoft: April updates trigger BitLocker key prompts on some servers
AI Companies To Play Bigger Role in CVE Program, Says CISA
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
ShinyHunters Leak Rockstar Games Data, No Player Records Impacted
Sitehop’s SAFEcore Edge enables ultra-low-latency, hardware-enforced post-quantum encryption
The n8n n8mare: How threat actors are misusing AI workflow automation
Microsoft Fixes Two Zero-Days in April Patch Tuesday
Researchers Spot Surge in Brute-Force Attacks from Middle East
PHP Composer flaws enable remote command execution via Perforce VCS
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows
What changed in nginx 1.30.0 and what it means for your upstream config
Raspberry Pi OS 6.2 disables passwordless sudo by default
Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day
OpenAI expands its cyber defense program with GPT-5.4-Cyber for vetted researchers
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Coordinated vulnerability disclosure is now an EU obligation, but cultural change takes time
Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian
The exploit gap is closing, and your patch cycle wasn't built for this
Legitify: Open-source scanner for security misconfigurations on GitHub and GitLab
Microsoft ends desktop detour for sensitivity labels in Office web apps
Network segmentation projects fail in predictable patterns
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
Microsoft adds Windows protections for malicious Remote Desktop files
Over 100 Chrome Web Store extensions steal user accounts, data
Crypto-exchange Kraken extorted by hackers after insider breach
Patch Tuesday - Cisco Talos Blog
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
How Digital Annotations Are Replacing Paper Markups in Business
Microsoft releases Windows 10 KB5082200 extended security update
McGraw-Hill confirms data breach following extortion threat
Personal data of 1 million gym members compromised in Basic-Fit security incident
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update Now!
Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days
Windows 11 cumulative updates KB5083769 & KB5082052 released
Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto
Microsoft rolls out fast-track to reinstate Windows hardware dev accounts
5 Ways Zero Trust Maximizes Identity Security
Triad Nexus Expands Global Fraud Operations Despite US Sanctions
Malicious Chrome Extensions Campaign Exposes User Data
CISOs Urged to Innovate in Talent Retention as Job Satisfaction Declin
US, UK and Canada disrupt $45M crypto theft in Operation Atlantic
New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud
W3LL phishing service sold for $500 dismantled by the FBI
OpenSSL 4.0.0 release cuts deprecated protocols and gains post-quantum support
Testing reveals Claude Mythos's offensive capabilities and limits
State-sponsored threats: Different objectives, similar access paths
Attackers target unpatched ShowDoc servers via CVE-2025-0520
Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
Oligo enables real-time exploit detection and blocking at application runtime
Basic-Fit hack compromises data of up to 1 million members
Claroty advances CPS security with Visibility Orchestration in xDome
DavMail 6.6.0 patches a regex flaw and advances its Microsoft Graph backend
AI Security Institute Advocates Security Best Practices After Mythos T
Attackers target unpatched ShowDoc servers via CVE-2025-0520
ShinyHunters claim the hack of Rockstar Games breach and started leaking data
Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses
Booking.com Confirms Data Breach as Hackers Access Customer Details
Google to penalize sites that hijack the back button
Binary Defense expands NightBeacon with threat-aligned Detection Coverage Index
Booking.com data breach: Customer reservation data exposed
DataVisor brings conversational AI agents to fraud and AML operations
Are Rainbow Tables Still Relevant in 2026?
Fake Claude AI installer abuses DLL sideloading to deploy PlugX
U.S. CISA adds Adobe, Fortinet, Microsoft Windows, Microsoft Exchange Server flaws to its Known Exploited Vulnerabilities catalog
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)
AI adoption is outpacing the safeguards around it
Agentic AI memory attacks spread across sessions and users, and most organizations aren't ready
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers
CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software
29 million leaked secrets in 2025: Why AI agents credentials are out of control
Review: The Psychology of Information Security
Zero trust at year two: What nobody planned for
Cybersecurity jobs available right now: April 14, 2026
Stolen Rockstar Games analytics data leaked by extortion gang
European Gym giant Basic-Fit data breach affects 1 million members
Hackers access Booking.com user data, company secures systems
OpenAI Rotates macOS Certificates Following Axios Supply Chain Breach
Critical flaw in wolfSSL library enables forged certificate use
FBI takedown of W3LL phishing service leads to developer arrest
OpenAI rotates macOS certs after Axios attack hit code-signing workflow
New Booking.com data breach forces reservation PIN resets
JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
Fashion retailer Express left customers' personal data and order details exposed to the internet | TechCrunch
Google Play is changing how Android apps access your contacts and location - Help Net Security
- YouTube
Cybersecurity’s Dirty Secret: Why Most Budgets Go to Waste
Just a moment...
badkeys: "I reported an insecure DKIM key to Deutsche Telek…" - Infosec Exchange
Why Server 2025 Admins are Panicking After the Latest Patch Tuesday
GitHub - Nightmare-Eclipse/RedSun: The Red Sun vulnerability repository · GitHub
Attention Required! | Cloudflare
Post from FaithTales
Home | Rapidly
Graphite Spyware: A New Case of Mobile Espionage
FCC exempts Netgear from ban on foreign routers, doesn't explain why - Ars Technica
Just a moment...
Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch
Red-Teaming Minimus OpenClaw: Sandbox Escape & WhatsApp Incident | EarlyCore
Just a moment...
Just a moment...
Attention Required! | Cloudflare
From RSA to Lattices: The Quantum Safe Crypto Shift - IEEE Spectrum
LvlSecure — Security Built in Levels
Building Runtime Enforcement for Kubernetes with eBPF - Juliet
Booking.com customers warned of 'reservation hijack' scams after data breach - BBC News
GitHub - gryfman/DLPwn · GitHub
Upgrading Riptides to TLS 1.3: Forward Secrecy and a Path to Post-Quantum mTLS | Riptides
SecurityNotionsZoo | CPA, CCA1, CCA2, CPAD, FHE Security Notions
Fiverr Is Leaking Server Credentials and VPN Passwords on Google Right Now
NTLMv1-Bypass in Active Directory | Silverfort
The "Out of Scope" Loophole: Why Bug Bounties Look Away From Credential Exposure | Cremit
AI Pentesting Agents 2026: 39+ Tools, Architecture Deep Dive & Benchmark Analysis
'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison - ABC News
GitHub - 0ggp4r1s/osint-pattern-analyzer: Automated OSINT tool for phone number discovery, pattern detection, and cross-platform correlation. · GitHub
GitHub - benny-e/guardd: ML-Based behavioral endpoint detection system for Linux machines · GitHub
Mythos SI (Structured Intelligence)- Autonomous Zero-Day Detection Beyond Anthropic's Mythos Preview.pdf - Google Drive
- YouTube
DevOps with Dhawos
Just a moment...
Dependency cooldowns turn you into a free-rider
Common Entra ID Security Assessment Findings – Part 4: Weak Conditional Access Policies – Compass Security Blog
Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It - CipherCue
Just a moment...
Cheat Sheet: Agentic Identity Owner Discovery
Vulnapalooza: Why Anthropic's Mythos Is the Loudest Headliner Nobody Bought Tickets To
Abusing Overly Permissive Role in Azure File Sync - XYBYTES
The State of Digital Exposure to Cybercrime for European Telecoms | Ethiack — Autonomous Ethical Hacking for continuous security
GitHub - Nour833/StegoForge: The ultimate steganography and digital forensics toolkit. Hide and extract data across images, audio, video, documents, and network packets, or run 11 advanced detection engines to uncover hidden payloads. · GitHub
Just a moment...
Just a moment...
Hallmark Data Breach - What to Do
Awesome Prometheus Alerts | Copy-pasteable Prometheus alerting rules
Popular Musician Loses Life Savings Through Malicious Crypto Wallet in Apple's App Store
Just a moment...
- YouTube
Integrated BCA – MCA Specialization in Cyber Security  - Amrita Vishwa Vidyapeetham
Cisco Secure Firewall: Post Quantum Cryptography Roadmap
GitHub - JM00NJ/Phantom-Evasion-Loader: Phantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). It leverages advanced
Codex Hacked a Samsung TV - Calif
Vulnerability Summary for the Week of April 6, 2026 | CISA
Systemic Cyber Risk: When Data Breaches Become a National Security Issue | Ralph Ehlers
- YouTube
Research :: x402warden
Hacker Claims 10 Petabytes Stolen From Chinese Supercomputing Hub
Sources aren’t safe when surveillance is for sale
Just a moment...
Basic-Fit Data Breach - What to Do
We May Be Living Through the Most Consequential Hundred Days in Cyber History, and Almost Nobody Has Noticed
Your Laptop Just Became a Rogue AI Lab: How New Google Models Break Corporate Security - AI Universe: A News Startup
Booking.com warns customers of hack that exposed their data | Hacking | The Guardian
:: x402warden
Unpatched RAGFlow Vulnerability Allows Post-Auth RCE - ZeroPath Blog | ZeroPath
Built an interactive Hacker Terminal Simulation using HTML, CSS & JavaScript 🚀 Implemented async typing effects, dynamic user inputs, and cinematic UI flow to replicate a real hacking interface.
A proof of concept for testing multi-database connection support in Laravel. This project explores the feasibility of connecting to multiple databases within a single Laravel application, covering configuration, query routing, and how models interact with
BSMS303-poster-proposal-proof-of-concept-
Proof of concept — reconnaissance faciale en temps réel sur le flux vidéo d'une ESP32-CAM.
