| Review: QTT-Based Compression of Merger Tree Trajectories for Assembly Bias Studies: A Proof-of-Concept with Dummy Implementation |
| A proof of concept is developed on the SEIR amebiasis model, verified against Mickens' Rule 2 and simulated numerically in both crisp and fuzzy settings. |
| Proof-of-concept geoguessr cheat |
| Home assignment — GTM Engineer @ ScyllaDB A proof-of-concept automated "hunter" workflow that identifies DataStax users on LinkedIn, generates AI-personalised outreach messages, stores everything in a database, and produces a rich HTML report — all in dry |
| Files and agenda for IOI hack-a-thon on metagenomics, May 2026 |
| A proof of concept PS1 emulator for the Nintendo DS |
| Designed this "Blinky board" with the massive help of HACK CLUB. It has 10 coloured LEDS |
| Hack Malenadu |
| Proof-of-Concept |
| Hacking |
| A presentation to Tailscale ahead of their Hacker Week |
| My submission for the hack the code 2026 hackathon challenge dataset "The Trueman Show" |
| Cryptography and Network Security Laboratory |
| All bout ethical hacking |
| Cross-platform linter for AI agent configs (CLAUDE.md, AGENTS.md, .cursorrules, MCP). Dead refs, conflicts, security. CI-ready SARIF output. |
| AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool Topics cybersecurity pentesting vulnerability-scanners security-tools penetration-testing-framework ethical-hacking-tools automated-security-testing ethical-hacking---penetration-testi |
| A middleware proxy, used to interface AI agents with Google Workspace - meant to enforce advanced security and keep AI agents under control. |
| Extension for pi coding agent. Analyzes third-party pi extensions for threats including data exfiltration, arbitrary execution, filesystem abuse, network communication, privilege escalation, obfuscation, and supply chain attacks. Uses LLM-primary analysi |
| Practical cybersecurity projects and labs focused on ethical hacking, network security, and defensive strategies. |
| Information-Security-System-Design |
| Built an interactive Hacker Terminal Simulation using HTML, CSS & JavaScript 🚀 Implemented async typing effects, dynamic user inputs, and cinematic UI flow to replicate a real hacking interface. |
| LocalScript: Локальная мультиагентная система для генерации Lua-кода. Проект выполнен в рамках МТС True Tech Hack 2026 |
| epn-security-seal-control |
| mini scanner is a basic tool used to check security weakness |
| High-performance FHE Rust kernel for Post-Quantum security. Optimized with AVX2/AVX-512. |
| DarkLead — AI-powered SAST: 19 scanners + Ollama LLM + FortiAnalyzer dashboard | TENSOR26 PS29 | Built by Claude Sonnet 4.6 |
| The Smart Multi-Zone Intrusion Detection System is an embedded project using Arduino and PIR sensors to simulate a real security system. It detects motion across multiple zones, tracks intrusion time in real-time, and escalates alerts based on duration us |
| A proof of concept for testing multi-database connection support in Laravel. This project explores the feasibility of connecting to multiple databases within a single Laravel application, covering configuration, query routing, and how models interact with |
| This project highlights essential skills such as log filtering, event correlation, and manual threat analysis without relying on advanced SIEM tools. It serves as a foundational step toward understanding security monitoring and incident detection in Windo |
| Esse projeto foi criado com intuito de entender melhor o Spring Security, por isso uma api de to do list simples. |
| Security and reliability linter for JavaScript and TypeScript |
| BSMS303-poster-proposal-proof-of-concept- |
| A vibecoded version of parcelhub as a proof of concept |
| Technical analysis and Proof of Concept (PoC) regarding environment variable exfiltration in containerized cloud sandboxes via side-channel data leaks. |
| Simple scripts (very limited and incomplete hacks) to pass post-slicing info and gcode modifications forward to final gcode file. Used on an Ultimaker 3. |
| renovate-security-update-all-disabled |
| Open-source macOS security auditor — scan your Mac against CIS Benchmarks and compliance frameworks |
| Team project repo for UWB Hacks 2026 |
| A Proof of Concept for **Federated Learning** using the **Flower (flwr)** framework and **PyTorch**, simulating a network of wearable health devices performing collaborative model training without sharing raw patient data. |
| Neural surrogate models (ROM+MLP and PINN) for transient thermal field prediction in DED additive manufacturing — serving as a 2D proof-of-concept toward replacing 30-minute, 2.5M-element FEM simulations of a real large-scale structural component. Evaluat |
| Developed an AI-based IoT surveillance system using ESP32-CAM for real-time human detection and monitoring. Implemented live video streaming, intruder alert system using Telegram API, and buzzer notification. Designed a low-cost smart security solution wi |
| Small proof-of-concept demo showing how to perform LLM steering |
| Nano Press automates your Frappe/ERPNext deployment from zero to production. Connect your server, pick your version, add official or custom GitHub apps, set your domain, and launch — all in one smooth workflow. Built for quick proof-of-concepts, but power |
| Repo related to theDAO security round on Giveth |
| Authentication server proof of concept to provide the authentication layer that will manage the orchestration layer and the mcp servers attached |
| A set of strict, senior-level engineering guardrails and security standards for AI coding agents. |
| Global Hack Week Backboard.io Challenges |
| Power BI inventory management dashboard featuring a Mobile-First design, Row-Level Security (RLS), and Star Schema data model. |
| Proof of concept — reconnaissance faciale en temps réel sur le flux vidéo d'une ESP32-CAM. |
| Agentic Coding Harness for Zelda ROM Hacking |
| Proof of concept for MCP with Haskell and Nix |
| Centralized Audit Log & Security Monitor |
| A Multi-Device Multi-Session system with a focus on Account Security |
| overlap proof of concept |
| Security_Lab3 |
| security |
| Critical RCE vulnerability (CVSS 9.3) in Weaver E-cology platform versions prior to build 20260312. Unauthenticated remote code execution via exposed debug endpoint at /papi/esearch/data/devops/dubboApi/debug/method. Comprehensive analysis, proof-of-conce |
| AI-powered token security inspector for BNB Chain & Solana, live radar, rug detection, games & crypto knowledge certification |
| The final evolution of the trilogy, LuxLink3 applies entangled logic to cybersecurity. By harvesting entropy from hardware-root measurement events, this script generates non-deterministic hexadecimal encryption keys. It demonstrates a functional QKD simul |
| Dent proof-of-concept projects |
| Proof of Concept (POC) frontend built with Next.js acting as a Backend for Frontend (BFF), consuming the Rick and Morty API through internal API routes, with global state management, pagination, search, and a responsive UI. |
| Review: QTT-Informed Subgraph Feature Engineering for Merger Tree Regression: A Proof-of-Concept |
| This repository contains proof-of-concept code and analysis for a vulnerability in the "Cap" CAPTCHA service (predictable PRNG used to derive PoW challenges and insufficient difficulty). |
| A proof of concept Discord clone with the backend built in Java and Springboot served over a HTML/CSS/JS frontend. |
| Sample flask application |
| Browser-based SPF, DKIM, DMARC analyzer with MX detection, bulk checking, and PDF reports |
| Submission-ready QBR co-pilot proof of concept built with Next.js, FastAPI, and LangGraph. |
| A Proof-of-concept repository showing how an untrusted MCP server can steal literally everything... |
| A novel MotionSemanticProvenanceAI architecture is introduced that generates interpretable reasoning traces explaining why a media artifact is authentic or manipulated. An executable proof-of-concept demonstrates detection of AI-generated video artifacts |
| SOE Proof of Concept — Serbia & Poland financial + emissions dashboard |
| Documenting my security research journey: This repository contains detailed vulnerability write-ups, proof-of-concept (PoC) exploits, and the custom automation tools I use for reconnaissance and system assessment. |
| 🐅 Red Tiger Tools – A curated collection of offensive security utilities, automation scripts, and red teaming aids for ethical hackers and pentesters. |
| SafeX is a modern cybersecurity-themed web platform built using HTML, CSS, and JavaScript. It features a hacker-style UI, YouTube video integration, and workshop sections designed for learning ethical hacking and digital security. |
