Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Security and complexity slow the next phase of enterprise AI agent adoption
AI is becoming part of everyday criminal workflows
Binding Operational Directive 26-02 sets deadlines for edge device replacement
Cybersecurity jobs available right now: February 24, 2026
Why SOCs are moving toward autonomous security operations in 2026
Android mental health apps with 14.7M installs filled with security flaws
Data Breaches in 2026: What’s old, what's new?
Spain arrests suspected hacktivists for DDoSing govt sites
Microsoft says bug in classic Outlook hides the mouse pointer
Ad tech firm Optimizely confirms data breach after vishing attack
Wormable XMRig campaign leverages BYOVD and timed kill switch for stealth
APT28 Targeted European Entities Using Webhook-Based Macro Malware
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
When identity isn’t the weak link, access still is
Fraud Investigation Reveals Sophisticated Python Malware
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
Romanian hacker pleads guilty to selling access to Oregon state networks
PayPal Confirms Six-Month Data Exposure Linked to Loan System Error
Fake troubleshooting tip on ClawHub leads to infostealer infection
Spanish police arrest suspected Anonymous members over DDoS attacks on government sites
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
Lenovo expands ThinkEdge portfolio with new AI-driven edge systems
WhatsApp is adding another lock to your account
Japanese chip-testing toolmaker Advantest suffers ransomware attack
CISA: Recently patched RoundCube flaws now exploited in attacks
Securing M365 Data and Identity Systems Against Modern Adversaries
Securing Networks with Trusted Time Synchronization
Developing Your Security Strategy in the SaaS Shared Reality
Clarity, Context and the Human Advantage in Modern CTI
How Mid-Market Businesses Can Leverage Microsoft Security for Proactiv
How To Enhance Security Operations with AI-Powered Defenses
Mastering AI Security With ISACA’s New AAISM Certification
Modernizing GRC: From Checkbox to Strategic Advantage
OT Security Ecosystem for Targeted Risk Reduction and Reporting
Jackpotting Surge Costs Banks Over $20m, Warns FBI
Audit & Compliance in the Era of AI and Emerging Technology
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quan
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Leading Semiconductor Supplier Advantest Hit by Ransomware Attack
AI-powered campaign compromises 600 FortiGate systems worldwide
How Exposed Endpoints Increase Risk Across LLM Infrastructure
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
Police seize 100,000 stolen Facebook credentials in cybercrime raid
University of Mississippi Medical Center Still Offline After Ransomwar
AI Won't Break Microsoft 365. Your Security Backlog Will
The Riskiest Alert Types and Why Enterprise Soc Doesn't Triage Them
Perplexity AI lands on Samsung’s next Galaxy lineup
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
Claude Code scans, verifies, and patches code vulnerabilities
Coroot: Open-source observability and APM tool
The hidden security cost of treating labs like data centers
Identity verification systems are struggling with synthetic fraud
FIN7 Gang Hides Malware in AI “Deepnude” Sites
Enterprises are racing to secure agentic AI deployments
Anthropic unveils Claude Code Security to detect and fix code bugs
Luxury hotel stays for just €0.01. Spanish police arrest hacker
Uncensored AI Tool Raises Cybersecurity Alarms
Researchers Demonstrate 27 Attacks Against Major Password Managers
Arkanix Stealer pops up as short-lived AI info-stealer experiment
newsletter Round 564 by Pierluigi Paganini – INTERNATIONAL EDITION
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 85
Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
New ClickFix Attack Targets Crypto Wallets and 25+ Browsers with Infostealer
Predator spyware hooks iOS SpringBoard to hide mic, camera activity
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
GitHub - tetsuo-ai/tetsuo-h3sec: HTTP/3 security scanner — QPACK desync and request smuggling
Analyze SEC Filings in Minutes | MoneySense.ai - AI Investment Research Tool
fw_error_www
Cocoa, Florida IT disruption as INCRansom posts claim
- YouTube
- YouTube
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, according to WatchGuard Biannual Threat Report | WatchGuard Technologies
- YouTube
Detecting and preventing distillation attacks \ Anthropic
Amazon's AI deleted production. Then Amazon blamed the humans. | Barrack.ai
How likely is a man-in-the-middle attack?
Every day in every way, passwords are getting worse • The Register
Claude Code Security Debut Wipes $15 Billion from Cyber-Stocks
Cloudflare One is the first SASE offering modern post-quantum encryption across the full platform
Latest Interesting Cybersecurity News – 23-02-2026
Apple CVE-2026-20700: The Bug That Loaded Every App — The Breach
Agentic Problems and the Rise of Zombie AIs | Ethiack — Autonomous Ethical Hacking for continuous security
- YouTube
Have you tried turning it off and on again? On bricking OT devices (part 2)
The Arts Council of Pakistan has a database of 20k+ attendees and full write access completely exposed. Right now. | obaid’s longer thoughts
VicK Consultoría en Tecnología | Ciberseguridad Geométrica
Conduent data breach could be largest in U.S. history
Just a moment...
Red Flags for OT Abound in Dragos Review of 2025
Attention Required! | Cloudflare
BoostKey Threat Report - Jean-Marie R.
- YouTube
Your Security Budget Is Getting Cut Because Executives Don't Understand What You're Protecting
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks - NDSS Symposium
- YouTube
Amazon's AI deleted production. Then Amazon blamed the humans. | Barrack.ai
Attention Required! | Cloudflare
- YouTube
- YouTube
GitLab Threat Intelligence Team reveals North Korean tradecraft
- YouTube
When Apple Notes Become a National Security Threat
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Protected section
PayPal app code error leaked personal info • The Register
- YouTube
- YouTube
Ex-Google engineers accused of swiping chip security secrets • The Register
Quantum Odyssey on Steam
The Null Drop: Anonymous File Sharing in C | MGx0
CTO at NCSC Summary: week ending February 22nd
Template and CPA Side Channel Attacks on the Kyber/ML-KEM Pair-Pointwise Multiplication
A collection for the game called HackHub to do some easier hacking automationo
Open source ideas for your personal AI assistant. You generate the code. No trust required.
GuardPro is a Python antivirus prototype with a modern CustomTkinter GUI. It offers full, quick, and folder scans with heuristic threat ratings (1‑10), quarantine, user accounts, scan history, and theme switching. Multithreading keeps the interface respon
securityrepo
A security remediation orchestrator for Coupang
Vibe coded proof of concept implementation of ransac in C++ for benchmark
Hardware_security
Deep-Fake-Detection-Proof-of-Concept
Deep-Fake-Detection-Proof-of-Concept
A technical breakdown of how modern home networks function, covering routers, NAT, DHCP, Wi-Fi standards, security fundamentals, and performance optimization.
Sentinel.FDS adalah proyek Proof of Concept (PoC) yang dirancang untuk mengeksplorasi penggunaan Graph Database dan Agentic AI dalam deteksi kecurangan finansial (Fraud Detection) secara real-time. Fokus utama dari lab ini adalah implementasi standar kepa
Developed proof-of-concept for an application that sorts chemicals in compliance with EPA, DOT, and customer constraints/preferences
awesome-cicd-security-devops-ai
Dont download any files in this repository, you WILL get hacked.
Containerized Ethical Hacking Toolkit - Docker pentesting environment
An AI-powered banking fraud detection system that analyzes transaction behavior using machine learning to identify suspicious financial activity. The platform performs anomaly classification, risk scoring, visualization, and real-time fraud prediction, de
A beginner-friendly Python project simulating a PayPal-style wallet with real security concepts: hashed passwords, encrypted data, fraud flags, and full transaction history.
module-security
A simple proof of concept of a chess engine written in C++. It creates a tree of nodes and evaluates the best lines using a minmax algorithm.
Proof of concept using langgraph to create a bot to use the OPQRST pain assessment model to ask a prospective patient questions about their pain and whether they should go to a doctor or an E.R.
Proof of Concept for UTS CITP Group Project
Obsidian plugin that syncs your vault to OpenClaw AI agents (Shadow Army). Multi-agent orchestration, health monitoring, slash commands. Built as proof-of-concept for Greg Isenberg's Obsidian+Claude vision.
Offline RAG agent demo: LangChain + Ollama + FAISS + tools (DuckDuckGo search, Wikipedia, file save) – proof of concept. works and more pdf's can be added, i have left in 2 pdf's so this can be tested and
Proof of concept validating ASB (automated swap backend) integration for BTC to XMR atomic swaps
MIS 372T FSWD React Hacker Day
Deep Fake Detection
OWASP-hardened nginx security baseline — blocks 16 attack categories derived from live honeypot data
Deep Fake Detection Proof Of concept
AI-assisted ethical hacking framework using Kali Linux, Docker, and MCP
An enterprise-grade AgTech proof-of-concept that bridges the gap between Computer Vision and Multi-Agent LLM Orchestration to provide real-time, expert-level agronomic diagnostics.
Hot security, enterprise IT, and AI news digest
Deterministic visual proof-of-concept for the PUTMAN Model: graph activation, rigidity pruning, beam reconstruction, recursive updates, and shift metric (Δ).
Security-Projekt
New repository for hack-a-couse-Dead-Pixel
THIS IS ONLY A PROOF OF CONCEPT, AND IF YOU WANT TO RUN IT YOURSELF, FORK THIS >:C YOU HAVE BEEN WARNED
Proof of concept budgeting/e-transfer app
Modern security headers scanner - ai powered
upstream_security
This project implements a **local Proof-of-Concept (POC) dynamic URL detonation sandbox**
macOS TCC Bypass — iCloud Photos Syndication Library + Chrome Profile (Apple Security Bounty)
A basic, conceptual blockchain simulation highlighting core concepts like cryptographic hashing and proof-of-work algorithms.