A vibecoded version of parcelhub as a proof of concept
Proof of concept for MCP with Haskell and Nix
overlap proof of concept
Security and reliability linter for JavaScript and TypeScript
Critical RCE vulnerability (CVSS 9.3) in Weaver E-cology platform versions prior to build 20260312. Unauthenticated remote code execution via exposed debug endpoint at /papi/esearch/data/devops/dubboApi/debug/method. Comprehensive analysis, proof-of-conce
Information-Security-System-Design
Proof of Concept (POC) frontend built with Next.js acting as a Backend for Frontend (BFF), consuming the Rick and Morty API through internal API routes, with global state management, pagination, search, and a responsive UI.
Open-source macOS security auditor — scan your Mac against CIS Benchmarks and compliance frameworks
This repository contains proof-of-concept code and analysis for a vulnerability in the "Cap" CAPTCHA service (predictable PRNG used to derive PoW challenges and insufficient difficulty).
renovate-security-update-all-disabled
epn-security-seal-control
Submission-ready QBR co-pilot proof of concept built with Next.js, FastAPI, and LangGraph.
Developed an AI-based IoT surveillance system using ESP32-CAM for real-time human detection and monitoring. Implemented live video streaming, intruder alert system using Telegram API, and buzzer notification. Designed a low-cost smart security solution wi
A Proof of Concept for **Federated Learning** using the **Flower (flwr)** framework and **PyTorch**, simulating a network of wearable health devices performing collaborative model training without sharing raw patient data.
Nano Press automates your Frappe/ERPNext deployment from zero to production. Connect your server, pick your version, add official or custom GitHub apps, set your domain, and launch — all in one smooth workflow. Built for quick proof-of-concepts, but power
A set of strict, senior-level engineering guardrails and security standards for AI coding agents.
Centralized Audit Log & Security Monitor
Global Hack Week Backboard.io Challenges
Power BI inventory management dashboard featuring a Mobile-First design, Row-Level Security (RLS), and Star Schema data model.
Agentic Coding Harness for Zelda ROM Hacking
Technical analysis and Proof of Concept (PoC) regarding environment variable exfiltration in containerized cloud sandboxes via side-channel data leaks.
A Multi-Device Multi-Session system with a focus on Account Security
Simple scripts (very limited and incomplete hacks) to pass post-slicing info and gcode modifications forward to final gcode file. Used on an Ultimaker 3.
A proof of concept Discord clone with the backend built in Java and Springboot served over a HTML/CSS/JS frontend.
Team project repo for UWB Hacks 2026
Security_Lab3
A Proof-of-concept repository showing how an untrusted MCP server can steal literally everything...
security
SOE Proof of Concept — Serbia & Poland financial + emissions dashboard
AI-powered token security inspector for BNB Chain & Solana, live radar, rug detection, games & crypto knowledge certification
Dent proof-of-concept projects
Practical cybersecurity projects and labs focused on ethical hacking, network security, and defensive strategies.
A proof of concept is developed on the SEIR amebiasis model, verified against Mickens' Rule 2 and simulated numerically in both crisp and fuzzy settings.
The final evolution of the trilogy, LuxLink3 applies entangled logic to cybersecurity. By harvesting entropy from hardware-root measurement events, this script generates non-deterministic hexadecimal encryption keys. It demonstrates a functional QKD simul
Sample flask application
Review: QTT-Informed Subgraph Feature Engineering for Merger Tree Regression: A Proof-of-Concept
Repo related to theDAO security round on Giveth
LocalScript: Локальная мультиагентная система для генерации Lua-кода. Проект выполнен в рамках МТС True Tech Hack 2026
Hack Malenadu
A novel MotionSemanticProvenanceAI architecture is introduced that generates interpretable reasoning traces explaining why a media artifact is authentic or manipulated. An executable proof-of-concept demonstrates detection of AI-generated video artifacts
Documenting my security research journey: This repository contains detailed vulnerability write-ups, proof-of-concept (PoC) exploits, and the custom automation tools I use for reconnaissance and system assessment.
A presentation to Tailscale ahead of their Hacker Week
Home assignment — GTM Engineer @ ScyllaDB A proof-of-concept automated "hunter" workflow that identifies DataStax users on LinkedIn, generates AI-personalised outreach messages, stores everything in a database, and produces a rich HTML report — all in dry
Proof-of-concept geoguessr cheat
Review: QTT-Based Compression of Merger Tree Trajectories for Assembly Bias Studies: A Proof-of-Concept with Dummy Implementation
DarkLead — AI-powered SAST: 19 scanners + Ollama LLM + FortiAnalyzer dashboard | TENSOR26 PS29 | Built by Claude Sonnet 4.6
Cryptography and Network Security Laboratory
Designed this "Blinky board" with the massive help of HACK CLUB. It has 10 coloured LEDS
A proof of concept PS1 emulator for the Nintendo DS
Files and agenda for IOI hack-a-thon on metagenomics, May 2026
Esse projeto foi criado com intuito de entender melhor o Spring Security, por isso uma api de to do list simples.
Cross-platform linter for AI agent configs (CLAUDE.md, AGENTS.md, .cursorrules, MCP). Dead refs, conflicts, security. CI-ready SARIF output.
Proof-of-Concept
A middleware proxy, used to interface AI agents with Google Workspace - meant to enforce advanced security and keep AI agents under control.
Browser-based SPF, DKIM, DMARC analyzer with MX detection, bulk checking, and PDF reports
mini scanner is a basic tool used to check security weakness
All bout ethical hacking
PSX PREMIUM HACK
🪝 Android pentesting toolkit - Frida server manager + Burp Suite proxy
Proof of Concept para generación de PDF con numeración de páginas "N de M" usando Flying Saucer PDF (OpenPDF) y Spring Boot 3.5.6.
An enterprise-grade, full-stack secure note-taking application featuring complex behavioral analytics, optimistic locking for collaboration, and contextual security monitoring. Built with Spring Boot and React.
🐅 Red Tiger Tools – A curated collection of offensive security utilities, automation scripts, and red teaming aids for ethical hackers and pentesters.
Production-grade DevOps platform for a microservices-based 3-tier application using REST + gRPC, Docker, Kubernetes, Terraform, and GitOps (ArgoCD). Designed with scalability, security, and observability in mind.
Proof of Concepts
OWASP-aligned web vulnerability scanner. Detects SQLi, reflected XSS, missing security headers, CSRF, sensitive paths, and HTTPS issues. BFS crawler, concurrent checks via ThreadPoolExecutor, HTML/JSON reports. CI-ready, exits code 1 on CRITICAL findings.
Figma code connect Proof of concept
ai slop proof of concept
HTTP/3 + QUIC IoT proof of concept
Features 🕵️‍♂️ Information Gathering (fsociety) 📸 Camera Hacking (CamPhish) 📍 GPS Tracking (Seeker) 🌐 Subdomain Finder + HTTPX 🔄 Auto IP Changer (Tor-based) 💉 SQL Injection (SQLMap) 🎣 Phishing Toolkit (Zphisher) 🔍 Google Dorking (Dorks Eye) 📡 Router Explo
simple usb ducky payload
A lightweight proof of concept that simulates Deal Desk and RevOps workflows using a mock Salesforce-style dataset, Python business rules, and the OpenAI API.
Experience-Compressed Intelligence (ECI) is a proposed framework for evaluating progress toward AGI by measuring how efficiently models compress, reuse, and transfer knowledge. This project provides a proof-of-concept implementation combining deep learnin
A blockchain-inspired renewable energy certification platform enabling producers to register energy sources and receive verifiable Renewable Energy Certificates (RECs).
This is a portal for SWF,HTML, and GBA! I don't know if ROM hacks work but it works. This is completely offline so you can download your games on a different website and play them on here. You can play this anywhere even in school
STM32 Hello World Proof of concept
Secure multiserver management hub — content-aware port multiplexing, post-quantum crypto, zero-password auth, immutable audit logs. Security score: 100/100.
A proof-of-concept app that demonstrates native Rust integration for CPU-intensive cryptographic tasks, with real-time streaming updates back to the Flutter UI.
John the Ripper Hash Cracking Test Room – 50 hashes, 5 rooms, MD5/SHA training. Hacker-themed challenge.
Proof-of-concept for a next-generation dataviz dashboarding application with AI generation.
Prove RHEL 10.1 hardening with SELinux, seccomp, CIS Level 1, and Cockpit for a secure, auditable server baseline
Proof of Concepts
Security log analysis using ELK Stack with ETL pipeline. Performed data cleaning and transformation before ingestion into Elasticsearch. Built visualizations in Kibana to detect failed logins and analyze user/IP behavior for security insights.
BattlEye User-Mode Bypass – Research & Proof of Concept This repository documents and implements user-mode techniques to bypass BattlEye anti-cheat without using kernel drivers. BattlEye loads a kernel driver (BEDaisy.sys) and hooks user-mode APIs in ntdl
Developer & security researcher portfolio. Featuring projects, work experience, and contact info.
A command-line interface for sending AI queries to sheep.byfranke.com, focused on Cyber Threat Intelligence (CTI) and general security questions.
SafeX is a modern cybersecurity-themed web platform built using HTML, CSS, and JavaScript. It features a hacker-style UI, YouTube video integration, and workshop sections designed for learning ethical hacking and digital security.