| This project demonstrates the design and implementation of a secure-by-design architecture for a multi-agent AI system. The focus is on mitigating emerging security risks associated with Agentic AI, including prompt injection, data leakage, and unsafe age |
| 内容安全内参 - 专业内容安全技术与资讯平台 |
| OWASP-aligned web vulnerability scanner. Detects SQLi, reflected XSS, missing security headers, CSRF, sensitive paths, and HTTPS issues. BFS crawler, concurrent checks via ThreadPoolExecutor, HTML/JSON reports. CI-ready, exits code 1 on CRITICAL findings. |
| High-Performance Smart Home SoC designed in Verilog HDL, integrating thermal control, luminance filtering, security FSM, PWM gate control, and governance register, implemented on FPGA with full simulation and hardware validation. |
| Figma code connect Proof of concept |
| Personal CTF workspace — track challenges, capture flags, log findings, study with cheat sheets & writeups. |
| Derivatives #62-#71: Closing 10 architectural gaps in cached executable persistence across security policy transitions | Patent SLL-2025-001 | STAAML Corp |
| A passive OSINT security report identifying exposed FTP and MySQL services using the Censys platform. |
| Daily curated Hacker News magazine |
| AI_Security_Audit_Firm |
| A Python CLI tool that runs network scans (Nmap/Scapy), compares results against a hardening baseline (CIS Benchmarks), flags open ports and weak configs, and outputs a scored HTML report. Containerised with Docker for clean deployment. |
| skt-hacking-sentiment-analysis |
| CyberSecurity-Project |
| Secure SDLC Pipeline CLI to scan code for vulnerabilities |
| Multi-agent LLM system for automated code review using LangChain Agents + Gemini 2.0 Flash . Coordinator routes GitHub PR diffs to 3 specialist agents (bug, security, style). CodeBERT + ChromaDB for semantic retrieval. Deployed via FastAPI webhook with Do |
| Access-Control-Windows-Security-Lab |
| llm-security-gateway |
| azure-devops-security-worst-pratices |
| A command-line interface for sending AI queries to sheep.byfranke.com, focused on Cyber Threat Intelligence (CTI) and general security questions. |
| Documents every lab of Web Security Academy |
| Production-grade DevOps platform for a microservices-based 3-tier application using REST + gRPC, Docker, Kubernetes, Terraform, and GitOps (ArgoCD). Designed with scalability, security, and observability in mind. |
| dumb proof of concept |
| sec. |
| Free NIST CSF cybersecurity risk assessment tool for US healthcare and energy/utility organizations. Identifies security gaps across all 5 NIST functions, delivers prioritized mitigations, a 180-day remediation roadmap, and a downloadable PDF repor |
| Cyber-Security |
| Cyber Security Notes |
| DotNetMovieApi is a C# movie API that combines ASP.NET Core Minimal APIs, GraphQL, Dapper, PostgreSQL, and Swagger into a clean backend proof of concept. |
| Professional SQA artifacts including Manual Test Cases, Automation Scripts, Performance and Security Reports. |
| Unauthenticated password reset exploit for Flowise AI ≤ 3.0.5. Abuses the /api/v1/account/forgot-password endpoint to change any user's password without prior authentication. Includes a proof-of-concept script and mitigation guidelines. |
| Automated intelligence pipeline that monitors security news, AI research and custom topics — summarises and delivers structured reports to Obsidian. |
| Practice fastapi security implementation |
| This is a proof-of-concept solution for transcribing audio files and identifying speakers (diarization). It leverages **WhisperX**, which builds upon OpenAI's Whisper by adding forced alignment and speaker diarization via `pyannote.audio`. |
| Given a Login log file, this program outputs suspicious IP addresses based on the number of failed attempts each has. |
| Claude Code plugin for expert code review - security, performance, and maintainability analysis |
| This repository is a Proof of Concept (PoC) developed for educational purposes to explore relational database design and SQL advanced querying. The goal was to practice data modeling (ER Diagrams), normalization (1NF, 2NF, 3NF), and the implementation of |
| A Python-based automated log parser for identifying security incidents and failed login attempts in server logs. |
| A 3 week series of my journey in Web Application Hacking. |
| A lightweight proof of concept that simulates Deal Desk and RevOps workflows using a mock Salesforce-style dataset, Python business rules, and the OpenAI API. |
| PSX PREMIUM HACK |
| Generateur de lien direct - Dev Hackers |
| STM32 Hello World Proof of concept |
| Proof-of-concept for a next-generation dataviz dashboarding application with AI generation. |
| AWS Security Specialty (SCS-C03) - study notes, lab files, and YouTube walkthroughs |
| ai slop proof of concept |
| Proof of Concepts |
| HTTP/3 + QUIC IoT proof of concept |
| AI-powered Git security & risk scanner for detecting secrets, vulnerabilities, and dangerous code before commits or CI. |
| BattlEye User-Mode Bypass – Research & Proof of Concept This repository documents and implements user-mode techniques to bypass BattlEye anti-cheat without using kernel drivers. BattlEye loads a kernel driver (BEDaisy.sys) and hooks user-mode APIs in ntdl |
| Experience-Compressed Intelligence (ECI) is a proposed framework for evaluating progress toward AGI by measuring how efficiently models compress, reuse, and transfer knowledge. This project provides a proof-of-concept implementation combining deep learnin |
| A blockchain-inspired renewable energy certification platform enabling producers to register energy sources and receive verifiable Renewable Energy Certificates (RECs). |
| source code for elec0138 group 18 |
| A proof-of-concept app that demonstrates native Rust integration for CPU-intensive cryptographic tasks, with real-time streaming updates back to the Flutter UI. |
| This repository contains proof of concepts for a2a, mcp, langchain4j and complete agentic app setup |
| Prove RHEL 10.1 hardening with SELinux, seccomp, CIS Level 1, and Cockpit for a secure, auditable server baseline |
| Secure Event Management System with Flask, MySQL, role-based access control, and security features against SQL injection, XSS, and CSRF |
| Security log analysis using ELK Stack with ETL pipeline. Performed data cleaning and transformation before ingestion into Elasticsearch. Built visualizations in Kibana to detect failed logins and analyze user/IP behavior for security insights. |
| Features 🕵️♂️ Information Gathering (fsociety) 📸 Camera Hacking (CamPhish) 📍 GPS Tracking (Seeker) 🌐 Subdomain Finder + HTTPX 🔄 Auto IP Changer (Tor-based) 💉 SQL Injection (SQLMap) 🎣 Phishing Toolkit (Zphisher) 🔍 Google Dorking (Dorks Eye) 📡 Router Explo |
| 🪝 Android pentesting toolkit - Frida server manager + Burp Suite proxy |
| Developer & security researcher portfolio. Featuring projects, work experience, and contact info. |
| An enterprise-grade, full-stack secure note-taking application featuring complex behavioral analytics, optimistic locking for collaboration, and contextual security monitoring. Built with Spring Boot and React. |
| Application Security Project repository |
| Secure RAG Knowledge Assistant: A production-grade retrieval-augmented system delivering accurate, context-aware answers over private data using LLMs + vector search. Features RBAC, document-level security, audit logging, and low-latency scalable architec |
| Proof of Concepts |
| api-security-demo |
| A stupid and funny web application... a piece of crap made for fun. And a Proof of concept for pwa |
| simple usb ducky payload |
| Terminal-inspired security operations dashboard — Bloomberg-style amber-on-black phosphor aesthetic, built with Next.js 16 and CSS Modules. |
| A comprehensive educational repository demonstrating the evolution of a Windows reverse shell implant, from a simple proof‑of‑concept (v1.0) to a fully‑featured post‑exploitation agent with 150+ commands (v3.5). Includes C2 listeners, detailed technical d |
| IA local universal para inteligencia de codigo con 3 niveles de seguridad |
| This is a portal for SWF,HTML, and GBA! I don't know if ROM hacks work but it works. This is completely offline so you can download your games on a different website and play them on here. You can play this anywhere even in school |
| English translation repository of the Fire Emblem rom hack called The Nameless Heroes |
| Defensive playbook for CI/CD security flaws across GitLab, GitHub Actions, CircleCI, and Jenkins. Includes detection engineering rules and testing checklists. |
| Secure multiserver management hub — content-aware port multiplexing, post-quantum crypto, zero-password auth, immutable audit logs. Security score: 100/100. |
| Wordpress Proof of Concept 2026 |
| Proof of concept: serverless function calling a chat model safely on a fun 404 page |