A Proof-of-Concept (PoC) exploit demonstrating Server-Side Template Injection (SSTI) in a Python Flask application. The exploit uses hex encoding to bypass strict regex filters and achieve Remote Code Execution (RCE) via an unsafe eval() call in dynamic f
A modular Python honeypot framework supporting SSH and HTTP service emulation for intrusion detection, credential capture, and security analysis.
security-alert-dashboard
CVE-2025-47539 is a security vulnerability that allows attackers to manipulate application behavior due to improper input validation and insufficient security controls. Under certain conditions, a remote attacker can send specially crafted requests to tri
This project simulates a Security Operations Center (SOC) environment over 60 days. The objective is to replicate real-world alert triage, phishing investigations, log analysis, and incident documentation workflows.
A Proof of Concept for an interactive art therapy and mindfulness web platform.
Proof of Concept for Smo.OS – Smooth Personal Life Operating System
Spring Boot microservice handling contact submissions for my personal website. Includes persistence, admin management and notification system.
Technical validation, performance metrics, and methodology for Sealicon Photonics’ AI-driven adjoint optimization framework. This repository provides proof of concept for 93% transmission efficiency in silicon waveguides. Full source code is under provisi
test-security
This repository contains a Python proof-of-concept exploit for a stack-based buffer overflow in HP Power Manager’s web interface. A crafted HTTP request can overwrite memory and allow remote code execution, potentially leading to SYSTEM-level access on vu
Security-focused home lab including network segmentation, firewall policies, logging pipeline and SIEM integration.
spring-security-project
Proof of concepts and other snippets
Hands‑on AWS networking lab building a secure VPC with public/private subnets, EC2 instances, NAT Gateway, and an S3 VPC Endpoint. Includes routing, security groups, SSH troubleshooting, and full connectivity validation.
a web site for samam special security services wll
Progressive Web Application Repository for AI ASEAN Proof of Concept for user intarface
Repo to host different projects about security and networks.
time-series-social-security
Proof-of-concept static wiki with pure JS
Simple top down shooter made with Unity. This project is for proof of concept.
A Proof of Concept (PoC) module to test unified publishing to HashiCorp and OpenTofu registries.
Some local claude code productivity hacks
Brute Force com Medusa e Kali Linux
Proof-of-concept: Instrument CI/CD pipelines with OpenTelemetry traces.
Data_Exchange is a cross-platform communication proof-of-concept that bridges wired and wireless protocols using three distinct microcontrollers. It features an ESP32-C6 acting as a transparent gateway, converting incoming UART data from a generic MCU sou
Developed a Proof of Concept (POC) to demonstrate the core functionalities and capabilities of Elasticsearch, including index creation, document management, and advanced search operations.
A proof-of-concept for a tos-compliant Claude Code proxy
A Python-based keylogger proof-of-concept for educational security research, featuring Fernet encryption, stealth persistence, and a remote kill-switch.
Reference blueprint Proof of Concept (PoC) for a Microservices Architecture (MSA). Demonstrates service decomposition, inter-service communication, centralized configuration, API gateway patterns, containerization, and scalable deployment. Designed as a r
shogi_engine_api proof of concept
A proof of concept app for cancer diagnostic with a better model
Hands-on security configurations focused on secure remote access and authentication controls.
An experimental Generative UI project — describe any visual style and watch Hacker News reshape itself in real time.
An Automation workflow developed with VSCode Github/CoPilot. A lot of the aspects in this project are Proof Of Concept and MVP Stages only. This will be scaled to a larger level for enterprise level.
Subdomain takeover Proof of concept by Justine dave
A simple HTML-based authentication system Proof of Concept (POC) includes Login, Registration, Forgot Password, Reset Password, and Dashboard pages. It is created using a basic HTML structure without CSS or JavaScript.
Real-time attack simulation and security assessment platform
Privilege escalation reasoning engine — parses LinPEAS/WinPEAS output and generates ranked exploitation playbooks
backend server security
A next.js app proof of concept for using plasmic as a front end consolidate tool.
A machine learning proof-of-concept for early heart disease detection using routine clinical measurements.
Educational resource focusing on common EVM logic flaws and smart contract security patterns.
proof of concept for finchex
Proof-of-Concept and Advisory for SimpleChatroom SQL
Fanamd is an open-source proof-of-concept for managing a virtual file system (VFS) using SurrealDB's advanced graph and relationship features. Built with Svelte 5 and TypeScript, it demonstrates how to implement hierarchical data structures, recursive ope
Your security is our priority
A slowly developing IDE for hackers & the cooler developers.
PHP proof of concept for querying Microsoft Fabric Eventhouse (Workspace Monitoring) via REST API using Entra ID service principal auth and returning failed ItemJobEventLogs as JSON.
📊 Monitor website content changes and auto-download new attachments with an integrated backend and frontend management system.
Step-by-step guide to safely install and secure OpenClaw on Mac and Windows. Includes hardening checklist and security best practices.
Designed and implemented a proof-of-concept FSN tool integrating labour market intelligence, and skill benchmarking identify current and future skills needs Applied Python pandas and web scraping to collect job market data performed skill extraction, gr
This is just a quick proof of concept repo. Ideal for IoT projects that need to resolve a hostname to an IP address.
Enterprise-Level Offensive & Defensive Security Portfolio
Python Kivy Library is an open-source initiative built for FOSS Hack 2026 to enhance and streamline mobile app development using the Kivy framework.
yber_Security_Projects is a collection of hands-on cybersecurity projects covering ethical hacking, network security, cryptography, and vulnerability assessment. It focuses on practical learning, real-world threat analysis, and building strong defensive s
Indie Hacker & Software Architect. Building TwitterWebViewer - The most reliable way to view Twitter without an account and browse Twitter anonymously. Focus: Next.js 14, SSR, and Privacy Tech.
I just got into hacking and I upload all of the networking tools I made with Python here
ReadystreetLLC doc-test: Word document drafting and LLM track-change editing proof of concept
security-
Repo of my game hacking journey
Security Advisory Federation from the staging instance of VulnerableCode
A comprehensive Python Proof of Concept for building AI-powered financial fraud detection systems. Covers synthetic data generation, EDA, SMOTE for imbalanced datasets, model comparison (Logistic Regression, Random Forest, XGBoost), and threshold tuning f
A Simple internal CS2 Hack - of course for educational purposes only
Hack Roblox
This Bash script automatically sets up a hacking environment on Parrot OS, using bspwm to create a professional, clean, and efficient workspace. It installs and configures essential security tools to optimize workflows for penetration testing, analysis, a
Proof of concept simulated attack on text-book RSA, exploiting multiplicative homomorphic property
A Proof of Concept (PoC) AI-powered review analyzer for the PLN Mobile Customer Support Ticketing System. Automates complaint categorization and sentiment tracking using NLP.
CÆSAR - ChAngE SpecificAtion for Replications (Proof of Concept)
PixelBot is an advanced proof-of-concept Aim Assist application for Android devices. (no root required)
Portfolio of a Backend Developer with a security-first mindset, building scalable APIs, secure systems, and growth-driven digital solutions.
Proof of concept for a WYSIWYG yearbook editor with Fabric.js canvas rendering, Zustand state management, and Yjs real-time collaboration
This study presents a proof-of-concept wearable system that integrates a conductive textile glove with reservoir computing algorithms for finger-gesture recognition.
CS-305-SNHU-Software-Security
A Proof-of-Concept (PoC) for the Ensembl metadata expansion project
Proof of concept, just make a "Hello World" website
"A collection of 4 AWS projects: EC2 Auto Scaling, AI Image Recognition, S3 Security Auditor, and Serverless Thumbnail Generator."
A minimal security gate for AI projects: explicit trust boundaries, auto-fail checks, and immutable trace logs.
My personal OpenClaw / VS Code MCP Skills — security reviewed and hardened
A creepy, personalized hacking dashboard that knows way too much about you. Cyberpunk visualizations with real browser APIs.
A schema-aware translation engine that converts plain English questions into structured JSON filter objects for healthcare databases. Built as a proof of concept for intelligent cohort discovery in medical research platforms.
SQLite Single Write Queue Pattern using IPC Worker - Proof of Concept
Professional System Optimization & Security Software
Headless FastAPI middleware for agent-native systems: IoT bridge, telemetry, billing, comms, red-team security, and protocol generation.
Proof of concept for auto debug operator creation.
Proof of concept for a mobile-first restaurant order management application
Intuition Protocol - AIONICA Security Lab.
30-PC Windows cyber cafe build, showcasing security framework, monitoring setup, policies, and full documentation.
One-command Linux server hardening. Configures SSH, firewall, fail2ban, kernel security, auditd, and automatic updates. Works across Ubuntu/Debian, RHEL/CentOS, Fedora, Arch, and SUSE. Designed for production servers.
Proof-of-concept mutator that exfiltrates internal AFL queue metadata
To provide proactive threat intelligence, cybersecurity training, and strategic security advisory services to organizations
Deep Fake Detection
A long-term engineering intelligence log. Every morning, I review global technology and AI-related news (Hacker News, research blogs etc.), extract high-signal topics, and document concise technical reflections. The objective is not passive consumption
A proof-of-concept demonstrating covert interaction channels to achieve AI-assistance in invigilated environments.
SOC Analyst Skill Expansion – Roadmap A structured roadmap documenting my skill growth as a SOC Analyst (L1–L2). Each phase focuses on a new technical area — SIEM, EDR, Windows logs, vulnerability management, cloud security, threat intelligence, and scr
The Vymerce Nexus Admin dashboard provides full control over virtual number services, OTP activations, and wallet management, with real-time monitoring, security alerts, and analytics — all under the secure Vymerce ecosystem.
eth-security-research
security-pipeline-demo
This Labs offers hands-on training in essential skills. Participants will explore techniques in penetration testing, social engineering, and vulnerability assessment. This repo includes lab exercises, resources, and documentation to guide learners in prac
Sarima's recommended listening ambience for those participating in the CTF or just wanting uplifting hacker vibes
My GitHub Profile
Daily curated RSS digest from top Hacker News blogs
Cybersecurity project work focused on security monitoring threat detection and incident response with supporting SOC related training and certifications
Open Intelligence Lab is an ethical OSINT research platform focused on public security intelligence representation, graph-based threat knowledge modeling, and explainable security analytics.
sl1man-security-bot
Android adversary simulation lab focused on reverse TCP communication, Android permission architecture, and controlled sandboxed command execution to support ethical security research and mobile defense analysis.
git-security-fix
Proof-of-concept implementation for a Semantic-Behavioural Autonomic Water Network
This project is a Proof of Concept (POC) for a basic web authentication flow using only plain HTML.