Secure RAG Knowledge Assistant: A production-grade retrieval-augmented system delivering accurate, context-aware answers over private data using LLMs + vector search. Features RBAC, document-level security, audit logging, and low-latency scalable architec
dumb proof of concept
a tool to embed security, scan ip's and prune pirate branches of IP content
High-Performance Smart Home SoC designed in Verilog HDL, integrating thermal control, luminance filtering, security FSM, PWM gate control, and governance register, implemented on FPGA with full simulation and hardware validation.
Personal CTF workspace — track challenges, capture flags, log findings, study with cheat sheets & writeups.
DotNetMovieApi is a C# movie API that combines ASP.NET Core Minimal APIs, GraphQL, Dapper, PostgreSQL, and Swagger into a clean backend proof of concept.
Cross-chain asset provenance protocol with proof-of-concept on Ethereum and IOTA
IA local universal para inteligencia de codigo con 3 niveles de seguridad
Daily curated Hacker News magazine
This is a proof-of-concept solution for transcribing audio files and identifying speakers (diarization). It leverages **WhisperX**, which builds upon OpenAI's Whisper by adding forced alignment and speaker diarization via `pyannote.audio`.
English translation repository of the Fire Emblem rom hack called The Nameless Heroes
Application Security Project repository
This repository is a Proof of Concept (PoC) developed for educational purposes to explore relational database design and SQL advanced querying. The goal was to practice data modeling (ER Diagrams), normalization (1NF, 2NF, 3NF), and the implementation of
Proof-of-concept exploit for POC-CVE-2026-1357. WPvivid Backup & Migration plugin for WordPress <= 0.9.123.
skt-hacking-sentiment-analysis
CyberSecurity-Project
A stupid and funny web application... a piece of crap made for fun. And a Proof of concept for pwa
Data-driven CPQ proof of concept for HVAC products. Configurable product families with dynamic attributes, business rules, pricing engine, quote snapshots, and AI product advisor. Built as a Turborepo monorepo — FastAPI + SQLAlchemy backend, React + TypeS
A 3 week series of my journey in Web Application Hacking.
A passive OSINT security report identifying exposed FTP and MySQL services using the Censys platform.
Access-Control-Windows-Security-Lab
A comprehensive educational repository demonstrating the evolution of a Windows reverse shell implant, from a simple proof‑of‑concept (v1.0) to a fully‑featured post‑exploitation agent with 150+ commands (v3.5). Includes C2 listeners, detailed technical d
llm-security-gateway
Generateur de lien direct - Dev Hackers
This project demonstrates the design and implementation of a secure-by-design architecture for a multi-agent AI system. The focus is on mitigating emerging security risks associated with Agentic AI, including prompt injection, data leakage, and unsafe age
Wordpress Proof of Concept 2026
内容安全内参 - 专业内容安全技术与资讯平台
A Python CLI tool that runs network scans (Nmap/Scapy), compares results against a hardening baseline (CIS Benchmarks), flags open ports and weak configs, and outputs a scored HTML report. Containerised with Docker for clean deployment.
sec.
Proof of concept: local PostgreSQL database branching CLI. Think git branch for your local Postgres.
A simple AI assistant built for MLH Global Hack Week using Backboard concepts. The project demonstrates creating an assistant, starting a conversation thread, and generating a response using Python.
AI-powered Git security & risk scanner for detecting secrets, vulnerabilities, and dangerous code before commits or CI.
Derivatives #62-#71: Closing 10 architectural gaps in cached executable persistence across security policy transitions | Patent SLL-2025-001 | STAAML Corp
Professional SQA artifacts including Manual Test Cases, Automation Scripts, Performance and Security Reports.
AI_Security_Audit_Firm
Automated intelligence pipeline that monitors security news, AI research and custom topics — summarises and delivers structured reports to Obsidian.
Secure SDLC Pipeline CLI to scan code for vulnerabilities
Cyber Security Notes
A feature-rich banking system supporting account operations, transaction history, and enhanced security mechanisms.
Unauthenticated password reset exploit for Flowise AI ≤ 3.0.5. Abuses the /api/v1/account/forgot-password endpoint to change any user's password without prior authentication. Includes a proof-of-concept script and mitigation guidelines.
azure-devops-security-worst-pratices
Given a Login log file, this program outputs suspicious IP addresses based on the number of failed attempts each has.
Documents every lab of Web Security Academy
AWS Security Specialty (SCS-C03) - study notes, lab files, and YouTube walkthroughs
Free NIST CSF cybersecurity risk assessment tool for US healthcare and energy/utility organizations. Identifies security gaps across all 5 NIST functions, delivers prioritized mitigations, a 180-day remediation roadmap, and a downloadable PDF repor
Cyber-Security
api-security-demo
Multi-agent LLM system for automated code review using LangChain Agents + Gemini 2.0 Flash . Coordinator routes GitHub PR diffs to 3 specialist agents (bug, security, style). CodeBERT + ChromaDB for semantic retrieval. Deployed via FastAPI webhook with Do
Terminal-inspired security operations dashboard — Bloomberg-style amber-on-black phosphor aesthetic, built with Next.js 16 and CSS Modules.
Practice fastapi security implementation
Defensive playbook for CI/CD security flaws across GitLab, GitHub Actions, CircleCI, and Jenkins. Includes detection engineering rules and testing checklists.
Proof of concept: serverless function calling a chat model safely on a fun 404 page
Claude Code plugin for expert code review - security, performance, and maintainability analysis
source code for elec0138 group 18
This repository contains proof of concepts for a2a, mcp, langchain4j and complete agentic app setup
Secure Event Management System with Flask, MySQL, role-based access control, and security features against SQL injection, XSS, and CSRF
Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof-of-concept exploit, technical analysis, and detection tools.
A Python-based automated log parser for identifying security incidents and failed login attempts in server logs.
Automated Microsoft 365 security assessment tool aligned to CIS M365 Foundations Benchmark v6.0.1
Hacking Tools
API SECURITY RISK ANALYSIS
《Agent 安全实践》Agent Security Practices
AI-powered daily intelligence for indie hackers and builders. 20 questions, 10+ sources, every morning.
cyber security tools for ethical, hacking purposes only
OpenClaw Skill: skill-security-guard
Intelligent skill routers for Claude Code — execution, research, review, debugging, design, and security testing with optional multi-model orchestration via OpenCode
QR_hacking2
Lightweight security monitoring lab using Elastic Stack, Zeek, Beats, and ElastAlert2
Cyber-security-attacks-
Kocica-Hacker / Hermes Agent presence
Full sweep security audit for fast paced vibe coders
A dummy GRC policy repository containing Privacy Management, Password Construction, and Acceptable Use standards adapted from SANS Institute templates.
Hack Quizlet Match games with a simple tool that speeds up matching and helps you finish faster
Expedia Hack-AI-Thon
Intelligent perception and security service for network traffic: real‑time data sensing, anomaly detection, security protection, and service support.
BioVision website proof-of-concept — Next.js 15, Tailwind CSS 4
become an ethical hacker
Documentation and walkthroughs for selected OWASP Juice Shop hacking challenges.
Internet-connected desktop chess proof of concept using Tauri and RPG Maker RZ
Proof of concept to investigate technology choices for capturing webhook data into both Dynamo and S3
Enterprise network security simulation with AAA, ACL, and firewall (Cisco Packet Tracer)
Open-source web security scanner — 12 checks, vibe score, fix guides. Built with Django & HTMX.
Proof-of-concept of ternary matmulfree LLMs at the edge
A proof of concept demonstrating reactive programming in iOS using Combine, including API integration, debouncing, and data binding with SwiftUI.
LLM-Security
J.A.R.V.I.S. is a Stark-inspired assistant bridging local AI with a reactive Electron/React HUD. Driven by Llama 3.2:1b via Ollama, it utilizes a Python backend to sync voice data with a pulsing Arc Reactor visualizer. It streamlines workflows while ensur
TS-Proof-Of-Concept
Proof of concept of Algorithmic Complexity DoS in musl libc 0.8.0-1.2.6
interview review
The first 60 seconds that secure your Linux server - a single bash script to instantly harden your machine - configures locale, enables firewall, sets up intrusion detection, locks down sudo, and disables root and password-based logins for a secure-by-def
Website for our TechnoSpeak client to showcase on our website.
Contains artifacts in support of a proof-of-concept exhibiting the use of EventBridge as an event bus between services.
Evolve Hack 2026- Theme 3 - Intelligence in Motion: AI that Senses, Acts, and Optimizes the Physical World- Project-WILK: Acoustic-Edge- Solar-Powered Structural Health Monitoring
a demo project for the MLH Global Hack Week:API challenges
security-project
AI-powered cybersecurity system-Autonomous Security Operations Center
Cyber-security
A cybersecurity research lab for exploits, proof-of-concepts, and penetration testing tools
Sentinel-Core-Linux-Security-Orchestrator
Hack GD32F303RC
This course project is designed to give ICS-344 students a practical experience in discovering, exploiting, documenting, and fixing security weaknesses in a realistic cloud application by using DVSA, the OWASP Damn Vulnerable Serverless Application, in a
A dashboard for MBTA maintenance accountability. Built using DEMO data for proof-of-concept visualization.