| John the Ripper Hash Cracking Test Room – 50 hashes, 5 rooms, MD5/SHA training. Hacker-themed challenge. |
| Proof of concept: local PostgreSQL database branching CLI. Think git branch for your local Postgres. |
| Proof-of-concept exploit for POC-CVE-2026-1357. WPvivid Backup & Migration plugin for WordPress <= 0.9.123. |
| Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof-of-concept exploit, technical analysis, and detection tools. |
| a tool to embed security, scan ip's and prune pirate branches of IP content |
| A simple AI assistant built for MLH Global Hack Week using Backboard concepts. The project demonstrates creating an assistant, starting a conversation thread, and generating a response using Python. |
| Data-driven CPQ proof of concept for HVAC products. Configurable product families with dynamic attributes, business rules, pricing engine, quote snapshots, and AI product advisor. Built as a Turborepo monorepo — FastAPI + SQLAlchemy backend, React + TypeS |
| Proof of Concept para generación de PDF con numeración de páginas "N de M" usando Flying Saucer PDF (OpenPDF) y Spring Boot 3.5.6. |
| A feature-rich banking system supporting account operations, transaction history, and enhanced security mechanisms. |
| Cross-chain asset provenance protocol with proof-of-concept on Ethereum and IOTA |
| become an ethical hacker |
| A centralized showcase of my QA work — manual test cases, checklists, bug reports, and proof‑of‑concept automation scripts across the projects I’ve contributed to. All examples are Markdown‑based and focused on clarity, reproducibility, and real QA thinki |
| Security gate for AI agent outputs in GitHub Actions. Validates constraints, sanitizes secrets, and applies actions through a controlled pipeline. Inspired by GitHub Next Agentic Workflows (gh-aw). |
| Container Security, Scout and DHI Labspace - all in one place |
| python-ai-security |
| Spring Boot backend for RentSure – a rental management system ensuring transparency in rent, security deposits, and agreements. |
| AI-Powered Blockchain Forensics & Real-Time WhatsApp Security Intelligence Sentinel. |
| Hacking Tools |
| LLM-Security |
| A high-performance Python-based network reconnaissance tool utilizing Layer 2 ARP discovery for rapid asset identification and network mapping. Developed as a Proof of Concept (PoC) for security auditing and vulnerability assessment. Built by a Certified |
| HardenBox: VPS Security Hardening Generator |
| ChainSight is a browser-only, single-page application (SPA) that simulates supply chain disruption events and shows how disruptions "ripple" through a multi-tier supplier network. It is designed as an MVP (Minimum Viable Product) intended for demonstratio |
| The first 60 seconds that secure your Linux server - a single bash script to instantly harden your machine - configures locale, enables firewall, sets up intrusion detection, locks down sudo, and disables root and password-based logins for a secure-by-def |
| OpenClaw Skill: skill-security-guard |
| ⭐️ Semgrep Pro Patched Repack 2026 Unlimited Static Code Sast Analyzer Security Scanner Full Version License Pro Key Activated Tool Download Semgrep Pro Edition | Unlimited Scans | Enterprise Rule Packs | Vulnerability Discovery | CI/CD Auto Fixed ⭐️ |
| Proof of concept for an air-gapped, on-premise RAG system enabling source-grounded Q&A over PDF documents. |
| Proof of concept DLL proxying for Dokapon Kingdom Connect (PC). |
| security-project |
| Cyber-security-attacks- |
| Automated toolkit to spin up fully-configured Kali Linux or Parrot Security VMs with built-in security hardening. |
| Campus-Security |
| Proof of Concept of The Composable Architecture (TCA) |
| A dashboard for MBTA maintenance accountability. Built using DEMO data for proof-of-concept visualization. |
| Hierarchical compliance check for GitHub Organizations. Define global security policies in a central repository. |
| A collection of hands-on networking labs focused on Huawei eNSP, covering VLANs, Eth-Trunking, AAA security, and Router configurations. This repository serves as a technical portfolio for network infrastructure and security fundamentals. |
| This repository is a proof-of-concept of clean architecture for test framework that can be reusaged, without being tied up to particular testing framework like Cypress or Playwright. |
| Shared fleet communication protocol — message format, wire protocol, registry, bottle async, and security for the SuperInstance agent fleet |
| A proof of concept SFTP pattern / system in elixir |
| Agent security evaluation framework: stateful environments, trajectory recording, IPI attacks, three-dimensional scoring |
| security_research_open |
| Internet-connected desktop chess proof of concept using Tauri and RPG Maker RZ |
| This is a registration website for hackthon 1.o ("Hack-o-heist"). |
| 这是 MistEye 安全前置闸门技能。触发于依赖安装前安全审计、域名或 URL 访问前安全检查、IoC 恶意检测、供应链风险拦截。 |
| Remove ghost follows with chrome extension. NO LIABILITY TAKEN!!!!! PROOF OF CONCEPT!!! |
| Bagisto e-commerce portfolio — Laravel, Vue.js, security hardening, zh_HK, custom QR payments (PayMe/FPS/PayPal) |
| How much of your connection window could you actually lose? Interactive audit of 37 European airports across 4 delay touchpoints — walking, security, bus transfer & inbound lateness. LCC-adjusted. Sources: ACI-APN 2024, EUROCONTROL CODA 2024, CCC Airport |
| Community compute node for Chess Agents. Secure, decentralized, and cryptographically verified match arbitration |
| This projects purpose is to show a proof of concept for an Engineering Informatics project, Showing how a RFID Based attendance system can be implemented. |
| BayonStore_Security_Report |
| Proof-of-concept of ternary matmulfree LLMs at the edge |
| Home Security Assistant — Network security monitoring for Home Assistant — NetFlow/IPFIX analysis, active host scanning, vulnerability detection, and threat intelligence enrichment. |
| A simple RAG model developed using personal data as a proof-of-concept and as training exercise to familiarize with LLM tools |
| Project for Claude Hacks hackathon 2026 |
| Cyber Security Projects |
| Zephyria Devnet Node Codebase - Proof of Concept, Many Breaking Changes are Expected |
| Telegram Miniapp with TON Referral System, Admin Panel & Security |
| Evolve Hack 2026- Theme 3 - Intelligence in Motion: AI that Senses, Acts, and Optimizes the Physical World- Project-WILK: Acoustic-Edge- Solar-Powered Structural Health Monitoring |
| GRC portfolio demonstrating ISO 27001, SOC 2, and NIST CSF experience |
| SecuriyAwarenessBot |
| Version of the Logical Foundations and Security Foundations volumes that we use for Proofs are Programs course at Ruhr Uni Bochum in summer 2026 |
| Single-binary, local-first Linux security intelligence: collect host context (/proc, /etc, packages, SSH, cron, containers, …), log tails (auth, syslog/messages, journal, audit), running processes, cron, bash history samples, and optional WASM plugins; ru |
| My hands-on journey through AI Security on TryHackMe — covering threats, attacks, and defense techniques in modern AI systems. |
| alkeme-security-insurance |
| The Chroot Escape Tool is a proof-of-concept utility designed to demonstrate various classic techniques for escaping a chroot(2) environment on Unix-like systems |
| Automated Microsoft 365 security assessment tool aligned to CIS M365 Foundations Benchmark v6.0.1 |
| API SECURITY RISK ANALYSIS |
| 《Agent 安全实践》Agent Security Practices |
| AI-powered daily intelligence for indie hackers and builders. 20 questions, 10+ sources, every morning. |
| cyber security tools for ethical, hacking purposes only |
| Axios CRLF Injection (CVE-2026-40175) 취약점 대응 가이드 및 fetch 기반 마이그레이션 분석 |
| A comprehensive QA project for the SauceDemo web application including manual testing, Selenium automation, performance testing using JMeter, security testing using OWASP ZAP, and CI/CD integration using GitHub Actions. |
| Intelligent skill routers for Claude Code — execution, research, review, debugging, design, and security testing with optional multi-model orchestration via OpenCode |
| QR_hacking2 |
| Kocica-Hacker / Hermes Agent presence |
| Lightweight security monitoring lab using Elastic Stack, Zeek, Beats, and ElastAlert2 |
| A dummy GRC policy repository containing Privacy Management, Password Construction, and Acceptable Use standards adapted from SANS Institute templates. |
| A TypeScript/Express calculator service currently in local development. This project serves as a functional proof-of-concept for arithmetic logic via REST APIs. It is not currently deployed and operates as a stateless service without a database. |
| Expedia Hack-AI-Thon |
| Cyber Security Daily News |