Research-focused userland proof-of-concept demonstrating API hooking of NtQuerySystemInformation to analyze and manipulate SYSTEM_PROCESS_INFORMATION structures. The project explores DKOM-style process hiding techniques to better understand Windows intern
Offensive Security Portfolio
security-updates-project
⬆⚖️⬇Dancing Agents (Proof of Concept)
Structured digital forensics investigations and security event analysis conducted in controlled lab environments.
Analysis of Security Inspection Performance and Risk Trends Across Healthcare Facilities using Python
AI supply chain security scanner — CVE scanning, blast radius analysis, policy enforcement, and SBOM generation for MCP servers and AI agents
Proof of concept for cmd2 ideas.
A Proof-of-Concept Prototype for detecting and classifying defects on high quality images of semiconductor wafers
security-session-demo
..
Proof of Concept for an arbitrary command injection vulnerability in yt-dlp’s --netrc-cmd option (GHSA-g3gw-q23r-pgqm / CVE-2026-26331). Demonstrates shell command execution via maliciously crafted URLs in affected versions (≥ 2023.06.21, < 2026.02.21).
Proof of concept: bats reimplemented in bats
Proof of Concept
an social media page where you can learn basic electronics and DIY hacks
Project for Stellar Hacks: ZK Gaming
🧟 Dancing Agents (Proof of Concept)
Modular Terraform for production AWS infrastructure - VPC, EC2, RDS, S3 with security best practices
Learning project & experiments in Cloud Security and DevSecOps
Halo proof-of-concept on Arbitrum as base layer on ethereum
Assignment-2-Security-Testing
A Deno proof-of-concept demonstrating two nested LLM loops for grounded, evidence-backed document analysis
This Labs offers hands-on training in essential skills. Participants will explore techniques in penetration testing, social engineering, and vulnerability assessment. This repo includes lab exercises, resources, and documentation to guide learners in prac
Serving as the foundation for my research proposal "Towards Society 5.0", this project acts as a micro-level proof of concept for a trustable edge architecture designed for mission-critical critical infrastructures.
project-security-demo
我可憐的學生參加黑客松的專案
hacking_tools
Modular Hacker Arcade Platform with expandable game engine and future WiFi multiplayer support.
security-learn
Advanced IP Intelligence & ISP Reconnaissance Tool for Authorized Penetration Testing. Multi-API ASN lookup, VPN/Proxy detection, Geo-tracking with hacker-style interface. Production-ready pentest recon!
Proof of concept for JANET
A curated collection of hands-on cybersecurity projects, including penetration testing labs, AI security assessments, vulnerability research, and proof-of-concept demonstrations.
AI-powered daily digest from 90 top Hacker News tech blogs
User Laloko MOD Yo Easy Hacks
Proof of concept
security-updates
It is a basic project for learning Java Spring. It depends on "Spring Boot 4: Learn Spring 7, Spring Core, Spring REST, Spring Security, JPA, Hibernate, Swagger, Spring MVC, MySQL" Udemy course. That made by Chad Darby.
Evolving Software, The Emergence Architecture : Proof-of-Concept
A proof-of-concept demonstrating how LLMs can learn like humans: moving from brute-force memorization to intuition and tool delegation. Built with Qwen2.5-1.5B, LoRA, and structured pruning.
A piece of example code for pulling from the Tenable security center API.
🤖 Automate marketing with AI agents that craft Twitter content, emails, landing pages, and launch plans for indie hackers and startups.
This repo contains file and folders related to AI models and agents security testing and evaluation
A 3-page responsive portfolio website for A 2026 Cyber-Security Hackathon
Proof of concept: bats reimplemented in bats
Modulo personalizzato Odoo per Cultura e Sicurezza Digitale APS / Digital Security Festival
Odin on Pebble proof of concept
Security log parser — CEF, LEEF, syslog RFC 5424/3164, and Windows Event XML to OCSF format
About SkillSwap is a MERN stack web platform designed to facilitate collaborative learning and skill development through peer-to-peer guidance. The platform emphasizes reciprocal knowledge exchange, industrial-grade security features, and user-friendly in
security-updates-demo
PROOF_OF_CONCEPT
A minimal proof-of-concept deployment of Keycloak and Grafana on Kubernetes, with Keycloak acting as the OIDC identity provider for Grafana. Includes Terraform for automated deployment.
🛠️ Build and manage IT service requests with FreeITSM, a web-based platform offering tickets, assets, change, and security features.
Experimenter: proof-of-concept AI-Powered Problem Solving Agent
Security experiments
🪑 Dancing Agents (Proof of Concept)
VEYM | CONCEPT STORE — A comprehensive ecosystem (Desktop GUI, Server Scripts, Telegram Bot) for secure network access based on Xray-core (VLESS+Reality) protocols. Concept & Proof of Concept.
proof of concept os made in c++
LLM-Security
Centralized AWS log analysis architecture using CloudTrail, S3, CloudWatch, and Athena for security monitoring.
automated-security-updates
🌊 Dancing Agents (Proof of Concept)
Proof-of-concept applications generated by Software Factory. Pipeline validation builds, not production software.
LES to MECT Integration Proof of Concept
🌀 Dancing Agents (Proof of Concept)
Browser-based Pokémon ROM hack platform with cloud saves and multiplayer
2 LEVEL HACK WITH NUMBER SURESHOT BY JOD.
Demo website as proof of concept, to generate PDF to submit Warranty Request
🎮 Secure Multiplayer Game: real-time Socket.IO gameplay 🔌 with security headers 🛡️. Express + tests ✅, FCC InfoSec-ready ⚡.
SecurityBot
Self-contained GitHub security scanner - automatically scans code and creates PRs/issues for vulnerabilities
Real-time inventory viewer for Resident Evil 1 Classic Rebirth overlay I was requested on my YouTube channel.
AI-Powered-Web-File-Security-Shield
OpenClaw Security Red Team Framework
Security Information and Event Management (SIEM) lab using Wazuh to collect, monitor, and analyze security events across multiple systems.
Next-Gen Cyber Security & Python Automation Agency. Securing digital assets, performing vulnerability audits, and extracting OSINT data.
voice-security
CLI tool for analyzing, auditing and removing file metadata (EXIF, PDF, Office, images) with safe defaults and forensic reporting.
PreToolUse hook for Claude Code that prevents credential leaking
My hands-on cybersecurity lab documentation and exploit practice
100+ moduls discord osint hacking ......
🦢 Dancing Agents (Proof of Concept)
Basic Ryzentosh Configuration, do not use it blindly
security-automation
GTK4 changelog viewer for installed packages with security alerts
反射神経&動体視力タップアクション「傍受王者ハッキング」
lista-de-tarefas-com-spring-security-e-angular
A Website To cover LGBTQ Travel Health Security and Well-Being Globally
Protocol for connecting AI harnesses to security tools
A security bot tool that helps manage your profiles privacy.
CISOdailywatchguard is an automated daily cybersecurity intelligence dashboard for CISOs and security teams. It aggregates CVE feeds and threat alerts into a clean, filterable static interface with product enrichment, CVSS scoring, exploitation indicators
WiNG-Hacks project
Hack@URI
Hacking Hills 2026 Hackathon project.
💠 JadeGate - Deterministic Security for AI Agent Skills
AWS Terraform modules following HashiCorp best practices. A versioned, production-ready library featuring hardened security patterns, automated documentation, and modular architecture designed for scalable, multi-account platform governance.
NSBE Hacks 2026
hopper hacks 2026
Debate Bot for Gunn Hacks 12.0
A front-door repo that unifies TRQP adoption without a monorepo: onboarding, terminology, compatibility matrix, issue routing, and combined assurance workflows linking trqp-conformance-suite (protocol conformance) and TRQP-TSPP (security/privacy AL1/AL2 p
BlackRock HacerRank Project
LuAI — Brazilian Social Security Legal Assistant powered by Claude AI agents
Hack(Her)413 2026 Submission
A proof-of-concept showing payment routing inconsistency after mobile number portability.
Open source security for LLM inference
Security-focused self-hosted setup for OpenClaw on any Linux VPS
Hacking-
Base inherits Ethereum’s security by settling its transaction data on the Ethereum mainnet. Even though it processes transactions off-chain for speed and lower fees, the final data is verified and stored on Ethereum, benefiting from its strong decentraliz
user-access-control-lab and linux-security-audit-simulation
🤖 Enhance your coding with CBbot, an AI-powered assistant for seamless task automation and integration, ready to use out of the box.
Azure-Storage-Security-Using-Service-Endpoints
A proof of concept project to integrate LLMs with Scottish Housing Data. The idea is to have the ability to prompt LLM and have specific guardrails in place so information is true to the data at hand.
Nimbus is a cloud-native, Kubernetes-powered e-commerce platform featuring dynamic UPI QR payments, Terraform-based infrastructure, automated CI/CD, and production-grade scalability and security.
A proof of concept for a pet services booking app in Bangkok.