Security enforcement plugin for Claude Code. Blocks dangerous commands, audits every tool call, detects prompt injection.
🛡️ CEH v13 Practical Lab Platform – A browser-based cybersecurity training environment for ethical hacking certification. Covers all 20 modules with interactive terminals, simulated tools (Nmap, Burp Suite, Metasploit, etc.), CTF challenges, and quizzes.
algorithm hacking
security_research_open
Advanced Recursive Reconnaissance & Vulnerability Framework. A God-Tier automated suite for Offensive Security Researchers, featuring stealth evasion and multi-phase protocol auditing.
hackingxyz.github.io
⭐️Oracle NetSuite Patched Repack 2026 | Unlimited Cloud ERP Full Version | Net Suite CRM Hacked License | Enterprise Resource Planning Suite | NetSuite Premade Analytics Templates | NetSuite Unlimited User Pack | NetSuite Preconfigured Workflows ⭐️
Active Directory security assessment toolkit automated. Enumeration, AS REP Roasting, Kerberoasting, Pass-the-Hash. All in a PDF report
⭐️ Snort Premium Patched Repack 2026 | Unlimited Full Version Download | Network IPS IDS NIDS, Rule-Based Traffic Analyzer, Real-Time Packet Sniffer | High-Speed Threat Detection Engine | Enterprise Security Scanner Tool ⭐️
This is and end to end Mlops project that transforms a notebook proof of concept into an mlops ready architecture
A blinky board based on the Hack Club mascot, Orpheus.
A comprehensive QA project for the SauceDemo web application including manual testing, Selenium automation, performance testing using JMeter, security testing using OWASP ZAP, and CI/CD integration using GitHub Actions.
Search award flights with AI across points programs, compare cash fares, and check balances for smarter travel hacking
Encrypt and decrypt messages with AES for secure local data transfer over untrusted networks
Educational proof‑of‑concept showing how passwords can be locked using modular exponentiation and the discrete logarithm problem, implemented in Python with cryptographic libraries.
My projects from resolution for hack club
The solution architecture is designed as a shared, extensible digital platform that supports multiple independent applications while enforcing consistency, security, scalability, and operational excellence.
Proof of concept for an agent platform using Chrome MCP, Docker, FastAPI services, and a React frontend.
is a high-fidelity, automated documentation suite specifically engineered for security auditors and penetration testers. It effectively bridges the gap between technical payload execution and professional compliance by transforming raw DuckyScript into a
Security gate for AI agent outputs in GitHub Actions. Validates constraints, sanitizes secrets, and applies actions through a controlled pipeline. Inspired by GitHub Next Agentic Workflows (gh-aw).
Telegram Miniapp with TON Referral System, Admin Panel & Security
python-ai-security
Container Security, Scout and DHI Labspace - all in one place
Automated toolkit to spin up fully-configured Kali Linux or Parrot Security VMs with built-in security hardening.
Community compute node for Chess Agents. Secure, decentralized, and cryptographically verified match arbitration
Spring Boot backend for RentSure – a rental management system ensuring transparency in rent, security deposits, and agreements.
A dashboard for MBTA maintenance accountability. Built using DEMO data for proof-of-concept visualization.
AI-Powered Blockchain Forensics & Real-Time WhatsApp Security Intelligence Sentinel.
AI Agent Security and Governance Platform — 15-layer protection, EU-sovereign, MCP-native
A proof of concept SFTP pattern / system in elixir
"P2 Claw is a source available agent framework designed to use Player2 (https://player2.game/) to provide the AI models for the agent. It is focused on being lean and secure to protect the user's privacy and device security. With support for additional mo
ChainSight is a browser-only, single-page application (SPA) that simulates supply chain disruption events and shows how disruptions "ripple" through a multi-tier supplier network. It is designed as an MVP (Minimum Viable Product) intended for demonstratio
Remove ghost follows with chrome extension. NO LIABILITY TAKEN!!!!! PROOF OF CONCEPT!!!
HardenBox: VPS Security Hardening Generator
Version of the Logical Foundations and Security Foundations volumes that we use for Proofs are Programs course at Ruhr Uni Bochum in summer 2026
Axios CRLF Injection (CVE-2026-40175) 취약점 대응 가이드 및 fetch 기반 마이그레이션 분석
A high-performance Python-based network reconnaissance tool utilizing Layer 2 ARP discovery for rapid asset identification and network mapping. Developed as a Proof of Concept (PoC) for security auditing and vulnerability assessment. Built by a Certified
alkeme-security-insurance
⭐️ Semgrep Pro Patched Repack 2026 Unlimited Static Code Sast Analyzer Security Scanner Full Version License Pro Key Activated Tool Download Semgrep Pro Edition | Unlimited Scans | Enterprise Rule Packs | Vulnerability Discovery | CI/CD Auto Fixed ⭐️
Solidify is an AI-powered smart contract security auditor built for Web3 developers. Paste Solidity code, upload a `.sol` file, or scan any live on-chain contract — and get back a structured threat report with plain-English explanations, severity scores,
Proof of concept DLL proxying for Dokapon Kingdom Connect (PC).
DorkSINT is an open-source Python CLI that speeds up Google dorking by turning your search objective into structured, paste-ready queries. It supports interactive prompts and non-interactive flags, includes reusable query templates, and runs natively in
Proof of concept for an air-gapped, on-premise RAG system enabling source-grounded Q&A over PDF documents.
Campus-Security
Project for Claude Hacks hackathon 2026
A TypeScript/Express calculator service currently in local development. This project serves as a functional proof-of-concept for arithmetic logic via REST APIs. It is not currently deployed and operates as a stateless service without a database.
Home Security Assistant — Network security monitoring for Home Assistant — NetFlow/IPFIX analysis, active host scanning, vulnerability detection, and threat intelligence enrichment.
Proof of Concept of The Composable Architecture (TCA)
This repository is a proof-of-concept of clean architecture for test framework that can be reusaged, without being tied up to particular testing framework like Cypress or Playwright.
Hierarchical compliance check for GitHub Organizations. Define global security policies in a central repository.
A collection of hands-on networking labs focused on Huawei eNSP, covering VLANs, Eth-Trunking, AAA security, and Router configurations. This repository serves as a technical portfolio for network infrastructure and security fundamentals.
Agent security evaluation framework: stateful environments, trajectory recording, IPI attacks, three-dimensional scoring
Cyber Security Projects
A proof-of-concept hypertext system with first-class references.
Shared fleet communication protocol — message format, wire protocol, registry, bottle async, and security for the SuperInstance agent fleet
This is a registration website for hackthon 1.o ("Hack-o-heist").
Bagisto e-commerce portfolio — Laravel, Vue.js, security hardening, zh_HK, custom QR payments (PayMe/FPS/PayPal)
这是 MistEye 安全前置闸门技能。触发于依赖安装前安全审计、域名或 URL 访问前安全检查、IoC 恶意检测、供应链风险拦截。
The Chroot Escape Tool is a proof-of-concept utility designed to demonstrate various classic techniques for escaping a chroot(2) environment on Unix-like systems
This projects purpose is to show a proof of concept for an Engineering Informatics project, Showing how a RFID Based attendance system can be implemented.
How much of your connection window could you actually lose? Interactive audit of 37 European airports across 4 delay touchpoints — walking, security, bus transfer & inbound lateness. LCC-adjusted. Sources: ACI-APN 2024, EUROCONTROL CODA 2024, CCC Airport
hack26 is a collaborative hackathon-style event focused on rapidly exploring and prototyping practical data and AI solutions against a defined set of challenges. Teams work within clear challenge boundaries to test ideas, build proof‑of‑concepts and share
This is my proof of concept that I can make a website for my goal as director of technology
A simple RAG model developed using personal data as a proof-of-concept and as training exercise to familiarize with LLM tools
BayonStore_Security_Report
Cyber Security Daily News
hack for sabnzbd on weird platforms
A centralized showcase of my QA work — manual test cases, checklists, bug reports, and proof‑of‑concept automation scripts across the projects I’ve contributed to. All examples are Markdown‑based and focused on clarity, reproducibility, and real QA thinki
Zephyria Devnet Node Codebase - Proof of Concept, Many Breaking Changes are Expected
SecuriyAwarenessBot
GRC portfolio demonstrating ISO 27001, SOC 2, and NIST CSF experience
Single-binary, local-first Linux security intelligence: collect host context (/proc, /etc, packages, SSH, cron, containers, …), log tails (auth, syslog/messages, journal, audit), running processes, cron, bash history samples, and optional WASM plugins; ru
My hands-on journey through AI Security on TryHackMe — covering threats, attacks, and defense techniques in modern AI systems.
Explore the latest MooMoo.io hack updates, tools, and guides for fast access to current project resources and support
Proof of concept X4: Foundations extension mod template
SentinelAU | Security, control and stability for Among Us lobbies
Combining o11y and security via MCP
Operating System API Proof-of-Concept
Cybersecurity learning portfolio showcasing projects, notes, and hands-on practice in networking, Linux, Python, and ethical hacking.
This is my ecommerce product app where i implemented crud operations . also use spring security, spring mvc , frontend . the operations in this product are to login , get all products , add product , update product , delete product , get product by id , I
This is a showcase project for Spring Security Multi-Factor Authentication
Self-hosted LLM security engine for SOC teams. Use any Ollama model to analyze threats, classify attacks, and score risk - fully offline, no cloud APIs, your data never leaves your network.