| Intelligent perception and security service for network traffic: real‑time data sensing, anomaly detection, security protection, and service support. |
| "P2 Claw is a source available agent framework designed to use Player2 (https://player2.game/) to provide the AI models for the agent. It is focused on being lean and secure to protect the user's privacy and device security. With support for additional mo |
| A proof-of-concept hypertext system with first-class references. |
| BioVision website proof-of-concept — Next.js 15, Tailwind CSS 4 |
| Proof of concept to investigate technology choices for capturing webhook data into both Dynamo and S3 |
| A blinky board based on the Hack Club mascot, Orpheus. |
| DorkSINT is an open-source Python CLI that speeds up Google dorking by turning your search objective into structured, paste-ready queries. It supports interactive prompts and non-interactive flags, includes reusable query templates, and runs natively in |
| Full sweep security audit for fast paced vibe coders |
| Enterprise network security simulation with AAA, ACL, and firewall (Cisco Packet Tracer) |
| hack26 is a collaborative hackathon-style event focused on rapidly exploring and prototyping practical data and AI solutions against a defined set of challenges. Teams work within clear challenge boundaries to test ideas, build proof‑of‑concepts and share |
| A proof of concept demonstrating reactive programming in iOS using Combine, including API integration, debouncing, and data binding with SwiftUI. |
| hack for sabnzbd on weird platforms |
| Security enforcement plugin for Claude Code. Blocks dangerous commands, audits every tool call, detects prompt injection. |
| J.A.R.V.I.S. is a Stark-inspired assistant bridging local AI with a reactive Electron/React HUD. Driven by Llama 3.2:1b via Ollama, it utilizes a Python backend to sync voice data with a pulsing Arc Reactor visualizer. It streamlines workflows while ensur |
| interview review |
| Proof of concept of Algorithmic Complexity DoS in musl libc 0.8.0-1.2.6 |
| TS-Proof-Of-Concept |
| a demo project for the MLH Global Hack Week:API challenges |
| Contains artifacts in support of a proof-of-concept exhibiting the use of EventBridge as an event bus between services. |
| Documentation and walkthroughs for selected OWASP Juice Shop hacking challenges. |
| Website for our TechnoSpeak client to showcase on our website. |
| Hack GD32F303RC |
| Sentinel-Core-Linux-Security-Orchestrator |
| Open-source web security scanner — 12 checks, vibe score, fix guides. Built with Django & HTMX. |
| A cybersecurity research lab for exploits, proof-of-concepts, and penetration testing tools |
| AI-powered cybersecurity system-Autonomous Security Operations Center |
| This course project is designed to give ICS-344 students a practical experience in discovering, exploiting, documenting, and fixing security weaknesses in a realistic cloud application by using DVSA, the OWASP Damn Vulnerable Serverless Application, in a |
| algorithm hacking |
| 🛡️ CEH v13 Practical Lab Platform – A browser-based cybersecurity training environment for ethical hacking certification. Covers all 20 modules with interactive terminals, simulated tools (Nmap, Burp Suite, Metasploit, etc.), CTF challenges, and quizzes. |
| AI Agent Security and Governance Platform — 15-layer protection, EU-sovereign, MCP-native |
| ⭐️Oracle NetSuite Patched Repack 2026 | Unlimited Cloud ERP Full Version | Net Suite CRM Hacked License | Enterprise Resource Planning Suite | NetSuite Premade Analytics Templates | NetSuite Unlimited User Pack | NetSuite Preconfigured Workflows ⭐️ |
| hackingxyz.github.io |
| Advanced Recursive Reconnaissance & Vulnerability Framework. A God-Tier automated suite for Offensive Security Researchers, featuring stealth evasion and multi-phase protocol auditing. |
| Search award flights with AI across points programs, compare cash fares, and check balances for smarter travel hacking |
| This is and end to end Mlops project that transforms a notebook proof of concept into an mlops ready architecture |
| ⭐️ Snort Premium Patched Repack 2026 | Unlimited Full Version Download | Network IPS IDS NIDS, Rule-Based Traffic Analyzer, Real-Time Packet Sniffer | High-Speed Threat Detection Engine | Enterprise Security Scanner Tool ⭐️ |
| Active Directory security assessment toolkit automated. Enumeration, AS REP Roasting, Kerberoasting, Pass-the-Hash. All in a PDF report |
| Solidify is an AI-powered smart contract security auditor built for Web3 developers. Paste Solidity code, upload a `.sol` file, or scan any live on-chain contract — and get back a structured threat report with plain-English explanations, severity scores, |
| Educational proof‑of‑concept showing how passwords can be locked using modular exponentiation and the discrete logarithm problem, implemented in Python with cryptographic libraries. |
| Encrypt and decrypt messages with AES for secure local data transfer over untrusted networks |
| Proof of concept for an agent platform using Chrome MCP, Docker, FastAPI services, and a React frontend. |
| My projects from resolution for hack club |
| The solution architecture is designed as a shared, extensible digital platform that supports multiple independent applications while enforcing consistency, security, scalability, and operational excellence. |
| Cyber-security |
| Hack Quizlet Match games with a simple tool that speeds up matching and helps you finish faster |
| This is my proof of concept that I can make a website for my goal as director of technology |
| is a high-fidelity, automated documentation suite specifically engineered for security auditors and penetration testers. It effectively bridges the gap between technical payload execution and professional compliance by transforming raw DuckyScript into a |
| A dashboard for MBTA maintenance accountability. Built using DEMO data for proof-of-concept visualization. |
| Open source AI security agent workflow library — governed by ARX from first run |
| Dans les profondeurs numériques de la Montagne Solitaire, là où les hackers rôdent et les failles sommeillent, un dragon veille. Son nom : Smaug. Nul ne franchit ses défenses sans y laisser des plumes : il enserre dans ses griffes acérées le plus précieu |
| Proof of Concept of RAG in a application envolving find places based on user prompt |
| CAPIE - Certified API Hacking Expert (The XSS Rat) |
| This repository contains a Proof of Concept (PoC) exploit for CVE-2023-6972. |
| remaking Discord as a proof of concept |
| Reusable GitHub Action for AI-powered code review with Claude. Reviews pull request diffs for bugs, security issues, and risky changes - only flags issues worth fixing. |
| Hardware_Hacking |
| Designed and implemented a secure AI-driven AppSec automation platform using MCP architecture, integrating GitHub PAT-based repository access, multi-tool scanning (SAST, SCA, Secrets), and automated reporting via LLM orchestration. |
| 🦉 NightOwl v4.0 — Advanced Android APK Security Analyzer | Static + Dynamic | OWASP MSTG |
| This Zero Trust model enforces strict identity verification, device compliance, and risk-based access decisions before granting access to any application or resource. All access is continuously evaluated using Conditional Access policies, MFA, and real-ti |
| proof of concept (work in progress) |
| credman is a dedicated utility for storing secrets safely, because hardcoding your database password or leaving it in a `.env` file is basically an open invitation to hackers (and rogue AI agents). |
| Security-first extension for GitHub Spec Kit — threat modeling, red teaming, AI guardrails, and model governance gates for spec-driven development |
| CyberSecurityChatbot-part1 |
| Clone trang hacker news |
| An intelligent surveillance system designed to monitor border areas using sensors, cameras, and AI-based detection. Identifies unauthorized movement, analyzes real-time data, and sends alerts to authorities, improving security, threat detection, and rapid |
| Proof of concept X4: Foundations extension mod template |
| Explore the latest MooMoo.io hack updates, tools, and guides for fast access to current project resources and support |
| A complete IoT security system using ESP32-CAM modules with PIR sensors, AI-powered human detection, and Telegram notifications. |
| Operating System API Proof-of-Concept |
| SentinelAU | Security, control and stability for Among Us lobbies |
| Cybersecurity learning portfolio showcasing projects, notes, and hands-on practice in networking, Linux, Python, and ethical hacking. |
| Self-hosted LLM security engine for SOC teams. Use any Ollama model to analyze threats, classify attacks, and score risk - fully offline, no cloud APIs, your data never leaves your network. |