Design system proof of concept
Intelligent Invoice Extraction pipeline built as a Proof of Concept to replace Kofax in my organization. Designed a scalable local OCR-based processing system to extract structured invoice data, reduce licensing costs, and improve automation efficiency. T
DeFi Proof of Concept for Kaskad Protocol - Lending platform on Igra Galleon with automated QA testing
Single Bash-based DevOps automation tool that continuously monitors Kubernetes and AWS, performs cost optimization checks, detects security misconfigurations, auto-heals failed workloads, and sends centralized alerts
Securitysessiondemo.food
AI Compliance Directory — The trusted layer for AI governance, compliance, and security tools. Built with Next.js, Supabase, and Tailwind CSS.
A database focused on the management of enterpraises security equipment using postgreSQL
Universal AI SDK - LiteLLM Alternative with India features, Security & Smart Routing 🇮🇳
Exploring ethical hacking and cybersecurity through hands-on projects and continuous learning.
Parse and normalize security data imports — vulnerability scans, assets, CMDB, IPAM, and more
security
Pearl Hacks Project
Analyzing Big Belly smart waste data at Boston University to optimize trash collection routes. Built for the Civic Hacks Hackathon, this project uses data analysis to help BU reduce unnecessary pickups, cut costs, and build a smarter, greener campus.
Proof of Concept demonstrating advanced SQL Server indexing strategies, performance tuning, and CQRS in .NET Core.
The deterministic execution substrate for autonomous capital · 7 math engines · 38 threat vectors · 0 bypasses · plimsoll.network
Comprehensive Proof of Concept (PoC) solutions and exploit contracts for some levels of the OpenZeppelin Ethernaut Web3 security wargame.
Home Security System using PIR, IR & GSM
Proof of concept for automated script generation.
OpenClaw endpoint security monitoring plugin — real-time process, SSH, and privilege escalation alerting
Proof of Concept for deterministic and testable face embedding clustering using DBSCAN.
The Multiverse Project, a Discord alternative built on the Solana blockchain, a robust token economy and more. Whitepaper and roadmap to come.
Security and authentication service
Team Valid8's project for the 2026 Bison Hack
NSBE Hacks
Migrate Proof of Concept between SQL instances
This is a minimal Spring Boot proof of concept demonstrating: Product CRUD (basic) Spring Data JPA Profile-based configuration Local MySQL support AWS Aurora MySQL support Dockerized application This project is intentionally simple and suitable for
FarPay is a proof-of-concept mobile payment application designed to demonstrate a secure, end-to-end transaction lifecycle. The system facilitates merchant payments via Pesapal, Visa/Mastercard (Tokenized), and Mock Bank transfers. The core focus of this
A python script based on the CadQuery library; as of now it does not have a UI and is only at a proof-of-concept level.
Open-source cybersecurity training platform with 40 hands-on CTF challenges across 6 categories. Dockerized labs for Linux, Web Security, Cryptography, Network Analysis, Code Review, and Penetration Testing.
me-security-monitor
HACKED 2026 SCENIC ROUTE
Proof of concept for building micro-frontends. Host: Container
Gerçek zamanlı sistem izleme aracı. CPU, RAM, Disk, Network ve Process takibi yapar. Hacker theme'li ve Matrix efekti ile süslü.
SkillSync MCP — security-gated skill management for Claude Code, OpenClaw, Cursor & Windsurf. 60+ threat pattern scanner.
Multi-Cloud Data Platform: Federated IaC with Terraform Enterprise-grade Infrastructure-as-Code (IaC) for a hybrid data lakehouse. Orchestrating AWS S3 storage and GCP BigQuery via Omni federation, featuring decentralized remote state management and OIDC-
Proof of concept for building micro-frontends. MFE: Cart
Mastering Data engineering, applied machine learning, generative AI integrations, and adversarial AI threat modelling.
Blackrock's hackathon challenge - Self-saving for your retirement
hack-26
Cyber Threat Intelligence (CTI) repository focused on AI Agent supply chain security, Vulnerability tracking, and automated OSINT hunting for 2026
CLI tool to fetch, display, and manage GitHub security alerts (CodeQL, Dependabot, secret scanning)
hackathon
Proof-of-concept ELT pipeline using Apache Airflow and Snowflake featuring raw ingestion, SQL-based transformations, and automated data quality validations following a modern warehouse layering approach.
Task 3: Developer for Object Detection System for Self-Driving Cars — Proof of Concept implementation for a real-time object detection system for autonomous vehicles using AWS IoT Core, SageMaker, Lambda, and YOLOv5. Developed as part of DLBPAWSCLAD – Pro
Submission for the Hack(H)er413 2026 hackathon. FoundU is a campus lost-and-found platform that matches reported items using structured metadata and AI-assisted similarity search. Users submit photos and descriptions, and the system ranks potential matche
A simple blockchain implementation built in Go (Golang) with a React frontend, demonstrating core blockchain concepts including Proof of Work and Merkle Trees.
🔒 Update security.txt Expires to keep your security contact info current and compliant with best practices.
Proof of concept for the Numble project
Prototype proof of concept for koop radio.org
🦞 Perform automated red team assessments on LLM APIs with streaming results, analysis, and detailed exportable reports for security testing.
para clase no se
BU Civic Hacks 2026
A minimal, hackable pre-training stack for GPT-style language models
Tic tac toe proof of concept
Security and authentication service
Hacker news client for iOS
A Python utility for generating proxy DLL source code for DLL side-loading research and vulnerability proof-of-concept development
PoC (Proof of Concept) with Kimi-K2.5 (Reasoning) / Azure (Microsoft)
Modulo 2 Clase hacking
A cross-platform Rust CLI autonomous growth agent for X (Twitter) designed to help founders, indie hackers, and businesses grow their accounts organically.
Advanced Java Swing GUI application that evaluates password strength using entropy calculation and real-time security recommendations.
Demonstrates a lightweight container supply-chain pipeline with Apko, Syft, Grant, and Grype orchestrated via Dagger.
A cross-platform Rust CLI autonomous growth agent for X (Twitter) designed to help founders, indie hackers, and businesses grow their accounts organically.
Engineering project for Hack-URI where we will build a prototype for a reliable system that will be controlled in real time by a mobile app. The system will consist of 2 cartridges of storage for different types of pills. The app will act as a controller
Hacking game inspired by dds (✿◕‿◕)
Proof of concept LiDar pipeline: simulate scans, generate labeled datasets and train a neural net to filter/classify returns from 5*25 consecutive points each. (cones vs background).
Repo for developing skills with GitHub Advanced Security
Product-Security-Supply-Chain-Assurance
HackED 2026 project
Designed and implemented a fully automated, production-ready Kubernetes deployment pipeline for a Django application using AWS EKS, Helm, and GitHub Actions, following DevOps best practices for scalability, security, and reliability
A collection of technical write-ups, infrastructure-as-code scripts, and security research documenting the defense of a Proxmox-based enterprise lab environment.
A universal, open-source security and privacy control layer for AI agents and copilots. Enforce fine-grained policies, control data access, and audit every interaction—without modifying agent logic or degrading performance
Security-first, AI-native communications platform
NightStack is a multi theme dark pack built around a green-first hacker aesthetic, featuring pure hacker, neon, and eye-friendly variants alongside stack-specific themes for modern development.
Rohin, Ishaan, and Brecken take on Hack@Davidson
Production readiness scanner for Next.js — flags missing auth boundaries, cross-tenant data leaks, missing rate limits, and unvalidated input.
AI-powered medical triage assistant proof of concept using Gemini API and Streamlit.
Shared library for saas-workspace ecosystem focusing on Observability, Security, and Cloud-Native standards.
Privacy-focused local HAR file sanitizer with multiple security profiles (ultra, strict, debug).
Service designed to guarantee safe retries in distributed systems, handling high concurrency and security.
Quantum Entanglement Network (Q-Net) Proof of Concept.
camera phishing tool designed for security awareness and educational purposes. It automates the deployment of a local PHP server and utilizes secure tunneling via Cloudflared to capture target data remotely.
Lightweight hacker-themed GTK and CLI toolbox built in C and Python.
Security scanner for OpenClaw skills
PolyGLU: a drop-in replacement for SwiGLU in transformer FFN blocks. Inspired by neurotransmitter-receptor diversity, each neuron routes between 4 qualitatively distinct activation functions via hybrid static-dynamic gating with Gumbel-Softmax. Adds only
Here you can see how I implemented a Raspberry Pi with Kali Linux using a Samsung tablet as monitor (Hacking without a "PC")
can analyse many rtsp sources for vector flow and sends the metrics to a grafana dashboard
Hangman, hacker edition
A comprehensive MERN stack application for analyzing student performance and course difficulty. Features predictive AI workload forecasting, gamified leaderboards with XP/badges, real-time social learning hubs, and enterprise-grade security.
Our Hack@Davidson '26 Project
Curso completo sobre Authorization no Spring Security - baseado na palestra de Daniel Garnier-Moiroux na Devoxx 2024
One-command server hardening & OpenClaw deployment for fresh Debian/Ubuntu VPS servers.
PS2 Emotion Engine WASM proof-of-concept — Gouraud-shaded spinning cube via Rust/wgpu + Next.js
Proof of Concept using MIDL chain and Nostr for health data sharing
zabbix-security-lab
proof-of-concept
Ready to rule Apex Legends? Meet Apex Legends Hack 2026 — your ticket to total domination! With game‑changing tools like Aimbot, Wallhack, and No Recoil, you’ll gain an unmatched competitive edge. Whether you’re a pro or a beginner, get ready for unparall
提供网络安全的十大漏洞从入门到进阶的教程讲解,满满的干货
Share Information about Microsoft Security Products
ProxPatch is a lightweight, automation-first patch orchestration tool for Proxmox VE clusters. It performs rolling security updates across nodes, safely migrates running VMs, reboots when required, and keeps cluster downtime to a minimum.
Proof of Concept (POC) pipeline to ingest data from AWS S3, store it in a relational database, and transform it into analytical formats using PySpark.
Exploration of alternative model structures using 2020 WCPFC bigeye tuna stock assessment as a proof-of-concept.