FashionLens is a lightweight, AI-powered web application that helps fashion designers organize, search, and reuse inspiration imagery captured in the field. Built as a proof-of-concept, it leverages multimodal large language models (LLMs) via LangGraph to
GPU + TPU MNIST DDM proof-of-concept
3-passwordStore-security-report
Production-ready secure starter template for CoreWeave internal tools. Clone, run one command, get auth + secret scanning + CI gates + OWASP coverage. Built for Claude Code.
CVE-2025-59528 Proof of Concept
CyberSecurityChatbot
Eliminate plaintext keys: Hardware-backed SSH and Git security via Secure Enclave and TPM 2.0
proof of concept (work in progress)
hack club site draft
Home Assistant custom integration — locate nearby shelters and guide your household to safety during emergencies
A bunch of agent skills for coding workflows to make things easier from ideation, planning, documentation, execution, security checks, audit/compliance/risk shenanigans
CyberSecurityBot
AI-Powered Unified Cybersecurity Dashboard — Intrusion Detection (ML), Blockchain Data Integrity, Ransomware Detection, Network Security Simulator
Dans les profondeurs numériques de la Montagne Solitaire, là où les hackers rôdent et les failles sommeillent, un dragon veille. Son nom : Smaug. Nul ne franchit ses défenses sans y laisser des plumes : il enserre dans ses griffes acérées le plus précieu
Comprehensive lab for Spring Professional Certification (Core, Boot, Data, Security).
An OBD scanner for your AWS environment. Find cost leaks and security vulnerabilities in seconds.
cloud-security-hardening
A production-grade, serverless AWS monitoring pipeline built with Terraform. Detects IAM security anomalies and budget thresholds, routing alerts to Discord via CloudWatch, SNS, and Lambda.
Open source AI security agent workflow library — governed by ARX from first run
Proof of concept for creating an MCP server that can connect to and query our internal Redshift cluster.
SOL-Proof-of-Concept-2.1
SOL-Proof-of-Concept-2.0
Proof of Concept of RAG in a application envolving find places based on user prompt
A complete IoT security system using ESP32-CAM modules with PIR sensors, AI-powered human detection, and Telegram notifications.
This repository contains a Proof of Concept (PoC) exploit for CVE-2023-6972.
remaking Discord as a proof of concept
Hardware_Hacking
Reusable GitHub Action for AI-powered code review with Claude. Reviews pull request diffs for bugs, security issues, and risky changes - only flags issues worth fixing.
Designed and implemented a secure AI-driven AppSec automation platform using MCP architecture, integrating GitHub PAT-based repository access, multi-tool scanning (SAST, SCA, Secrets), and automated reporting via LLM orchestration.
🦉 NightOwl v4.0 — Advanced Android APK Security Analyzer | Static + Dynamic | OWASP MSTG
This Zero Trust model enforces strict identity verification, device compliance, and risk-based access decisions before granting access to any application or resource. All access is continuously evaluated using Conditional Access policies, MFA, and real-ti
credman is a dedicated utility for storing secrets safely, because hardcoding your database password or leaving it in a `.env` file is basically an open invitation to hackers (and rogue AI agents).
CAPIE - Certified API Hacking Expert (The XSS Rat)
CyberSecurityChatbot-part1
Clone trang hacker news
An intelligent surveillance system designed to monitor border areas using sensors, cameras, and AI-based detection. Identifies unauthorized movement, analyzes real-time data, and sends alerts to authorities, improving security, threat detection, and rapid
Documentation for my home lab projects — VirtualBox, Windows Server 2025, Active Directory, Linux, and CompTIA A+ / Network+ / Security+ practice
Anusha's Daily Brief — AI, security, startup news + cybersecurity stock data in one HTML email
Dog Tracker Backend proof of concept
High-performance, multi-chain security dashboard that monitors blockchains via Liquify's indexer to catch bridge hacks under 200ms.
A proof of concept for the unification of undefined and indeterminate behaviors across mathematics, logic, physics and computation.
ESLint plugin to detect and prevent hardcoded values in code, promoting better security, flexibility, and configuration best practices.
network_security
Python-based cybersecurity learning toolkit for defensive security, lab practice, and automation.
🔐 Security Vulnerability Detection Framework An interactive, browser-based simulation framework designed to demonstrate, detect, and mitigate common operating system security vulnerabilities in real time.
faydaa-site: Professional static web infrastructure for Faydaa Tech and WabiiNews. Built with WordPress (LocalWP), optimized via Simply Static, and deployed on Cloudflare Pages for maximum speed and security.
Real-time Security Information and Event Management System built with Django REST Framework and React.js. Features DoS detection, brute force detection, port scan detection, JWT authentication and live alerts.
The open source offensive cyber security assistant.
An open-source security AI agent that brings tactical hacking intelligence directly into your terminal
Framework for Uninvited Frequency Usage
Ett hack av troika och Maze Rats
Writetups de maquinas vulnerables de diferentes plataformas explicadas de una forma sencilla de entender
Macro-Safe Converter Launch Kit — research pack for indie hackers building file-conversion SaaS
Kubernetes-native continuous security control validation for federal systems
Hack music. General purpose language for interactive music, audiovisual art, performance and installation
Secure AI agents deployed from Azure AI Foundry with Microsoft Purview, DLP, sensitivity labels, and identity controls
FE HACK
PAID LOTTERY HACK MOD
Epitech module Cloud Security
AI-powered real-time criminal face detection system | React + Supabase + DeepFace (Facenet512) | Live surveillance, angled face detection, criminal database & role-based access control
paramantOS — hardened NixOS for relay operators. Post-quantum Ghost Pipe relay baked in.
security key
Telegram Miniapp with TON Referral System, Admin Panel & Security
nodegoat-security-audit
Security-first local AI agent with cryptographic permission system
Azure-Security-Projects
A home lab simulating a Security Operations Center using Splunk SIEM, and Kali Linux for threat detection and incident response practice.
Zero-trust agentic infrastructure — safety hooks, behavioral policies, kill switches, and graduated autonomy for AI-assisted development with Claude Code and Cursor. npx @bookedsolid/reagent init
AI-powered hedge fund for the Australian Securities Exchange (ASX). Multi-agent system with 14 technical indicators, 6 Australian news sources, LangGraph orchestration, and OpenClaw integration.
A lab simulating a Security Operations Center using a SIEM to monitor DVWA. Includes attack scenarios (SQLi, XSS, brute force) and demonstrates log analysis, threat detection, and incident response workflows.
NM-OS is a desktop operating system designed for everyone. It ships with four switchable security profiles — from everyday comfort to maximum privacy — backed by real enforcement layers: nftables firewall, Tor-first networking, Flatpak sandboxing, and an
ITA1431-Ethical Hacking for Digital Security-192224019
Docker Compose workspace for running a personal collection of AI, knowledge management, notes, search, automation, monitoring, security, and dashboard services
Vulnerability management workflows, authorized pentest governance, evidence templates, and remediation tracking for security teams and authorized assessors
security-first Web3 authentication and backend toolkit built for production applications that need wallet login, session management, RBAC, MFA, OAuth, SIWE, and enterprise-grade backend security without sacrificing developer experience.
Cryptography-Networks-and-Security-Lab
MHL (Mobile hacking labs) labs info/writeup.
Production-style Spring Boot API for branch management, showcasing Clean Architecture, JWT security, transactional outbox with Kafka, and full observability with Prometheus/Grafana/Alertmanager.
Odoo 18 Full Accounting Kit - Security Hardened & Comprehensively Tested (36 fixes, 69 test cases, 20 categories)
Projektarbete webshop med spring security
Modern Vendor Risk Management dashboard aligned with NIS2. Features transparent AI-assisted document analysis with human-in-the-loop oversight, forensic audit logs, and a bilingual (EN/DE) portal for seamless, EU AI Act-compliant supply chain security ass
WebQ: A blazing fast, cross-platform security analysis and intelligence gathering utility powered by Tauri v2, Svelte 5, and the web-analyzer Rust crate.
A proof of concept for fuzzy geometries as first-class data types in PostgreSQL.
⚖️ RAG-Lawyer — AI-powered legal assistant built with Streamlit, FAISS, and OpenAI. Upload legal documents (PDF/DOCX/TXT), perform semantic search with RAG (Retrieval-Augmented Generation), draft petitions & contracts, and get AI-driven legal Q&A — all th
hacking daily news
GTA V mod menus offer undetected cheats for FiveM and single-player modes. Features like external cheats, ESP, and aimbot enhance gameplay, while private cheat sources ensure stealth and security.
Compliance & Fraud AI Agent built natively on Google Cloud. This Proof of Concept utilizes Vertex AI Reasoning Engine, BigQuery function calling (Text-to-SQL), and Vertex AI Search (RAG) to automate retail banking fraud investigations securely.
Proof of concept for dev certs in devcontainers with vscode
Performed structured Linux enumeration to analyze system, network, and user context. Translated command output into security insights, identifying attack surface, exposure points, and misconfiguration risks aligned with real-world reconnaissance practices
Repository for CVE‑related research materials, including vulnerability reports, write‑ups, and proof‑of‑concept (PoC) code
Open source AI agent security toolkit, MCP tool poisoning scanner, ghost agent detection, prompt injection patterns. OWASP Agentic Top 10 2026.
ez-appsec GitHub security dashboard
NSAuditor AI — Open-source, AI-powered network security scanner. 27 plugins, CVE matching, MITRE ATT&CK mapping, verified vulnerabilities, continuous monitoring, MCP integration. Zero data exfiltration. MIT licensed.