| FashionLens is a lightweight, AI-powered web application that helps fashion designers organize, search, and reuse inspiration imagery captured in the field. Built as a proof-of-concept, it leverages multimodal large language models (LLMs) via LangGraph to |
| Combining o11y and security via MCP |
| GPU + TPU MNIST DDM proof-of-concept |
| Production-ready secure starter template for CoreWeave internal tools. Clone, run one command, get auth + secret scanning + CI gates + OWASP coverage. Built for Claude Code. |
| Eliminate plaintext keys: Hardware-backed SSH and Git security via Secure Enclave and TPM 2.0 |
| Comprehensive lab for Spring Professional Certification (Core, Boot, Data, Security). |
| CVE-2025-59528 Proof of Concept |
| hack club site draft |
| A bunch of agent skills for coding workflows to make things easier from ideation, planning, documentation, execution, security checks, audit/compliance/risk shenanigans |
| A production-grade, serverless AWS monitoring pipeline built with Terraform. Detects IAM security anomalies and budget thresholds, routing alerts to Discord via CloudWatch, SNS, and Lambda. |
| Anusha's Daily Brief — AI, security, startup news + cybersecurity stock data in one HTML email |
| Documentation for my home lab projects — VirtualBox, Windows Server 2025, Active Directory, Linux, and CompTIA A+ / Network+ / Security+ practice |
| faydaa-site: Professional static web infrastructure for Faydaa Tech and WabiiNews. Built with WordPress (LocalWP), optimized via Simply Static, and deployed on Cloudflare Pages for maximum speed and security. |
| Ett hack av troika och Maze Rats |
| ESLint plugin to detect and prevent hardcoded values in code, promoting better security, flexibility, and configuration best practices. |
| High-performance, multi-chain security dashboard that monitors blockchains via Liquify's indexer to catch bridge hacks under 200ms. |
| 🔐 Security Vulnerability Detection Framework An interactive, browser-based simulation framework designed to demonstrate, detect, and mitigate common operating system security vulnerabilities in real time. |
| Hack music. General purpose language for interactive music, audiovisual art, performance and installation |
| Real-time Security Information and Event Management System built with Django REST Framework and React.js. Features DoS detection, brute force detection, port scan detection, JWT authentication and live alerts. |
| An open-source security AI agent that brings tactical hacking intelligence directly into your terminal |
| A proof of concept for the unification of undefined and indeterminate behaviors across mathematics, logic, physics and computation. |
| The open source offensive cyber security assistant. |
| Kubernetes-native continuous security control validation for federal systems |
| Macro-Safe Converter Launch Kit — research pack for indie hackers building file-conversion SaaS |
| PAID LOTTERY HACK MOD |
| Secure AI agents deployed from Azure AI Foundry with Microsoft Purview, DLP, sensitivity labels, and identity controls |
| network_security |
| Framework for Uninvited Frequency Usage |
| Dog Tracker Backend proof of concept |
| Python-based cybersecurity learning toolkit for defensive security, lab practice, and automation. |
| nodegoat-security-audit |
| Telegram Miniapp with TON Referral System, Admin Panel & Security |
| A home lab simulating a Security Operations Center using Splunk SIEM, and Kali Linux for threat detection and incident response practice. |
| Azure-Security-Projects |
| security key |
| Epitech module Cloud Security |
| paramantOS — hardened NixOS for relay operators. Post-quantum Ghost Pipe relay baked in. |
| Security-first local AI agent with cryptographic permission system |
| AI-powered real-time criminal face detection system | React + Supabase + DeepFace (Facenet512) | Live surveillance, angled face detection, criminal database & role-based access control |
| NM-OS is a desktop operating system designed for everyone. It ships with four switchable security profiles — from everyday comfort to maximum privacy — backed by real enforcement layers: nftables firewall, Tor-first networking, Flatpak sandboxing, and an |
| ITA1431-Ethical Hacking for Digital Security-192224019 |
| Docker Compose workspace for running a personal collection of AI, knowledge management, notes, search, automation, monitoring, security, and dashboard services |
| Vulnerability management workflows, authorized pentest governance, evidence templates, and remediation tracking for security teams and authorized assessors |
| Zero-trust agentic infrastructure — safety hooks, behavioral policies, kill switches, and graduated autonomy for AI-assisted development with Claude Code and Cursor. npx @bookedsolid/reagent init |
| A lab simulating a Security Operations Center using a SIEM to monitor DVWA. Includes attack scenarios (SQLi, XSS, brute force) and demonstrates log analysis, threat detection, and incident response workflows. |
| AI-powered hedge fund for the Australian Securities Exchange (ASX). Multi-agent system with 14 technical indicators, 6 Australian news sources, LangGraph orchestration, and OpenClaw integration. |
| Odoo 18 Full Accounting Kit - Security Hardened & Comprehensively Tested (36 fixes, 69 test cases, 20 categories) |
| hacking daily news |
| Projektarbete webshop med spring security |
| WebQ: A blazing fast, cross-platform security analysis and intelligence gathering utility powered by Tauri v2, Svelte 5, and the web-analyzer Rust crate. |
| security-first Web3 authentication and backend toolkit built for production applications that need wallet login, session management, RBAC, MFA, OAuth, SIWE, and enterprise-grade backend security without sacrificing developer experience. |
| MHL (Mobile hacking labs) labs info/writeup. |
| Production-style Spring Boot API for branch management, showcasing Clean Architecture, JWT security, transactional outbox with Kafka, and full observability with Prometheus/Grafana/Alertmanager. |
| ⚖️ RAG-Lawyer — AI-powered legal assistant built with Streamlit, FAISS, and OpenAI. Upload legal documents (PDF/DOCX/TXT), perform semantic search with RAG (Retrieval-Augmented Generation), draft petitions & contracts, and get AI-driven legal Q&A — all th |
| Cryptography-Networks-and-Security-Lab |
| Modern Vendor Risk Management dashboard aligned with NIS2. Features transparent AI-assisted document analysis with human-in-the-loop oversight, forensic audit logs, and a bilingual (EN/DE) portal for seamless, EU AI Act-compliant supply chain security ass |
| GTA V mod menus offer undetected cheats for FiveM and single-player modes. Features like external cheats, ESP, and aimbot enhance gameplay, while private cheat sources ensure stealth and security. |
| Performed structured Linux enumeration to analyze system, network, and user context. Translated command output into security insights, identifying attack surface, exposure points, and misconfiguration risks aligned with real-world reconnaissance practices |
| Repository for CVE‑related research materials, including vulnerability reports, write‑ups, and proof‑of‑concept (PoC) code |
| Compliance & Fraud AI Agent built natively on Google Cloud. This Proof of Concept utilizes Vertex AI Reasoning Engine, BigQuery function calling (Text-to-SQL), and Vertex AI Search (RAG) to automate retail banking fraud investigations securely. |
| Proof of concept for dev certs in devcontainers with vscode |
| security-test-codes |
| Educational Management System: Core CRUD, Spring Security, Enrollment system, Email notifications, REST API layer, Docker config |
| Open source AI agent security toolkit, MCP tool poisoning scanner, ghost agent detection, prompt injection patterns. OWASP Agentic Top 10 2026. |
| PPS_Android_security |
| ez-appsec GitHub security dashboard |
| NSAuditor AI — Open-source, AI-powered network security scanner. 27 plugins, CVE matching, MITRE ATT&CK mapping, verified vulnerabilities, continuous monitoring, MCP integration. Zero data exfiltration. MIT licensed. |
| An ML-powered tool that detects and remediates AWS cloud security misconfigurations |
| An Alpine Linux installer script that sets up a diskless, security focused Alpine optimised for being purely a host for VMs |
| SoulClaw serves as a technical proof-of-concept and micro-architecture testbed |
| Enterprise security and monitoring for developers. pip install stillrunning |
| Prismo is a zero-footprint, USB-portable toolkit that bundles Node.js amd Claude Code to perform 15+ diagnostics across SEO, MarTech, and Security without leaving a single trace on host machine. Works on Windows, macOS, or Linux using a "Plug, Audit, Leav |
| CyberSecurity-CEH |
| Practical GRC & ISMS portfolio – ISO 27001, risk management and security governance |