SmartResponse LSS location selector with Google Maps integration - Proof of concept
hack.ink's specific skills.
VibeTrace — AI Security Scanner for Vibe-Coded Apps
An AI-driven proof-of-concept for a single-page portfolio. This experiment explores the feasibility of creating a modern personal resume using prompt engineering.
Terraform-built AWS infra, focused on reliability, security
A proof-of-concept simulation study for the essay: "Trading Bias - When Confounder Adjustment Outweighs Selection Bias".
A collection of news headlines about OpenClaw Security for AI builders, developers, and investors. Updated twice daily.
MCP server with specialized judges to evaluate AI-generated code for security, cost, scalability, cloud readiness, and best practices.
Repo for just hacking out new ideas, move fast and break stuff 🔨
bloxfruit hacks using application
A local organization wants to create an application that allows them to manage their employees. You are tasked with creating a proof-of-concept API using placeholder data.
Proof of concept creating a simple .net core application to access snmp variables from TwinCAT 3
Opinionated SBOM Tooling
A word in which there is no good or bad but we get onto the god mod of hacking
Professional Docker Swarm Dashboard - Manage services, monitor resources, ensure security compliance. Real-time monitoring, CIS compliance testing, Trivy vulnerability scanning, multi-user RBAC.
Detailed solutions and step-by-step reports for OverTheWire challenges. Focused on Linux commands, security, and troubleshooting using the CLI.Solucionario detallado y write-ups paso a paso de los retos de OverTheWire. Enfocado en comandos Linux, segurida
Analise de séries temporais para Cyber Security login process.
🐡 Forensic tool for OpenBSD to audit security mitigations like Pledge, Unveil and W^X.
TrustChecker — Enterprise Security Trust Verification Platform
File-driven AI trading agent engine for crypto and securities markets
🛠️ Transform text easily with ChRot13, a cross-platform tool for encoding and decoding using the simple ROT13 cipher. Enjoy a seamless user experience.
AgentsAntivirus is a collection of 77 standalone PowerShell security scripts converted from the GEDR C# codebase. Each agent is a self-contained detection module that can run independently or be orchestrated together via GShield.
Clanker is a personal AI Agent designed with security in mind.
Security-focused Go CLI tool for safely creating paired MariaDB databases and users with fail-closed design and automatic rollback.
SpringBoot-Security-Role-Based
🔐 Securely store, generate, and manage your passwords in an encrypted vault, ensuring your digital credentials remain safe from cyber threats.
Foot & Ball is a game expiring on Elifoot for the Stellar Hacks: ZK Gaming event.
[Attack Engine] Isolated Python worker carrying out offensive security tasks (SQLi, XSS payload delivery). Wraps Scapy/Requests execution.
First security layer for AI agents.Local firewall with PII detection, policy enforcement, and prompt optimization
MLS-Chat is an open-source, end-to-end encrypted chat app built with Messaging Layer Security (MLS). Features WebAuthn/passkey authentication, multi-device sync, and cloud-agnostic architecture (starting with Supabase). All MLS cryptography and state are
Documenting my journey in Cybersecurity: Theory, Tools - L1 through notes, labs, and applied security practice.
Network-Security
Describe your application in natural language and Scaffold AI designs the AWS serverless architecture, runs a security review against AWS Well-Architected principles, and generates deployment-ready infrastructure-as-code -- all through a visual canvas and
This repo used to note the materials and labs on cyber security
A complete authentication backend demonstrating modern security practices. Features user registration, login, logout, and JWT token management with automatic token refresh. Includes detailed comments and documentation for learning purposes.
🎬 Manage movie data effortlessly with this Golang backend REST API, featuring full CRUD operations and Postman-tested reliability.
Full GUI desktop application to answer Educake quizes, teaching you how interact with websites using python curl_cffi
🛡️ Turnkey Open-Source SOC — NIST CSF-based security platform with pre-configured detection rules, n8n automations & incident response workflows. Built from real-world experience.
Final Project of CyberPhysical Systems & IoT Security Course at UniPd
The builder's index for AI security — curated tools, frameworks, and standards mapped to OWASP LLM Top 10
Multi-Agent AI Security Pipeline for Banking - Microsoft AI Dev Days Hackathon 2026
An open source imageboard software that actually works. [WIP]
📝 Elevate your LLM agent with expert YARA rule authoring, review, and optimization for high-quality, performant security rules.
🚀 Manage your VPS server easily with this Telegram Bot—monitor systems, control Docker, and enhance security all in one place.
security-workforce-manager
Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine
Custom skills for Claude Code — SEO, security auditing, and web tools
only website code, images, security
🗺️ Zork-like text adventure powered by Qwen 0.4B. Doubles as LLM pen-testing playground with security challenges.
OrbitDocs is a modern, secure, and scalable IT documentation platform designed for Managed Service Providers (MSPs), enterprise IT teams, and infrastructure engineers who demand structure, security, and clarity.
Web-based tool for security operation incident reporting
資訊安全平台
Application Security Maturity & Vulnerability Triage Lab (Azure, Nessus, Power BI, Azure DevOps)
blockchain security redefined 🔐
A safe way to use AI that can do anything
Core Infrastructure & Narrative Engine This repository serves as the backbone of our ecosystem, housing the modular logic and data schemas required to power a seamless digital experience. Built with scalability and security at its core, it integrates robu
Spring_Security
A locally-operated home network security platform with asset discovery, STRIDE threat modeling, ISO 27005 risk assessment, MITRE ATT&CK mapping, and vulnerability scanning.
An experimental WebGPU compute shader proof-of-concept for running BitNet b1.58 (1-bit ternary) matrix math natively in JavaScript.
Security Recon in 60 seconds - Autonomous Recon Agent Platform
Strix REST API - API service for Security Recon
Strix Web UI - GUI for Security Recon in 60 seconds
Pasport like identity for AI agents anchored to the TPM chip and the Intent-Bound Ephemeral Visa for AI agents
ARKLinux Operating System Design v1.0 Title: ARKLinux — Arch Linux–Based Operating Substrate for A.R.K. Type: OS / Platform Design Specification Audience: Systems engineers, platform engineers, security engineers, OS design for ARKLinux
Pure Kotlin port of VS Code's TextMate grammar engine. No regex hacks - real TextMate scoping with standard .tmLanguage grammars and Compose AnnotatedString rendering. Android/JVM.
Security-first package manager for AI agent skills
Repositorio para la elaboración del proyecto PAI1 del security team 7
Terraform module for production-ready AWS EC2 instances. Features IMDSv2 enforcement, EBS encryption with KMS, IAM role with SSM access, configurable security groups, CloudWatch alarms, Elastic IP, and auto Amazon Linux 2023 AMI selection.
A decentralized real-time payroll protocol built on Soroban. Stream assets second-by-second with linear distribution logic and non-custodial security on the Stellar Network.
Security related courses and knowledge transfer
This repository contains detailed open-source intelligence (OSINT) investigations on phishing campaigns, scam websites, and other cyber threat actors. All reports are based on publicly observable data and aim to provide insights for security researchers,
A modular alternative to Clawdbot / OpenClaw that runs in containers for security. Connects to WhatsApp, has memory, scheduled jobs, and runs directly on Anthropic's Agents SDK
A Git-aware CLI tool written in Rust that scans codebases for TODO / FIXME / HACK / XXX / BUG / NOTE comments, provides listing with author/priority extraction, computes diffs between git refs, and enforces CI quality gates on technical debt.
Local LLM-Powered Security Analysis for OpenClaw and More
A Top Down Hack-N-Slash Rogue-like game with Card Game Strategy.
Informathin security
PipeLab — security tools for AI agents
AI News Intelligence Dashboard - tracks Anthropic, OpenAI, Google Gemini, and AI CLI tool news from Hacker News, GitHub Releases, and RSS feeds. Built with .NET 8 + Angular 21.
AUTO HACK
proactive-security
Firewall for AI agents. DLP scanning, SSRF protection, bidirectional MCP scanning, tool poisoning detection, and workspace integrity monitoring.
Language-agnostic security scanner with first-class AI application security. Produces SARIF, SBOM, and AI inventory artifacts.
A high-performance AI agent built with Go
SecuritySoftware
generative-ai-security-forensics
Testing website with simulated vulnerabilities for security scanner testing.
Professional OSINT investigation platform for security researchers and analysts
Url Shortener using Spring Boot with Spring Security
Malware Development for Ethical Hackers - 2nd Edition, published by Packt
Sir Thaddeus is a local LM assistant, with a primary focus on user control and security
Unified security suite for agent workspaces — installs, configures, and orchestrates all 11 OpenClaw security tools in one command
Independent infrastructure analysis and passive security auditing for online gaming platforms.
Hands-on Linux and Windows system administration and cybersecurity lab focused on process analysis, log investigation, incident detection, and infrastructure fundamentals
Secret scanner for OpenClaw agent workspaces. Detects leaked API keys, tokens, credentials, and .env exposure. Free alert layer.
Supply chain security for OpenClaw agent skills. Pre-install inspection, obfuscation detection, known-bad signatures. Free alert layer.
Security-Projects
🌐 Isolate a Node.js service's network access using Docker and nginx as an egress proxy for enhanced security and control in your applications.
🔗 Bridge legacy payment systems and modern networks with OpenTX's canonical transaction protocol for seamless integration and security.
A responsive, dark-mode event landing page built with semantic HTML and advanced CSS. Features CSS-only filtering & sorting (Checkbox Hack), a modern Bento grid layout, and a vanilla JS countdown. Zero external frameworks or dependencies.
Notas de la clase de Hacking
Documentacion de los retos CTF
End-to-End Ethical Hacking Lab: Simulated Penetration Test
Secrets management for AI agents via MCP • @janeesecure
Secure authentication and authorization service built with Spring Boot, Spring Security, JWT, and MySQL. Supports login, token generation, and protected API endpoints.