An ML-powered tool that detects and remediates AWS cloud security misconfigurations
security-test-codes
Educational Management System: Core CRUD, Spring Security, Enrollment system, Email notifications, REST API layer, Docker config
PPS_Android_security
SoulClaw serves as a technical proof-of-concept and micro-architecture testbed
An Alpine Linux installer script that sets up a diskless, security focused Alpine optimised for being purely a host for VMs
Practical GRC & ISMS portfolio – ISO 27001, risk management and security governance
Prismo is a zero-footprint, USB-portable toolkit that bundles Node.js amd Claude Code to perform 15+ diagnostics across SEO, MarTech, and Security without leaving a single trace on host machine. Works on Windows, macOS, or Linux using a "Plug, Audit, Leav
CyberSecurity-CEH
Enterprise security and monitoring for developers. pip install stillrunning
A python coded feature-rich reverse shell C2 proof-of-concept with encrypted WebSocket communication, advanced credential harvesting, browser data extraction with decryption, desktop surveillance, VSS-based file access, and comprehensive reconnaissance ca
We're hiring two teenagers this year to be the face of Hack Club's social media!
Cryptographic proxy and credential vending for LLM applications. Zero secrets on disk. mTLS everywhere. Apache 2.0.
Verify PyPI package attestations and improve Python supply-chain security
security, high accuracy sql agent mcp, include admin panel.
Self-hosted honeypot, link tracker & threat analysis
Campus Connect lets seniors guide juniors like never before — from placement tips to academic hacks. Share resources, learn from real experiences, and use AI tools to simplify studying. Finally, a platform that turns campus knowledge into a shared superpo
A proof of concept for an Alt-Text Generator tool. Can be used in Claude.
A Node.js (TypeScript) API built to demonstrate common OWASP security vulnerabilities and their mitigation techniques, including XSS, CSRF, SQL injection, and rate limiting, following a defense-in-depth approach.
AI-powered application security scanning — free, open-source replacement for GitLab and GitHub security scanning
Network and Security repository
Synapse Layer — Continuous Consciousness Infrastructure for AI Systems. Persistent. Secure. 1-line integration.
A CLI proof-of-concept for LendaSwap that performs gasless USDC (Arbitrum) to Bitcoin on-chain atomic swaps.
Hands-on Okta IAM lab documenting SSO, user lifecycle, and security policy configuration
IntellMeet: AI-Powered Enterprise Meeting & Collaboration Platform. A production-grade MERN stack system featuring real-time WebRTC video meetings, AI-driven summaries, and smart action item extraction. Designed for high scalability (5k+ users) and securi
This is a 3-key macropad built for Hack Club Hackpad
From zero to hero, with no experience in cyber-security.
Security audit tool for third-party AI API relay/proxy services. Detects hidden prompt injection, prompt leakage, instruction override, and context truncation.
Meridian Security Consulting - Enterprise Cybersecurity & AI Risk Assessment
Behavior-based cryptojacking detection Chrome extension with 5 detection layers. Published in IRJMETS Vol. 8
Hack Storm 2.26
Daily cybersecurity, data engineering & ML tools — auto-generated via GitHub Actions
A starter hub for RBOIS hacking
Security-Incident-Management-System
A robust full-stack e-commerce ecosystem featuring a customer-facing storefront and a dedicated, standalone Admin Dashboard. Designed with a decoupled architecture for enhanced security, this project integrates Supabase for seamless authentication and eff
Security and best-practices scanner for AI Plugins, covering Codex, Claude, Opencode, Gemini & more. Scores trust for plugins 0-100.
All the try hack me rooms that i have slved
A scalable, cloud-native cyber evidence & multimedia sharing platform for security professionals.
Standalone hackable refactoring of production CANN kernel code
CEH Study Guide with Hands-On Labs — NAVTTC Coursework
Broly is a Next.js proof of concept for connecting BigQuery and Power BI to a chat-first analytics experience. Users can connect each source, pick active assets, and ask analytics questions from a single workspace.
매크로 모니터링을 위한 보안팀 관리자 대시보드
Autonomous VAPT platform. Give it a target (FQDN, IP, CIDR) — it hunts, it reports. Inspired by the Obsidian Order.
Sandboxed Docker container for running Claude Code agents safely
Extract exposed Git repositories via Local File Inclusion vulnerabilities to automate source code reconstruction for security testing.
aXIOM is an ai-assisted, academic-assessment, higher-education, proof-of-concept, rubric-evaluation, philosophical-analysis
Provide essential security tools and guides to help crypto traders and DeFi users protect privacy and reduce operational risks.
CyberSecurity-CEH
Conduct automated security audits of web apps and APIs to find authentication, input, rate limiting, and secrets management issues.
Securely back up and restore encrypted data for OpenClaw agent systems with Avenger Initiative.
Detect phishing, typosquatting, and new suspicious domains to support cybersecurity investigations and brand protection.
Python-based Linux Privilege Escalation Enumeration Toolkit for security assessments
CyberSecurity-CEH
EduBot – Institute FAQ Chatbot built for Even Semester Hack-O-Week. Features 10 progressive weekly upgrades: TF-IDF retrieval, synonym expansion, intent classification, entity extraction, context handling, fallback & handover. Python + Tkinter GUI. No ext
Solra Backend — Express + Prisma + PostgreSQL API. 160+ endpoints, real-time sockets, AI safety, A- security grade.
A five-paper AI safety research series examining how training incentives rewarding confident compliance create exploitable vulnerabilities across model behaviour, ecosystem security, institutional accountability, and human cognition. Self-contained HTML +
An experimental web app that tries to convert piano audio into MIDI using only client-side JavaScript. Works directly in your browser—results may vary, but it’s a fun proof of concept.
Interactive CLI wizard to spin up complete Elastic Cloud ECH test environments with Kibana Spaces and Security data generation (alerts, attack discoveries, cases)
Provide simple, auditable security rules in Markdown to reduce risks for OpenClaw agents across multiple platforms and messaging apps.
Provide real-time blockchain data and analytics for DecentralChain with transaction tracking, address insights, and network monitoring tools.
Wireless security labs repo
REST API with JWT authentication, Spring Security and role-based access control
Modern server management panel built with Rust and React. Sites, databases, Docker apps, Git deploy, mail, DNS, monitoring, backups, and security — all in one panel.
HLSA SecOps AI - Security-first AI automation agency website
information_security_projects
26 free, open-source plugins for Claude Code & Cowork — Google Drive, WhatsApp, YouTube, WordPress, Apollo & more. Built on the SOSA™ security framework.
RewardHacking
🛡️ Self-hosted AI agent with 5-layer prompt injection protection. Multi-channel, parallel agents, MCP, Docker-ready, LLM-agnostic.
A comprehensive framework leveraging custom GitHub Copilot agents, GitHub Advanced Security, and Microsoft Defender for Cloud to shift security and compliance left across security, accessibility, code quality, and FinOps domains with SARIF-based CI/CD int
Professional Postman API test suite covering authentication, CRUD operations, request chaining, and security testing against the Restful Booker API.
A high-performance reconnaissance tool built specifically for frontend web security.
Network_and_Information_Security
PortfolioLite – A premium, local-first net worth and asset tracker. Built for privacy, it stores all your financial data exclusively on your device. Features include interactive growth timelines, diverse asset allocation insights, and biometric security.
Smart Savings for the Filipino Foodie Tipid Menu PH is a mobile-first, community-driven platform designed to help Filipinos navigate the rising costs of fast food. It combines the crowdsourced intelligence of Reddit with the location-based utility of Waz
Weekly Solana smart contract security competition — audit AI-generated programs, find bugs, and build your on-chain security track record.
agent-security-skill-scanner
AppImage repack of the ol' KeePassX. This AppImage can pretty much run on a toaster, 1970s TV, dead raccoon, or maybe even a frisbee.
Embedded firmware architecture for a Smart Thermostat using STM32. Implements UART communication, event-driven design, scheduler, security layer, and modular firmware structure.
Complete Ecommerce Backend System with full security
Containerization of a Vercel like network architecture for security attacking and defence
Neuron Encrypt is a transparent, open-source file encryption application featuring military-grade cryptographic security software.
Agent Compliance SDK - trust your agents in production. Turn what your agent handles and what you need to prove into automatic agent runtime security controls. Scale compliance to your agents automatically.
Read-only Microsoft 365 security assessment for IT consultants and administrators
ctx-security
Automated Security Requirements Change Detector and Analyzer
Try hack me room solves with extra tools
Ongoing DFIR-focused Hack The Box write-ups highlighting my investigative methodology and forensic analysis.
Docker compose for electric utility server endpoints for security research
Kuzushi — Agentic SAST scanner with AI triage
Portfolio personal de Misael — Ingeniero en Sistemas & Ethical Hacker.
Public key encryption is useful for personal use and it works great for communication, too! Uses the NIST P521 curve, approximately 260 bit security. Nice CLI features, web app that runs fully locally, PDF key export, clipboard integration and default rec
Omega Walls — a deterministic runtime security layer for RAG and AI agents that detects prompt injection, tool abuse, and data exfiltration via cumulative risk modeling.