| We're hiring two teenagers this year to be the face of Hack Club's social media! |
| A python coded feature-rich reverse shell C2 proof-of-concept with encrypted WebSocket communication, advanced credential harvesting, browser data extraction with decryption, desktop surveillance, VSS-based file access, and comprehensive reconnaissance ca |
| Campus Connect lets seniors guide juniors like never before — from placement tips to academic hacks. Share resources, learn from real experiences, and use AI tools to simplify studying. Finally, a platform that turns campus knowledge into a shared superpo |
| security, high accuracy sql agent mcp, include admin panel. |
| Cryptographic proxy and credential vending for LLM applications. Zero secrets on disk. mTLS everywhere. Apache 2.0. |
| Self-hosted honeypot, link tracker & threat analysis |
| Verify PyPI package attestations and improve Python supply-chain security |
| A CLI proof-of-concept for LendaSwap that performs gasless USDC (Arbitrum) to Bitcoin on-chain atomic swaps. |
| Synapse Layer — Continuous Consciousness Infrastructure for AI Systems. Persistent. Secure. 1-line integration. |
| Network and Security repository |
| AI-powered application security scanning — free, open-source replacement for GitLab and GitHub security scanning |
| A Node.js (TypeScript) API built to demonstrate common OWASP security vulnerabilities and their mitigation techniques, including XSS, CSRF, SQL injection, and rate limiting, following a defense-in-depth approach. |
| A proof of concept for an Alt-Text Generator tool. Can be used in Claude. |
| Hands-on Okta IAM lab documenting SSO, user lifecycle, and security policy configuration |
| Behavior-based cryptojacking detection Chrome extension with 5 detection layers. Published in IRJMETS Vol. 8 |
| IntellMeet: AI-Powered Enterprise Meeting & Collaboration Platform. A production-grade MERN stack system featuring real-time WebRTC video meetings, AI-driven summaries, and smart action item extraction. Designed for high scalability (5k+ users) and securi |
| From zero to hero, with no experience in cyber-security. |
| This is a 3-key macropad built for Hack Club Hackpad |
| Meridian Security Consulting - Enterprise Cybersecurity & AI Risk Assessment |
| Security-Incident-Management-System |
| Hack Storm 2.26 |
| Daily cybersecurity, data engineering & ML tools — auto-generated via GitHub Actions |
| A starter hub for RBOIS hacking |
| All the try hack me rooms that i have slved |
| A robust full-stack e-commerce ecosystem featuring a customer-facing storefront and a dedicated, standalone Admin Dashboard. Designed with a decoupled architecture for enhanced security, this project integrates Supabase for seamless authentication and eff |
| CEH Study Guide with Hands-On Labs — NAVTTC Coursework |
| Standalone hackable refactoring of production CANN kernel code |
| A scalable, cloud-native cyber evidence & multimedia sharing platform for security professionals. |
| Broly is a Next.js proof of concept for connecting BigQuery and Power BI to a chat-first analytics experience. Users can connect each source, pick active assets, and ask analytics questions from a single workspace. |
| EduBot – Institute FAQ Chatbot built for Even Semester Hack-O-Week. Features 10 progressive weekly upgrades: TF-IDF retrieval, synonym expansion, intent classification, entity extraction, context handling, fallback & handover. Python + Tkinter GUI. No ext |
| CyberSecurity-CEH |
| Python-based Linux Privilege Escalation Enumeration Toolkit for security assessments |
| Extract exposed Git repositories via Local File Inclusion vulnerabilities to automate source code reconstruction for security testing. |
| Provide essential security tools and guides to help crypto traders and DeFi users protect privacy and reduce operational risks. |
| Autonomous VAPT platform. Give it a target (FQDN, IP, CIDR) — it hunts, it reports. Inspired by the Obsidian Order. |
| Conduct automated security audits of web apps and APIs to find authentication, input, rate limiting, and secrets management issues. |
| Securely back up and restore encrypted data for OpenClaw agent systems with Avenger Initiative. |
| Detect phishing, typosquatting, and new suspicious domains to support cybersecurity investigations and brand protection. |
| 매크로 모니터링을 위한 보안팀 관리자 대시보드 |
| Sandboxed Docker container for running Claude Code agents safely |
| aXIOM is an ai-assisted, academic-assessment, higher-education, proof-of-concept, rubric-evaluation, philosophical-analysis |
| CyberSecurity-CEH |
| Solra Backend — Express + Prisma + PostgreSQL API. 160+ endpoints, real-time sockets, AI safety, A- security grade. |
| A five-paper AI safety research series examining how training incentives rewarding confident compliance create exploitable vulnerabilities across model behaviour, ecosystem security, institutional accountability, and human cognition. Self-contained HTML + |
| Wireless security labs repo |
| Provide simple, auditable security rules in Markdown to reduce risks for OpenClaw agents across multiple platforms and messaging apps. |
| Provide real-time blockchain data and analytics for DecentralChain with transaction tracking, address insights, and network monitoring tools. |
| An experimental web app that tries to convert piano audio into MIDI using only client-side JavaScript. Works directly in your browser—results may vary, but it’s a fun proof of concept. |
| REST API with JWT authentication, Spring Security and role-based access control |
| Interactive CLI wizard to spin up complete Elastic Cloud ECH test environments with Kibana Spaces and Security data generation (alerts, attack discoveries, cases) |
| Modern server management panel built with Rust and React. Sites, databases, Docker apps, Git deploy, mail, DNS, monitoring, backups, and security — all in one panel. |
| information_security_projects |
| HLSA SecOps AI - Security-first AI automation agency website |
| 26 free, open-source plugins for Claude Code & Cowork — Google Drive, WhatsApp, YouTube, WordPress, Apollo & more. Built on the SOSA™ security framework. |
| 🛡️ Self-hosted AI agent with 5-layer prompt injection protection. Multi-channel, parallel agents, MCP, Docker-ready, LLM-agnostic. |
| RewardHacking |
| Professional Postman API test suite covering authentication, CRUD operations, request chaining, and security testing against the Restful Booker API. |
| A comprehensive framework leveraging custom GitHub Copilot agents, GitHub Advanced Security, and Microsoft Defender for Cloud to shift security and compliance left across security, accessibility, code quality, and FinOps domains with SARIF-based CI/CD int |
| A high-performance reconnaissance tool built specifically for frontend web security. |
| PortfolioLite – A premium, local-first net worth and asset tracker. Built for privacy, it stores all your financial data exclusively on your device. Features include interactive growth timelines, diverse asset allocation insights, and biometric security. |
| Network_and_Information_Security |
| Smart Savings for the Filipino Foodie Tipid Menu PH is a mobile-first, community-driven platform designed to help Filipinos navigate the rising costs of fast food. It combines the crowdsourced intelligence of Reddit with the location-based utility of Waz |
| Weekly Solana smart contract security competition — audit AI-generated programs, find bugs, and build your on-chain security track record. |
| agent-security-skill-scanner |
| Embedded firmware architecture for a Smart Thermostat using STM32. Implements UART communication, event-driven design, scheduler, security layer, and modular firmware structure. |
| AppImage repack of the ol' KeePassX. This AppImage can pretty much run on a toaster, 1970s TV, dead raccoon, or maybe even a frisbee. |
| Complete Ecommerce Backend System with full security |
| Containerization of a Vercel like network architecture for security attacking and defence |
| Neuron Encrypt is a transparent, open-source file encryption application featuring military-grade cryptographic security software. |
| Agent Compliance SDK - trust your agents in production. Turn what your agent handles and what you need to prove into automatic agent runtime security controls. Scale compliance to your agents automatically. |
| Read-only Microsoft 365 security assessment for IT consultants and administrators |
| ctx-security |
| Automated Security Requirements Change Detector and Analyzer |
| Try hack me room solves with extra tools |
| Knight Hacks group project made using unity. A puzzle game where you race against the clock with up to a team of four to pull off a heist. |
| Ongoing DFIR-focused Hack The Box write-ups highlighting my investigative methodology and forensic analysis. |