🛡️ Security scanner for AI agent skills, configs, and MCP tools. Vet before you trust.
A lightweight alternative to Clawdbot / OpenClaw that runs in containers for security. Connects to WhatsApp, has memory, scheduled jobs, and runs directly on Anthropic's Agents SDK
Secure, kernel-enforced sandbox CLI and SDKs for AI agents. Capability-based isolation with secure key management, atomic rollback, cryptographic immutable audit chain of provenance. Run your agents in a zero-trust environment.
Honeypot for security research purpose on moltbot, openclaw clawdbot
A repository with the content about my course of portfolio investment. This course is focus on security seleccion, assets allocation, and another several topic in the same way
🛡️ Protect web applications with LuaShield WAF, a high-performance firewall built on OpenResty/Nginx, using pure Lua for robust security.
🧬 Demonstrate randomized execution paths to test detection engines, showcasing unique call stacks while maintaining identical payload behavior.
📈 Track and analyze cryptocurrency prices using mock data for better decision-making and insights.
A bounty hunting platform where companies can create bounty requests for their software to be tested by ethical hackers in exchange for payment.
darkflobi brand assets, website, and documentation. autonomous AI agent on Solana. $DARKFLOBI
Homebrew Tap for Vouch
Information-Security-Auca
🗺️ Map AWS resource access quickly with a single command. Get instant answers on permissions without a UI. Open source and completely private.
The Kernel of ContextUnity — shared types, gRPC contracts, and security tokens
Attendee Companion App proof of concept for ARRL Conferences
Production-grade B2B SaaS built with Next.js 15, Supabase, and Stripe. Features Multi-tenancy, zero-latency Optimistic UI, and Lexorank-based drag-and-drop. Includes Real-time collaboration, RBAC security, and mobile touch support. Architected as a high-p
My Small PFN — a competitive proof-of concept for Prior-Data Fitted Networks
CTF, Passe ton Hack D'abord. Session Sécurisée Hostile.
Repo for my personal Security Copilot artifacts
**GardaIdentitas** adalah sebuah inisiatif *open-source* untuk melindungi privasi data masyarakat Indonesia melalui pendekatan *client-side security* dan edukasi digital.
A proof of concept attempt to use dotnet for ChunkHound for better threading work to handle large code bases
A proof of concept Chrome extension for group video calls built with Rust, WebAssembly, and WebRTC.
Java, an object-oriented language, excels in portability via the JVM, allowing code to run on any device. Launched in 1995 by Sun (now Oracle), it's essential for Android apps, web servers, and big data tools. Its garbage collection, security, and rich AP
Hardware
OPSEC & Privacy Services
This repository contains my personal CTF writeups and solution notes from various platforms (picoCTF, OverTheWire, TryHackMe, Hack The Box, etc.).
Fast Security backend server for SOS emergency alerts and real-time user safety services.
Goonami is a general purpose network security scanner, written in Golang, with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
🔍 Detect and analyze SQL injection vulnerabilities with DouSql, a customizable plugin designed for security researchers and penetration testers.
Testudo — Transaction security for the Ethereum ecosystem
🔍 Detect and alert on ARP spoofing attacks in real-time with this Python tool, ensuring network security and immediate incident response.
🔒 Manage your passwords offline with this secure TUI password manager, featuring TOTP support and robust encryption built in Go.
A collection of simple penetration testing tools written in Python for learning cybersecurity and offensive security fundamentals.
SecurityComps2026
🔍 Explore Vue.js injection for PS4 version 1.01 with this proof of concept using MITM techniques to enhance development insights.
An engine that allow say to browse I'm not hacking bank site
SentinelStack is a production-grade, security-first deployment of Gatus on AWS ECS (Fargate) using Terraform and controlled CI/CD pipelines.
A WIP 2D rocketry game made for Hack Club Flavortown.
🛡️ Protect AI agents on Moltbook with real-time security, ensuring safe interactions and data integrity for users and developers alike.
Proof of concept for gamified version of well-known working memory test, N-Back Test. Developed in part of larger project creating a cognitive wellness app (NeuroQuest)
🖤 Security portal at security.blackroad.io
High-performance Certificate Transparency (CT) monitoring tool written in Rust. Real-time stream of newly issued SSL/TLS certificates from CT logs. Rust implementation of certstream-server with improved performance and memory efficiency.
Aplicación web fullstack para la reserva de citas en un hospital. Backend con Spring Boot, Spring Security y JWT, incluyendo validación de cuenta por email. Frontend desarrollado con React.
A modern platform for the hacker community to discover, share, and rate security tools.
Kafka configurations local and PRDO style
🚀 Five powerful tools for indie hackers - feedback, validation, tracking, revenue transparency, and playbooks
expanded johto hack based on HnS
My journey into web application security: write-ups, solutions and notes from PortSwigger Web Security Academy, Hacker101, and bug bounty preparation.
A go package to help hardening libraries and projects.
holbertonschool-cyber_security
UC GIS Consultation Tool - Proof of Concept An interactive decision tree that mirrors the consultation process used by UC GIS Librarians to guide researchers through geospatial research needs.
Enterprise core platform providing zero-trust security framework with DID/Verifiable Credentials authentication and zero-downtime deployment capabilities. Features canary deployments, traffic splitting, load balancing, circuit breaking, and service discov
This project demonstrates Windows endpoint security monitoring using Wazuh, showcasing two common real-world approaches used in SOC environments: Baseline monitoring using native Windows Event Logs Enhanced monitoring using Sysmon integrated with Wazuh.
A Proof-of-Concept Flutter application demonstrating AI-driven safety features, integrated with n8n for automated workflow alerts.
🛡️ Scan AI skill directories for security risks using hybrid static and AI analysis with an interactive visual dashboard for clear insights.
Data-Security
🖼️ Recover plaintext from pixelized screenshots using this proof of concept, designed for images processed with a linear box filter.
security-intel
A basic proof of concept for a 2048 game in TypeScript.
Book library with Hexagonal Architecture, Domain Driven Design, Java Swing, Spring boot, Spring data, Spring security, Openapi, Spring MVC & JDBC. Approaches such as password encryption, thread per request model and use of containerization with docker for
SHS Expo Proof-of-Concept
🚀 Update and upgrade your Archcraft system smoothly with a single command, ensuring zero errors and offering backup options for added security.
🌐 Build scalable, decentralized applications with BasedChain, offering fast transactions and robust security for a seamless user experience.
🔍 Enhance asset management and security testing with this Go and React-based platform for efficient reconnaissance and authorization.
🎫 Extract Kerberos tickets from the Local Security Authority cache on Windows, enhancing security research and penetration testing effortlessly.
Cybersecurity & Full Stack Developer - Consultoría en seguridad informática, pentesting y desarrollo seguro
🗨️ Retrieve and manage your chat history easily with this tool that supports multiple platforms and formats for seamless data access.
A modern peer-to-peer messaging platform that combines end-to-end encrypted messaging, video calls, and server-based chat rooms. Built with privacy and security at its core.
Fender Hacker GUI is a Windows HTA utility that opens system tools like Command Prompt, Calculator, and PowerShell messages. It can run commands automatically and is designed for safe local use on Windows, leveraging ActiveX for automation. Do not run on
🔍 Build and document robust SOC and Cloud Security projects on AWS and Proxmox for effective monitoring, detection, and incident response.
🚀 Build robust applications with this production-ready Express.js starter kit featuring authentication, PostgreSQL support, and essential security tools.
🛠️ Detect JavaScript URLs in real-time, scan for secrets with TruffleHog, and get instant notifications via Discord with this Burp Suite extension.
🛡 Implement a Zero Trust network architecture on AWS to enhance security with micro-segmentation, identity control, and continuous monitoring.
🔗 Simulate identity federation and access governance with Keycloak and SailPoint IIQ for streamlined security and management.
this is a silly proof of concept just play rb2dx lmao
🗂️ Implement automated high-availability backups for virtualized environments using rsync over SSH, ensuring quick recovery and data protection.
🖥️ Build an air-gapped, voice-optional USB assistant to interact with local files securely, without cloud dependence or exposure.
🤖 Enhance your coding efficiency with SPARC, a command-line AI assistant that executes code, manages files, and visualizes architecture seamlessly.
📁 Centralized GitHub configuration hub for all repositories — houses workflows ⚙️, funding 💰, issue templates 🧩, security policies 🔒, and community guidelines 🤝 to ensure consistency, automation, and a professional developer experience across all projects
Project D.A.R.C. is a security‑focused AI recon tool designed to find sensitive corporate infrastructure that may have been exposed to large language models.
A comprehensive digital security education platform for non Gen-Z peeps!
🎮 Activate Delta Force hacks easily with this exploit tool; simply run the app, wait, and enhance your gaming experience effortlessly.
Enterprise-grade Security Operations Center with Wazuh SIEM/XDR integrating 20+ security tools including Suricata, CALDERA, DFIR-IRIS, Shuffle SOAR on Ubuntu 24.04
🖥️ Provision and manage secure EC2 workstations with AWS SSO and Session Manager, ensuring zero inbound access and automated workflows for efficient access.
CyberSecurity
Stateless CAPTCHA with Proof of Work concept
Hacker News RSS Reader
AWS Workshop: S3Security - AWS First Cloud Journey
🎯 VISTA — AI-Powered Security Testing Assistant for Burp Suite. Real-time traffic analysis, 12 expert vulnerability templates, 80+ payloads, WAF detection & bypass. Supports OpenAI, Azure, and OpenRouter (FREE). Zero dependencies.
🛠️ Forward DNS queries to Cloudflare's secure DNS over HTTPS with this lightweight Cloudflare Workers proxy for fast, encrypted resolution.
A proof-of-concept project for learning event-driven patterns with Golang, Kafka, WebSockets, and real-time collaboration features
Proof of concept: MAGICARP parametrization. Indirect approach: optimize then discretize.