Fine-tuned LLM pipeline that converts multi-vendor security alerts into OCSF v1.7.0 Detection Finding JSON, with deterministic post-processing and a human-in-the-loop correction queue.
ESP32-DIV HaleHound Edition for Cheap Yellow Display - Multi-protocol offensive security toolkit
A proof-of-concept of the Go Modular Monolith White Paper that can evolve into a distributed system without rewriting application code.
CLI tool for running coding agents inside hardware-isolated microVMs
Hands-on cybersecurity externship securing a real-world IoT water management platform. Simulated attacks like data interception and replay attacks, then defended systems using TLS, device certificates, and AI-based anomaly detection. Built MQTT pipelines
Modular credential spraying tool for authorized security testing — 28 native Python protocol modules, automatic port scanning, adaptive skipping, pass-the-hash support
Encrypt, split, and secure secrets with QR codes using Shamir's Secret Sharing. Client-side only — no servers, no tracking.
Sentinel is a lightweight and modular Kotlin multiplatform security toolkit designed to analyze operating environments and detect potential security threats in real time.
A 100% local memory layer for chatbots and agents with an MCP server for Claude, GPT, Gemini, and local models. It auto-saves conversations, ingests documents and markdown vaults, and provides hybrid retrieval (vector + keyword + graph) plus enterprise se
Python security log analyzer for SOC analysts
CANARY is a research prototype that collects Jenkins security advisories and produces an explainable baseline risk score for plugins.
And simple script to show level of security 😂
A microservices architecture implementing authentication with JWT-based security, RESTful APIs, and Dockerized deployment.
Hacker news with semantic search
The repository contains the jabil security app backend setup and code.
Secure Banking System using Spring Boot, JWT, Spring Security, MySQL
Cybersecurity-focused personal portfolio of Syed Mujtaba Zaidi showcasing projects, skills, and learning in ethical hacking, network security, and web security.
If you want to download all files at once, please download and extract the zip package.
A Python proof-of-concept for tracing multi-turn Agent-to-Agent (A2A) conversations as a single unified MLflow trace for LLM observability and evaluation.
Backend module of a POS System implemented using Spring Boot. Includes JWT-based authentication, role-based authorization, and security configuration. Developed incrementally as part of a team-based full stack application.
Project CodeGuard is an open-source, model-agnostic security framework that embeds secure-by-default practices into AI coding agent workflows. It provides comprehensive security rules that guide AI assistants to generate more secure code automatically.
A secure, cost-effective deployment of PrestaShop on AWS Free Tier, with separated application and database layers. Includes detailed documentation, architecture design, and cybersecurity best practices for aspiring cloud security professionals.
🎯 Launch pentesting commands quickly with arsenal-ng, a modern, streamlined tool in Go, focused on simplicity and speed for developers.
WiFi adapter comparisons for penetration testing — chipset analysis and monitor mode support.
🛠️ Manage GitHub Actions workflows easily. Lint for best practices and upgrade actions automatically for optimal performance.
My Roadmap of learning cyber security
This repository contains all the projects from Hack-O-week from 1 year.
🤖 Create your own expressive robot with Reachy Mini, an open-source platform for hackers and AI builders to explore robotics and machine learning.
aws-security-scan
A booking service application for proof of concept. Written in Rust!
A user side App for managing Physical Security in Office buildings.
A comprehensive PKI/Certificate Authority management platform
Terraform repository for Cloud Automation and Security
Real-time log viewer for Apache, Nginx, NPM, FAIL2BAN and system logs
🎬 Experience cinematic hacking with MatrixTerminal, a simulated command-line interface that brings Hollywood-style thrills to cybersecurity training.
Live proof-of-concept: AI-structured intelligence briefing for commercial brokers.
Go SDK for building Gibson agents, tools, and plugins
Deterministic, resumable, GPU-native password-guessing suite. Rank/unrank over level-quantized Markov, PCFG, and PRINCE models — 10⁸ candidates/sec on a single GPU. Integrated cracker for NTLM/MD5/SHA/wallet recovery. C++20/CUDA 12.
TAK Portal is a lightweight, modern user-management portal designed to integrate seamlessly with Authentik and TAK Server for streamlined certificate and account control. Built specifically for agencies who need reliability, simplicity, and security.
holbertonschool-cyber_security
The Proof of Concept of zero-knowledge proof attestation for agentic economy
emulator for the Google Security Chip(s)
This framework uses a rigorous category-theoretic approach to model agentic AI in critical infrastructure. It unifies wiring diagrams, behavior and contract algebras, Yoneda-style attacker reasoning, and semantic path analysis to deliver provable, composi
XeOps SDK - TypeScript SDK and CLI for XeOps Security Platform
🛠️ Update Intel chipset drivers effortlessly with this universal tool for Windows 10/11, ensuring optimal performance and security.
🛡️ Analyze Nmap XML reports with this GUI tool, visualizing vulnerabilities and prioritizing risks for effective security assessments.
🚀 Speed up your Solana applications with the hedged RPC client that reduces latency by racing multiple providers for the fastest response.
🔒 Strengthen Proxmox VE 9+ security by creating a dedicated user, enabling SSH key authentication, and applying best practices for access control.
Proof of concept for a self deleting binary for Unix Like machine. Specifically made for linux, written in Rust.
Ilo (Industrial Lightweight Overlay) is a proof of concept for utilizing overlay networks in opertional technology of the Institute of Control Systems (IRS), at the Karlsruhe Institue of Technology (KIT).
Jarvis V5 Local AI Operating System (Holomat, Voice Assistant, Security Dashboard, 3D Tools, and System UI).
🛡️ Run a robust Tor relay with built-in diagnostics and monitoring for enhanced privacy and security.
Hacks for Blooket Game.
🎨 Enhance project development with BallCat, a modular framework for easy feature integration and seamless updates using React and Ant Design.
☕ Streamline JVM workloads with hardened OCI images preinstalled with Temurin JDK 25 and JDK 26, ensuring security and performance for your applications.
🔍 Analyze suspicious emails quickly with AI for safe communication. Forward emails to receive instant security reviews on potential threats.
Create policy files, e.g. CODE_OF_CONDUCT.md, CONTRIBUTING.md, FUNDING.md, GOVERNANCE.md, SECURITY.md, SUPPORT.md
Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research
IT Support & Security Portfolio — troubleshooting, system operations, and log analysis.
The best EaglerCraft hacked client!
macOS sandbox-exec config for Claude Code that restricts filesystem READ access for enhanced security
Common library for Azul 3 security manipulation.
Researches the social aspects of security, including methods of countering psychological pressure, social engineering, blackmail, domestic abuse, and manipulation techniques used by totalitarian or destructive groups. Views cybersecurity as an integral pa
User-scoped AI governance and control plane for agentic systems. Modular identity, policy, rate limits, routing, and audit layers for LLM and tool calls.
collaborative browser proof of concept
Walkthrough macchine Hack the Box
Proof-of-Concept para análises SATS do Pipeline
Blog
run a python tool with certain APIs disabled
🧠 Automatically collects and updates public Proof-of-Concept (PoC) exploits from poc-in-github.motikan2010.net
This is a Proof of Concept (PoC) project for a pipeline that automatically extracts and structures metadata from PDF archaeological excavation reports using a Large Language Model (LLM).
This repository is a dedicated space where I document my hands-on experience, technical labs, and the continuous growth of my skills in the field of information security.
Protecting your Cookies from Hackers and Hungry Developers
My Profile
🌐 Deploy multiple proxy protocols easily with this all-in-one script for Linux distributions like Alpine, Debian, and Ubuntu.
🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
Advanced subdomain takeover scanner — passive + active + CNAME fingerprinting
🚀 Build production-ready AI agents with FastAPI and Google ADK in this hands-on workshop for seamless integration and powerful user experiences.
DMARC report parser and analyzer with CLI interface for email security insights
The vNext Platform has a horizontally scalable service cluster and can perform all kinds of workflows and functions with high security by providing interfaces to customers, employees, and systems through frontend applications managed by these services.
Central hub for threat intelligence and Blockchain-based threat intelligence
VytalLink is a digital health platform connecting personal health data—including Apple Health, Google Fit, and wearables—with AI assistants like ChatGPT and Claude. Includes a Flutter app, Node.js MCP server, and Firebase landing page. Focused on privacy
Land Use Board of Appeals Headnotes in json format (proof of concept)
Hacking-
🛡️ Assess and enhance your cybersecurity skills with EthicalHackingTools, a versatile toolkit for security professionals and researchers.
Discover Blue OSINT, an open-source tool for gathering public information online. Ideal for investigators and analysts. 📊🔍 Gather data effortlessly.
Wargame platform for practicing linux and ethical hacking skills through a game-like experience
A fun website dedicated to displaying track of past, present and future Dublin Airport security times.
Professional Security Suite for WordPress. Protects REST API, blocks User Enumeration, enforces Geo-Blocking, and provides detailed intrusion logs.
In-depth frontend system design knowledge base — architectural patterns, performance optimization, security, and API design with real-world code examples
A Framework for Integrating Application Security into Software Engineering (FIASSE) using the Securable Software Engineering Model (SSEM)
🌱 a fast, batteries-included static-site generator that transforms Markdown content into fully functional websites
在Java安全学习过程中的笔记和代码
Covert channel proof-of-concept — arithmetic encoded in ICMP reply counts
A proof-of-concept transaction outbox pattern approach using Postgres' logical replication
A proof-of-concept demonstrating tapjacking techniques
🛡️ Ensure AI safety with hai-guardrails, offering enterprise-grade solutions in just a few lines of code for secure AI deployment.