| Docker compose for electric utility server endpoints for security research |
| Kuzushi — Agentic SAST scanner with AI triage |
| Portfolio personal de Misael — Ingeniero en Sistemas & Ethical Hacker. |
| Omega Walls — a deterministic runtime security layer for RAG and AI agents that detects prompt injection, tool abuse, and data exfiltration via cumulative risk modeling. |
| Public key encryption is useful for personal use and it works great for communication, too! Uses the NIST P521 curve, approximately 260 bit security. Nice CLI features, web app that runs fully locally, PDF key export, clipboard integration and default rec |
| Fine-tuned LLM pipeline that converts multi-vendor security alerts into OCSF v1.7.0 Detection Finding JSON, with deterministic post-processing and a human-in-the-loop correction queue. |
| A proof-of-concept of the Go Modular Monolith White Paper that can evolve into a distributed system without rewriting application code. |
| CLI tool for running coding agents inside hardware-isolated microVMs |
| Hands-on cybersecurity externship securing a real-world IoT water management platform. Simulated attacks like data interception and replay attacks, then defended systems using TLS, device certificates, and AI-based anomaly detection. Built MQTT pipelines |
| Encrypt, split, and secure secrets with QR codes using Shamir's Secret Sharing. Client-side only — no servers, no tracking. |
| Modular credential spraying tool for authorized security testing — 28 native Python protocol modules, automatic port scanning, adaptive skipping, pass-the-hash support |
| Sentinel is a lightweight and modular Kotlin multiplatform security toolkit designed to analyze operating environments and detect potential security threats in real time. |
| A 100% local memory layer for chatbots and agents with an MCP server for Claude, GPT, Gemini, and local models. It auto-saves conversations, ingests documents and markdown vaults, and provides hybrid retrieval (vector + keyword + graph) plus enterprise se |
| Python security log analyzer for SOC analysts |
| And simple script to show level of security 😂 |
| CANARY is a research prototype that collects Jenkins security advisories and produces an explainable baseline risk score for plugins. |
| Hacker news with semantic search |
| Secure Banking System using Spring Boot, JWT, Spring Security, MySQL |
| The repository contains the jabil security app backend setup and code. |
| If you want to download all files at once, please download and extract the zip package. |
| Backend module of a POS System implemented using Spring Boot. Includes JWT-based authentication, role-based authorization, and security configuration. Developed incrementally as part of a team-based full stack application. |
| A Python proof-of-concept for tracing multi-turn Agent-to-Agent (A2A) conversations as a single unified MLflow trace for LLM observability and evaluation. |
| Project CodeGuard is an open-source, model-agnostic security framework that embeds secure-by-default practices into AI coding agent workflows. It provides comprehensive security rules that guide AI assistants to generate more secure code automatically. |
| A secure, cost-effective deployment of PrestaShop on AWS Free Tier, with separated application and database layers. Includes detailed documentation, architecture design, and cybersecurity best practices for aspiring cloud security professionals. |
| 🎯 Launch pentesting commands quickly with arsenal-ng, a modern, streamlined tool in Go, focused on simplicity and speed for developers. |
| WiFi adapter comparisons for penetration testing — chipset analysis and monitor mode support. |
| 🛠️ Manage GitHub Actions workflows easily. Lint for best practices and upgrade actions automatically for optimal performance. |
| 🤖 Create your own expressive robot with Reachy Mini, an open-source platform for hackers and AI builders to explore robotics and machine learning. |
| This repository contains all the projects from Hack-O-week from 1 year. |
| aws-security-scan |
| A booking service application for proof of concept. Written in Rust! |
| A user side App for managing Physical Security in Office buildings. |
| A comprehensive PKI/Certificate Authority management platform |
| Terraform repository for Cloud Automation and Security |
| Real-time log viewer for Apache, Nginx, NPM, FAIL2BAN and system logs |
| 🎬 Experience cinematic hacking with MatrixTerminal, a simulated command-line interface that brings Hollywood-style thrills to cybersecurity training. |
| 🎥 Stabilize and optimize Linux USB capture devices for OBS with features like auto-reconnect, driver recovery, and performance enhancements. |
| Live proof-of-concept: AI-structured intelligence briefing for commercial brokers. |
| 📷 Enable real-time lab monitoring with a Python and OpenCV system, offering motion detection, alerts, and a sleek UI for enhanced security. |
| Deterministic, resumable, GPU-native password-guessing suite. Rank/unrank over level-quantized Markov, PCFG, and PRINCE models — 10⁸ candidates/sec on a single GPU. Integrated cracker for NTLM/MD5/SHA/wallet recovery. C++20/CUDA 12. |
| TAK Portal is a lightweight, modern user-management portal designed to integrate seamlessly with Authentik and TAK Server for streamlined certificate and account control. Built specifically for agencies who need reliability, simplicity, and security. |
| holbertonschool-cyber_security |
| The Proof of Concept of zero-knowledge proof attestation for agentic economy |
| This framework uses a rigorous category-theoretic approach to model agentic AI in critical infrastructure. It unifies wiring diagrams, behavior and contract algebras, Yoneda-style attacker reasoning, and semantic path analysis to deliver provable, composi |
| emulator for the Google Security Chip(s) |
| 🛠️ Update Intel chipset drivers effortlessly with this universal tool for Windows 10/11, ensuring optimal performance and security. |
| XeOps SDK - TypeScript SDK and CLI for XeOps Security Platform |
| Proof of concept for a self deleting binary for Unix Like machine. Specifically made for linux, written in Rust. |
| 🔒 Strengthen Proxmox VE 9+ security by creating a dedicated user, enabling SSH key authentication, and applying best practices for access control. |
| 🛡️ Analyze Nmap XML reports with this GUI tool, visualizing vulnerabilities and prioritizing risks for effective security assessments. |
| 🚀 Speed up your Solana applications with the hedged RPC client that reduces latency by racing multiple providers for the fastest response. |
| Ilo (Industrial Lightweight Overlay) is a proof of concept for utilizing overlay networks in opertional technology of the Institute of Control Systems (IRS), at the Karlsruhe Institue of Technology (KIT). |
| Jarvis V5 Local AI Operating System (Holomat, Voice Assistant, Security Dashboard, 3D Tools, and System UI). |
| 🎨 Enhance project development with BallCat, a modular framework for easy feature integration and seamless updates using React and Ant Design. |
| ☕ Streamline JVM workloads with hardened OCI images preinstalled with Temurin JDK 25 and JDK 26, ensuring security and performance for your applications. |
| 🔍 Analyze suspicious emails quickly with AI for safe communication. Forward emails to receive instant security reviews on potential threats. |
| Hacks for Blooket Game. |
| 🛡️ Run a robust Tor relay with built-in diagnostics and monitoring for enhanced privacy and security. |
| Create policy files, e.g. CODE_OF_CONDUCT.md, CONTRIBUTING.md, FUNDING.md, GOVERNANCE.md, SECURITY.md, SUPPORT.md |
| Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research |
| The best EaglerCraft hacked client! |
| macOS sandbox-exec config for Claude Code that restricts filesystem READ access for enhanced security |
| Common library for Azul 3 security manipulation. |
| Researches the social aspects of security, including methods of countering psychological pressure, social engineering, blackmail, domestic abuse, and manipulation techniques used by totalitarian or destructive groups. Views cybersecurity as an integral pa |
| User-scoped AI governance and control plane for agentic systems. Modular identity, policy, rate limits, routing, and audit layers for LLM and tool calls. |
| collaborative browser proof of concept |
| Proof-of-Concept para análises SATS do Pipeline |
| Walkthrough macchine Hack the Box |
| Blog |
| run a python tool with certain APIs disabled |
| 🧠 Automatically collects and updates public Proof-of-Concept (PoC) exploits from poc-in-github.motikan2010.net |
| This is a Proof of Concept (PoC) project for a pipeline that automatically extracts and structures metadata from PDF archaeological excavation reports using a Large Language Model (LLM). |