Spring boot websocket with security and redis based session
Meds — Hybrid firewall in Go using public blocklists
🔐 Manage API keys securely with KeyVault Pro, featuring military-grade encryption, intelligent auto-fill, and seamless AI integration for developers.
Aspiring Cloud & Security Engineer. Documenting my learning journey with Python, Linux, and cloud technologies
🔒 Implement a standalone, dependency-free hashing algorithm in C++20, featuring extendable output, domain separation, and post-quantum resistance.
DSA 5th lab
Ultimate Phantom Forces Script Roblox Guide Unlock Exclusive Hacks and Tips 🚀🔑
Proof of concept immediate mode GUI using Cairo and SDL3.
A high-security convoy escort mission script for FiveM servers featuring dynamic routes, armed escorts, and immersive gameplay.
I am a B.Tech candidate in Information Technology specializing in Cloud Technology and Information Security.
A collection of security labs, CTF write-ups, and vulnerability research for hands-on learning in ethical hacking and penetration testing.
API base em Spring Boot com Spring Security pronta para autenticação e autorização.
A Hacker News reader
🔍 Optimize image quality assessment with Q-Hawkeye’s reliable visual policy and uncertainty-aware dynamic learning framework.
End-to-end room booking & status display system for eNStudios. Features media queueing via FullCalendar, role-based access, and automated GitHub Actions deployments with built-in security audits.
Living With Sister Monochrome Fantasy Hacks and Cheats Unlocked 🎮✨ Ultimate Guide
LumiTerra Crypto Bot Game Auto Farm Clicker Guide Token Hack API 🚀🪙
PermiX
Modern cyber security portfolio with 3D animations, matrix effects & blue aesthetics. Features responsive design, glass morphism, and smooth performance. Built for NIET cyber security student Ashish Gupta. HTML/CSS/JS.
IEEE publication Btec. project
Unlock Wildgate Cheats and Hacks Ultimate Guide for Players 🚀🕹️
DayZ ESP and Aimbot Guide Unleash Next Level Hacks for Ultimate Survival 🕹️🔥
Ultimate Once Human Cheats and Hacks Guide 🔥 Top Strategies and Exclusive Tips
Dự án nghiên cứu khai thác modem VNPT các dòng H, NS, XS: phân tích firmware, UART, root shell, mở telnet/ssh và tùy chỉnh cấu hình
Installation Steps for a new Intel Lenovo Thinkbook TGX (Oculink) Security Enhanced Arch Gnome Wayland AMD eGPU
CEH
Undergraduate Senior Project | Computer Vision Project (Security Camera)
High-security encryption/decryption library using AES-256-GCM and Argon2id
An open-source security platform for the community. Unified SIEM, SOAR, WAF, and more in a single, self-hosted solution.
Path of Exile Cheats and Hacks Guide for 2025 Users
The Alters Cheats and Hacks Guide Latest Strategies for 2025
spring security with spa client angular with csrf protection
🔒 Learn sessions and cookies management in Node.js with practical code examples and user authentication flows. Enhance your web app's security and performance.
🔐 Monitor SSH logins in real-time and automate IP blocking, all while managing users through a Telegram interface for enhanced security on Linux servers.
Collection of write-ups and detailed notes from my Hack The Box Bug Bounty Path Skill Assessments
🌊 Enhance your digital content's security with a blind watermark method using DWT-DCT-SVD for effective copyright protection.
🌍 Access IP geolocation, network intelligence, and security risk detection easily with the official Ip2Geo PHP SDK.
🔍 Scan Windows machines for Notepad++ supply chain attack indicators with this PowerShell script to enhance your security posture.
🤖 Globomantics Robot Fleet Manager - Educational demo with vulnerable dependencies for GitHub Advanced Security training. Tim Warner's Pluralsight Dependency Review course. Learn more: https://pluralsight.com
A secure, scalable .NET 10 authentication provider with JWT, OAuth, and role-based access control for educational platforms.
Minecraft Hypixel Hack Guide and Tips for 2025
🔧 Automate PowerShell tasks with h0b, simplifying workflows and enhancing productivity through powerful script management and execution.
🚀 Build and manage robust network rules in Ruby, streamlining your application’s security and connectivity with ease.
Powerful Privacy tool to secure your sensitive apps.
🛡️ Enhance your AI agents with Exo, a security layer that ensures input validation, permission control, and observable executions for safer interactions.
Project repository for Masters Research Paper: Attack Possibilities Modelling for Space Security Using Threat Actor Analysis
🛠 Organize essential MacBook Pro tools and settings to streamline development for new Mac users and advanced developers transitioning from Windows.
🚀 Streamline your development with Daytona, a flexible tool for efficient API management and integration, designed to enhance your workflow and productivity.
revm helps you quickly launch Linux VMs / Containers
Experimental/prototypal/proof of concept "patching linker" for GBA ROMs
💀 Malware Developer & Security Researcher 💀
A personal portfolio website showcasing my expertise in cybersecurity, cloud security, and automation. Built with HTML, CSS, and JavaScript, this site highlights my projects, skills, and contact information. Deployed using GitHub Pages.
R Package for Acquiring and Processing Data from Japan Institute for Health Security
security-plus-quiz
An open source IoT Hacker Tool by using Raspberry Pi Zero 2 W
🔍 Enhance your network security with QianKunQuan, a high-performance port scanner and CVE vulnerability detection tool for security professionals.
Complex minecraft anticheat for detection of aim hacks (1.8-1.21)
Bot that automates farming and clicker activities in Brilliant Crypto game. Features include crypto token integration and API support. Designed with cheats and hacks to optimize profits and enhance gameplay efficiency.
🛡️ Enforce enterprise-grade security for autonomous AI agents with MAAIS-Runtime, ensuring real-time protection for your agentic AI systems.
ManageHub is a comprehensive management system for tech hubs, designed to streamline user and workspace management. It features biometric authentication for staff and users to clock in and out efficiently, enhancing security and operational oversight.
LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms
WebSocket security testing tool. Intercepts, analyzes, and fuzzes WebSocket connections to find authentication flaws, injection vulnerabilities, and data leaks.
🔑 Enable JWT Token authentication for stable API access, avoiding Clerk session issues while enhancing privacy and simplifying configuration.
Secux Linux: Security Manager
Python-based tool that scans for open TCP ports on a given IP address. It helps network administrators or security professionals identify open ports that could potentially expose services to threats. This tool can be used for basic network reconnaissance
🛡️ Secure your Laravel applications with Laravel Bastion, a simple and effective solution for role-based access control and user authentication management.
Purdue Hackers webring
kubesec-diagram.github.io
Type-safe runtime access to app entitlements for iOS, macOS, tvOS, and watchOS
Proof of concept Data Catalog for price statistics researchers
A simple web reconnaissance and security testing tool
A cyber security puzzle game
5-phase self-study roadmap for AI hardware engineers: digital design & Verilog → Xilinx FPGA & Zynq → HLS/OpenCL → Jetson edge AI → HPC, robotics, autonomous driving, AI chip design. Hands-on projects throughout.
KeyFade is a security focussed, link-based encryption tool that allows users to encrypt secrets into shareable links with a specified expiration period.
An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcrowd/Intigriti/etc) (updates every 10 minutes)
A browser-based password generator built with JavaScript and HTML that creates strong passwords up to 60 characters with configurable generation settings and variants. Designed as a simple, self-contained webpage, it focuses on straightforward logic and a
This script is designed to automatically generate seed phrases and check balances for Tron networks. If a wallet with a non-zero balance is found, the wallet's information (address, mnemonic, private key, and balances) is logged and saved to a file named
A monorepo for experimenting with new technology, focusing on LLMs, JavaScript, and Python. It includes various proof-of-concepts (PoCs) inspired by Medium articles and tutorials.
🔐 Simplify authentication with AuthECAPI, a secure and efficient API for managing user access and permissions in your applications.
🛡️ Inspect Python scripts before execution to prevent hidden destructive commands and enhance security in Claude Code environments.
🚀 Build secure CI/CD pipelines on Azure with Thonmaker, integrating SAST, container scanning, and DAST for robust application security.
no
Notes and helpers for ethical hacking according to EC Council's Ethical Hacking Certificate course/labs v12
🛡️ Build a secure REST API with Spring Boot, featuring authentication, authorization, and RBAC using JWT for robust identity management.
🛡️ Free AI that blocks hackers while you sleep. Runs on cheap hardware. When someone in Tokyo gets attacked, you're protected in 30 seconds. No fees. No experts needed. Just protection. One node's detection → everyone's protection.
🔗 Connect your SvelteKit frontend to a Go backend seamlessly with this proof of concept using remote functions for effective communication.
This document presents the results of our proof-of-concept training run for an Azerbaijani automatic speech recognition (ASR) system. The model successfully learned to transcribe Azerbaijani speech, demonstrating the feasibility of building a production-g
🚀 Demonstrate code execution from non-executable memory on Windows x64 by bypassing DEP/NX protection using hardware breakpoints and instruction emulation.
my ansible config to build out my pentest box
🔍 Enhance security with Verity, a fast IP reputation lookup service using Rust and Axum, pulling data from 144 threat feeds for real-time threat analysis.
dao-proof-of-concept
Wrapper for the Transmit Security Account Protection SDK
A savegame editor for Tomb Raider I-VI Remastered. Edit items, weapons, ammo, health, statistics, and position. Compatible with PC, PS4, and Nintendo Switch savegames.
These are my tools, the 4ndr0tools.
🛠️ Create and execute shellcode payloads effortlessly using ASPxecute and `aspnet_compiler.exe` for seamless integration on Windows and Linux environments.