SocialSecurityAnswers
A hackable creative coding web editor
holbertonschool-cyber_security
A mirror of my NixOS Dotfiles repo which is more than just my system configs but also my mono repo of almost all the things I hack on.
A working proof of concept of a UoC -- a Bitcoin Insight Engine
Repo for pentest productivity scripts
Python TUI wrapping the aircrack-ng/hcxtools suite for WPA2 handshake capture, deauthentication attacks, and wordlist cracking - with auto-detection for desktop, tmux, NetHunter and Termux.
📥 Exploit iOS sandbox vulnerabilities in itunesstored and bookassetd to gain access to restricted file paths and modify device characteristics.
A repository containing various files pertaining to the more written aspects of Cybersecurity
Security and compliance management
Swiss-Hacking-Challenge
CPAN Security Advisory CSAF
The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems.
🐘 LoxoSec by git5 - Comunity for Hackers and Linux lovers
Proof of Concept for a Kokkos-like API in Rust
ROBLOX Universal Aimbot, Wall Hack (ESP) & Crosshair GUI (ADVANCED AND MORE OPTIMIZED REMAKE)
Containerised URL Shortener, with security by design. Vulnerability detection on all artefacts via GitHub actions with reputable tooling.
MSRC API client for .NET
Kubescape eBPF agent 🥷🏻
AxoSyslog - the scalable security data processor
Research and proof of concept to develop the next SecureDrop with end to end encryption.
It is dedicated repository for learning, experimentation, and proof-of-concept implementations.
Hack space for release testing
JavaScript SDK for Socket.dev API
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Get Android app updates straight from the source.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Extension to Tink Java that provides AWS-KMS integration
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
The comprehensive guide for online anonymity and OpSec.
Blog for my stuff
A curated list of annual cyber security reports
pytest + rich integration (proof of concept)
📧 Streamline email verification with HMC-3.0, ensuring reliable communication, efficient database checks, and robust data security for professionals.
Rimac Hacking Challenge 2021 🚗
Terraform module to configure GitHub Actions as an OpenID Connect (OIDC) identity provider in AWS.
The wolfSSL Command Line Utility wolfCLU
🔐 Share Wi-Fi access securely and beautifully with QR codes. Enjoy a privacy-first design, print-ready layouts, and a responsive interface for all devices.
Authup is an authentication & authorization system.
A library that removes common unicode confusables/homoglyphs from strings.
Command line interface for the Phylum API
It focuses on collecting all Metal Slug everything about the NeoGeo MVS/AES system, all types of ROMs that have existed, All Lost Media Predecrypted, Decrypter, Encrypte, Earlier And Bootleg, Darksoft, Neo SD And Hack
A WordPress plugin to enforce certain security focused limits for users with wp-admin access.
🔍 Detect reward hacking in RL training with RewardScope. Track reward components and visualize agent behavior to enhance learning efficiency.
The trustworthy ReDoS checker
Repositorio de documentación y referencias relativas al mundo de la ciberseguridad, creado y mantenido por la Comunidad de ProtAAPP
A Hacker News client for iOS
Hack the planet!
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
The Hack For LA Data Science team is a Community of Practice within the LA brigade seeking to make analytical and machine learning services available to local communities and organizations.
Adds Security headers to Etherpad Express responses, including CSP(content security policy) and X-Frame-Origin
让Java开发更简便的工具库
🚀 Connect Claude Desktop with Hacker News through the Model Context Protocol (MCP) for seamless interactions and enhanced information flow.
CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org website.
Hack Club's PostgreSQL-based shortlink router.
IP/CIDR/DOMAIN Tools
Servers for our website, HTTP/HTTPS connectivity checks, HTTPS network time, NTP (for Qualcomm XTRA), Broadcom PSDS cache, Samsung PSDS cache, Qualcomm PSDS (XTRA) cache, SUPL proxy, attestation key provisioning proxy, Vanadium component update check/down
Express.js security middleware for checking user password safety with Have I Been Pwned (HIBP) API
Store and manage Microsoft.AspNetCore.Authentication providers dynamicaly
Agnostic benchmark in OCaml (proof-of-concept)
🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
Runtime data collection for the StackRox Kubernetes Security Platform using eBPF
Scan for known secrets in your source code before you check in
🔒 Custody SPL tokens and verify ZK proofs on Solana with this on-chain Incognito Swap program for secure, private transactions.
http://firewalla.com
Basic stuff, scripts, and so on used when hacking on mesa
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
.files, including ~/.osx — sensible hacker defaults for OS X
Don't pass the referring URL to third parties. This handles the security/privacy issue where you don't want the third party service to know your pad URL
NSS - Network Security Services
UNIX-like reverse engineering framework and command-line toolset
CVE-2025-13822 -- MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some endpoints are not protected by authentication middleware, allowing an unauthenticated attacker to perform actions in the name of other users and using their privileges.
CVE-2025-40745 -- A vulnerability has been identified in Siemens Software Center (All versions < V3.5.8.2), Simcenter 3D (All versions < V2506.6000), Simcenter Femap (All versions < V2506.0002), Simcenter STAR-CCM+ (All versions < V2602), Solid Edge SE2025 (All versions <
CVE-2025-7389 -- A vulnerability in the AdminServer component of OpenEdge on all supported platforms grants its authenticated users OS-level access to the server
CVE-2025-8095 -- The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge platform.  It has been identified as cryptographically weak and unsuitable for stored encodings and enterprise applications.  OECH1 encodings should be considered exploitable an
CVE-2026-0207 -- A vulnerability exists in FlashBlade whereby sensitive information may be logged under specific conditions.
CVE-2026-0209 -- Under certain administrative conditions, FlashArray Purity may apply snapshot retention policies earlier or later than configured.
CVE-2026-24032 -- A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3 with UMC). The affected application contains an authentication weakness due to insufficient validation of user identity in the UMC component.
CVE-2026-2449 -- Improper neutralization of argument delimiters in a command ('argument injection') vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Hijacking a Privileged Thread of Execution.This issue affects upKeeper Instant Privilege Access
CVE-2026-2450 -- .NET misconfiguration: use of impersonation vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Hijacking a Privileged Thread of Execution.This issue affects upKeeper Instant Privilege Access: through 1.5.0.
CVE-2026-24906 -- October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a Stored Cross-Site Scripting (XSS) vulnerability in the Backend Editor Settings. The Markup Classes fields (used for paragraph styles, inline style
CVE-2026-24907 -- October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a stored cross-site scripting (XSS) vulnerability in the Event Log mail preview feature. When viewing logged mail messages, HTML content was rendere
CVE-2026-25133 -- October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a stored cross-site scripting (XSS) vulnerability in the SVG sanitization logic. The regex pattern used to strip event handler attributes (such as o
CVE-2026-25654 -- A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3). Affected products do not properly validate user authorization when processing password reset requests. This could allow an authenticated remote attacker to bypass authorization ch
CVE-2026-27668 -- A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (All versions < V5.8). User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate th
CVE-2026-33414 -- Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quot
CVE-2026-33714 -- Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 contains a SQL Injection vulnerability in the statistics AJAX endpoint, which is an incomplete fix for CVE-2026-30881. While CVE-2026-30881 was patched by applying Security::re
CVE-2026-33892 -- A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < V1.15.17), Industrial Edge Management Pro V2 (All versions >= V2.0.0 < V2.1.1), Industrial Edge Management Virtual (All versions >= V2.2.0 < V2.8.0). Affect
CVE-2026-33948 -- jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to determ
CVE-2026-34161 -- Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the social post attachment upload functionality, where an authenticated user can upload a malicious HTML
CVE-2026-34984 -- External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Versions 2.2.0 and below contain a vulnerability in runtime/template/v2/template.go where the v2 template engine removes env
CVE-2026-35032 -- Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and
CVE-2026-35033 -- Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain an unauthenticated arbitrary file read vulnerability via ffmpeg argument injection through the StreamOptions query parameter parsing mechanism. The ParseStreamOptions m
CVE-2026-39422 -- MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability through the application name or icon fields when creating an application. When a victim visits the public chat interfac
CVE-2026-39423 -- MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an Eval Injection vulnerability in the Markdown rendering engine that allows any user capable of interacting with the AI chat interface to execute arbitrary JavaScript i
CVE-2026-39424 -- MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, the chat export feature is vulnerable to Improper Neutralization of Formula Elements in a CSV File. When an administrator exports the application chat history to an Excel fi
CVE-2026-39425 -- MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability that allows authenticated users to inject arbitrary HTML and JavaScript into the Application prologue (Opening Remarks)
CVE-2026-39906 -- Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argu
CVE-2026-39907 -- Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose an unauthenticated WCF SOAP endpoint on TCP port 1208 that accepts unsanitized file paths in the ReadLicense action's LFName parameter, allowing remote attackers to trigger SM
CVE-2026-40315 -- PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL identifier injection vulnerability in SQLiteConversationStore where the table_prefix configuration value is directly concatenated into SQL queries via f-strings without any validat
CVE-2026-5713 -- The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to