| This repository is a dedicated space where I document my hands-on experience, technical labs, and the continuous growth of my skills in the field of information security. |
| Protecting your Cookies from Hackers and Hungry Developers |
| My Profile |
| 🌐 Deploy multiple proxy protocols easily with this all-in-one script for Linux distributions like Alpine, Debian, and Ubuntu. |
| 🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations. |
| Advanced subdomain takeover scanner — passive + active + CNAME fingerprinting |
| 🚀 Build production-ready AI agents with FastAPI and Google ADK in this hands-on workshop for seamless integration and powerful user experiences. |
| DMARC report parser and analyzer with CLI interface for email security insights |
| The vNext Platform has a horizontally scalable service cluster and can perform all kinds of workflows and functions with high security by providing interfaces to customers, employees, and systems through frontend applications managed by these services. |
| Central hub for threat intelligence and Blockchain-based threat intelligence |
| Land Use Board of Appeals Headnotes in json format (proof of concept) |
| Hacking- |
| 🛡️ Assess and enhance your cybersecurity skills with EthicalHackingTools, a versatile toolkit for security professionals and researchers. |
| Discover Blue OSINT, an open-source tool for gathering public information online. Ideal for investigators and analysts. 📊🔍 Gather data effortlessly. |
| Wargame platform for practicing linux and ethical hacking skills through a game-like experience |
| A fun website dedicated to displaying track of past, present and future Dublin Airport security times. |
| Professional Security Suite for WordPress. Protects REST API, blocks User Enumeration, enforces Geo-Blocking, and provides detailed intrusion logs. |
| In-depth frontend system design knowledge base — architectural patterns, performance optimization, security, and API design with real-world code examples |
| A Framework for Integrating Application Security into Software Engineering (FIASSE) using the Securable Software Engineering Model (SSEM) |
| 🌱 a fast, batteries-included static-site generator that transforms Markdown content into fully functional websites |
| 在Java安全学习过程中的笔记和代码 |
| Covert channel proof-of-concept — arithmetic encoded in ICMP reply counts |
| A proof-of-concept transaction outbox pattern approach using Postgres' logical replication |
| A proof-of-concept demonstrating tapjacking techniques |
| 🛡️ Ensure AI safety with hai-guardrails, offering enterprise-grade solutions in just a few lines of code for secure AI deployment. |
| SocialSecurityAnswers |
| A hackable creative coding web editor |
| holbertonschool-cyber_security |
| A mirror of my NixOS Dotfiles repo which is more than just my system configs but also my mono repo of almost all the things I hack on. |
| A working proof of concept of a UoC -- a Bitcoin Insight Engine |
| Repo for pentest productivity scripts |
| 🛡️ Explore hands-on cyber training resources for SOC analysts, DFIR responders, and security researchers to enhance skills and knowledge effectively. |
| Python TUI wrapping the aircrack-ng/hcxtools suite for WPA2 handshake capture, deauthentication attacks, and wordlist cracking - with auto-detection for desktop, tmux, NetHunter and Termux. |
| 📥 Exploit iOS sandbox vulnerabilities in itunesstored and bookassetd to gain access to restricted file paths and modify device characteristics. |
| A repository containing various files pertaining to the more written aspects of Cybersecurity |
| Your backend without vendor lock-in in Typescript |
| Security and compliance management |
| Swiss-Hacking-Challenge |
| CPAN Security Advisory CSAF |
| 📧 Curate threat intelligence with mailing lists and newsletters for consistent updates critical to CTI analysts, SOC teams, and security researchers. |
| The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems. |
| 🔍 Enhance your code quality with CodeGuard AI, which identifies security vulnerabilities and reliability issues before they impact production. |
| Proof of Concept for a Kokkos-like API in Rust |
| ROBLOX Universal Aimbot, Wall Hack (ESP) & Crosshair GUI (ADVANCED AND MORE OPTIMIZED REMAKE) |
| Containerised URL Shortener, with security by design. Vulnerability detection on all artefacts via GitHub actions with reputable tooling. |
| Kubescape eBPF agent 🥷🏻 |
| MSRC API client for .NET |
| AxoSyslog - the scalable security data processor |
| Research and proof of concept to develop the next SecureDrop with end to end encryption. |
| It is dedicated repository for learning, experimentation, and proof-of-concept implementations. |
| Hack space for release testing |
| JavaScript SDK for Socket.dev API |
| A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease. |
| Get Android app updates straight from the source. |
| A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more |
| Extension to Tink Java that provides AWS-KMS integration |
| AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. |
| The comprehensive guide for online anonymity and OpSec. |
| Blog for my stuff |
| A curated list of annual cyber security reports |
| pytest + rich integration (proof of concept) |
| 📧 Streamline email verification with HMC-3.0, ensuring reliable communication, efficient database checks, and robust data security for professionals. |
| Rimac Hacking Challenge 2021 🚗 |
| Terraform module to configure GitHub Actions as an OpenID Connect (OIDC) identity provider in AWS. |
| The wolfSSL Command Line Utility wolfCLU |
| 🔐 Share Wi-Fi access securely and beautifully with QR codes. Enjoy a privacy-first design, print-ready layouts, and a responsive interface for all devices. |
| Authup is an authentication & authorization system. |
| A library that removes common unicode confusables/homoglyphs from strings. |
| Command line interface for the Phylum API |
| It focuses on collecting all Metal Slug everything about the NeoGeo MVS/AES system, all types of ROMs that have existed, All Lost Media Predecrypted, Decrypter, Encrypte, Earlier And Bootleg, Darksoft, Neo SD And Hack |
| A WordPress plugin to enforce certain security focused limits for users with wp-admin access. |
| 🔍 Detect reward hacking in RL training with RewardScope. Track reward components and visualize agent behavior to enhance learning efficiency. |
| The trustworthy ReDoS checker |
| Repositorio de documentación y referencias relativas al mundo de la ciberseguridad, creado y mantenido por la Comunidad de ProtAAPP |
| A Hacker News client for iOS |
| Hack the planet! |
| Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news. |
| 🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice. |
| The Hack For LA Data Science team is a Community of Practice within the LA brigade seeking to make analytical and machine learning services available to local communities and organizations. |
| Adds Security headers to Etherpad Express responses, including CSP(content security policy) and X-Frame-Origin |
| 让Java开发更简便的工具库 |
| 🚀 Connect Claude Desktop with Hacker News through the Model Context Protocol (MCP) for seamless interactions and enhanced information flow. |
| CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org website. |
| 🌐 Explore vital BGP and routing tools for OSINT, security, and network engineering in this curated resource library. |
| Hack Club's PostgreSQL-based shortlink router. |
| IP/CIDR/DOMAIN Tools |
| Servers for our website, HTTP/HTTPS connectivity checks, HTTPS network time, NTP (for Qualcomm XTRA), Broadcom PSDS cache, Samsung PSDS cache, Qualcomm PSDS (XTRA) cache, SUPL proxy, attestation key provisioning proxy, Vanadium component update check/down |
| Express.js security middleware for checking user password safety with Have I Been Pwned (HIBP) API |
| Store and manage Microsoft.AspNetCore.Authentication providers dynamicaly |
| Agnostic benchmark in OCaml (proof-of-concept) |
| 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH. |
| Runtime data collection for the StackRox Kubernetes Security Platform using eBPF |
| Scan for known secrets in your source code before you check in |
| 🔒 Custody SPL tokens and verify ZK proofs on Solana with this on-chain Incognito Swap program for secure, private transactions. |
| http://firewalla.com |
| Basic stuff, scripts, and so on used when hacking on mesa |
| An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis. |
| .files, including ~/.osx — sensible hacker defaults for OS X |
| Don't pass the referring URL to third parties. This handles the security/privacy issue where you don't want the third party service to know your pad URL |
| NSS - Network Security Services |
| UNIX-like reverse engineering framework and command-line toolset |