This Proof of Concept (PoC) code demonstrates a simple implementation of API request security using RSA signatures and nonces. The code is written in Python and utilizes the Flask framework. This code is mentioned in posts mentioned here: https://mwalkows
Proof of concept of the Process-Oriented Programming paradigm using Elixir OTP. Using GenStage, every process is an OTP supervision tree to ensure that the processes are restared on failure.
aws-security-services-best-practices
My Hacker news desktop reader.
A collection of notes, mathematical proofs and concepts I digitally wrote (🇬🇧 & 🇮🇹)
🚀 Analyze and enhance your Progressive Web Apps with a detailed 185-point audit, achieving better performance, compatibility, and security.
Automatic security vulnerability remediation for your code.
kickstart your book writing process with AI (Proof of concept)
An extendible framework for .NET to implement the BFF Security Pattern (a.k.a. Token Handler Pattern) in Single Page Applications
hack
Menú de herramientas para análisis de malware y virus informáticos.
Proof of Concept custom firmware for the Huidu WF1 or WF2 LED Controller Card
A proof of concept for a new way that data can get into the API.
A comprehensive dashboard for tracking and visualizing OWASP (Open Web Application Security Project) repositories and their statistics.
Njack_Hack_It_Out{Intellect}
Shell emulator and multitool for the video game Grey Hack.
An all-in-one hackathon judging platform, created with modern technologies aimed at optimizing the user experience of hackers, judges, and organizers.
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
A security layer for Git repositories
Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable suppression list, integrates with Jira and ServiceNow for creation of tickets when findings are generated by AWS Security
🔒 Protect kernel and bootloader files using CodeDefender's obfuscation techniques in a Windows 10 VirtualBox snapshot for enhanced security.
🔍 Automate code reviews with AI, performing 280+ checks across security, performance, quality, and more to ensure your code is robust and reliable.
🦄 A curated list of privacy & security-focused software and services
Athena OS is a Arch/Nix-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!
Proof of concept. Code snippets manager for developers. PWA.
🔒 Advance security governance with a model designed for engineering-driven organizations, linking threats to business context and prioritizing risks effectively.
🔒 Protect your files and folders on Windows with GiliSoft File Lock Pro, offering locking, hiding, and encryption for ultimate data security.
Homebridge plugin to control certain Eufy Security devices
awesome game security [Welcome to PR]
一个漏洞 PoC 知识库。A knowledge base for vulnerability PoCs(Proof of Concept), with 1k+ vulnerabilities.
Windows Hacking FrameWork using Reverse Shell
A utility to fight against malicious hackers on Bedrock Edition.
🔍 Enhance WordPress development with AI-driven introspection, security audits, and intelligent code generation for a more efficient coding experience.
Google Custom Search Integration: Utilizes Google's Custom Search API to find potentially vulnerable URLs using search dorks. Automated SQL Injection Testing: Automatically checks URLs for common SQL injection vulnerabilities.
A collection of scripts for the hacking focused mmorpg: greyhack.
One page websites I hack together to get something done
Nuclei templates written by geeknik. Claude is my co-pilot. 🤖
Make your keepass 2.x more secure.
🔍 Enhance security with an AI-powered IoT system on Jetson Nano, detecting unknown people and vehicles while capturing images and logging events.
Coverage-guided, in-process fuzzing for the JVM
This project is aimed at freely providing technical guides on various hacking topics.
Evervault JavaScript SDK.
🤖 Streamline QQ chat with QQSafeChat, a secure tool for AI-driven interactions and emoji integration using Windows UI Automation.
JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.
Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.
EN.650.624 Network Security
Websockets Proof of Concept Main Application
Github pages blog of Maloy Manna on Data, Tech, Cloud Security & Agile Project Management
🚀 Discover promising tokens and enhance security analysis with DexScreener-Rocket-Analyzer’s streamlined pipeline for efficient cryptocurrency insights.
Microsoft Security DevOps for GitHub Actions.
Proof of concept for creating the FE for a Whisk display component
Proof of concept for a rating system for stealth games
PowerShell module with security functions used in reporting and management of IT resources.
Mikrotik friendly blacklist to filter all these damn hackers.
Proof of concept denial of service over TOR stress test tool
🕹 Manage Hack Club's DNS through a GitHub repository
thewhiteh4t
A collection of sysadmin / DevOps / system architecture cheat sheets hosted on https://lzone.de
Proof of concept base x to y converter (2 to 16 right now).
Proof Of Concept...
Proof Of Concept...
🛡️ Analyze web server logs to detect attacks like SQL injection and XSS, revealing threats and enhancing your security posture with easy-to-read reports.
CDN cached Hacker News API
Neo4j proof of concept in C#
Utility to test Java code for SQL injection vulnerabilities.
:octocat: + ~/. = ❤️. These are my dotfiles, feel free to hack them! 😄
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals.com
Awesome Hacker News: a collection of awesome Hacker News apps, libraries, resources and shiny things.
wolfSSH is a small, fast, portable SSH implementation, including support for SCP and SFTP.
Security, performance, marketing, and design tools — Jetpack is made by WordPress experts to make WP sites safer and faster, and help you grow your traffic.
Provides a tight integration of the Security component into the Symfony full-stack framework
CVE-2025-69250 -- free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt
CVE-2025-69251 -- free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter
CVE-2025-69251 -- free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter,
CVE-2025-69252 -- free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 have a NULL Pointer Dereference vulnerability. Remote unauthenticated attackers can tri
CVE-2025-69253 -- free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal par
CVE-2025-9120 -- Improper Control of Generation of Code ('Code Injection') vulnerability in OpenText™ Carbonite Safe Server Backup allows Code Injection. 
CVE-2026-25501 -- free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics due to nil pointer dereference and the SMF process terminates. This is tri
CVE-2026-25545 -- Astro is a web framework. Prior to version 9.5.4, Server-Side Rendered pages that return an error with a prerendered custom error page (eg. `404.astro` or `500.astro`) are vulnerable to SSRF. If the `Host:` header is changed to an attacker's server, it wi
CVE-2026-25591 -- New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.10, a SQL LIKE wildcard injection vulnerability in the `/api/token/search` endpoint allows authenticated users to cause
CVE-2026-26024 -- free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on th
CVE-2026-27126 -- Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, a stored Cross-site Scripting (XSS) vulnerability exists in the `editableTable.twig` component when using the `html` column type. The applicati
CVE-2026-27127 -- Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-
CVE-2026-27128 -- Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, a Time-of-Check-Time-of-Use (TOCTOU) race condition exists in Craft CMS’s token validation service for tokens that explicitly set a limited usa
CVE-2026-27129 -- Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation uses `gethostbyname()`, which only resolves IPv4 addresses. When a hostname has only
CVE-2026-27461 -- Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE c
CVE-2026-27642 -- free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter,
CVE-2026-27643 -- free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the NEF component reliably leaks internal parsing error details (e.g., invalid charac
CVE-2026-3042 -- A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is an unknown function of the file /admin/index.php. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried
CVE-2026-3043 -- A flaw has been found in itsourcecode Event Management System 1.0. The impacted element is an unknown function of the file /admin/navbar.php. Executing a manipulation of the argument page can lead to cross site scripting. The attack may be performed from
CVE-2026-3044 -- A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is pos
CVE-2026-3046 -- A security vulnerability has been detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This vulnerability affects unknown code of the file /check_profile_old.php. The manipulation of the argument profile_id leads to sql injec
CVE-2026-3049 -- A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the function get of the file horilla_generics/global_search.py of the component Query Parameter Handler. The manipulation of the argument prev_url results in open r
CVE-2026-3050 -- A flaw has been found in horilla-opensource horilla up to 1.0.2. Impacted is an unknown function of the file static/assets/js/global.js of the component Leads Module. This manipulation of the argument Notes causes cross site scripting. The attack is possi
CVE-2026-3051 -- A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the arg
CVE-2026-3052 -- A vulnerability was found in DataLinkDC dinky up to 1.2.5. The impacted element is the function proxyUba of the file dinky-admin/src/main/java/org/dinky/controller/FlinkProxyController.java of the component Flink Proxy Controller. Performing a manipulatio
CVE-2026-3053 -- A vulnerability was determined in DataLinkDC dinky up to 1.2.5. This affects the function addInterceptors of the file dinky-admin/src/main/java/org/dinky/configure/AppConfig.java of the component OpenAPI Endpoint. Executing a manipulation can lead to miss
CVE-2026-3054 -- A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The manipulation of the argument hint leads to cross site scripting. The attack can be initiated remotely. The exploit is publicly available and might be used.
CVE-2026-3057 -- A security flaw has been discovered in a54552239 pearProjectApi up to 2.8.10. Affected is the function dateTotalForProject of the file application/common/Model/Task.php of the component Backend Interface. The manipulation of the argument projectCode resul
CVE-2026-3064 -- A security vulnerability has been detected in HummerRisk up to 1.5.0. Affected by this issue is some unknown functionality of the file ResourceCreateService.java of the component Cloud Task Scheduler. Such manipulation of the argument regionId leads to co
CVE-2026-3065 -- A vulnerability was detected in HummerRisk up to 1.5.0. This affects the function CommandUtils.commonExecCmdWithResult of the file CloudTaskService.java of the component Cloud Task Dry-run. Performing a manipulation of the argument fileName results in com
CVE-2026-3066 -- A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedCommand of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java of the component Cloud Compliance Scanning. Ex
CVE-2026-3067 -- A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTarGZ/extractZip of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/CommandUtils.java of the component Archive Extraction
CVE-2026-3068 -- A weakness has been identified in itsourcecode Document Management System 1.0. This impacts an unknown function of the file /deluser.php. Executing a manipulation of the argument user2del can lead to sql injection. The attack can be launched remotely. The
CVE-2026-3069 -- A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected is an unknown function of the file /edtlbls.php. The manipulation of the argument field1 leads to sql injection. The attack may be initiated remotely. The
CVE-2026-3070 -- A vulnerability was detected in SourceCodester Modern Image Gallery App 1.0. Affected by this vulnerability is an unknown functionality of the file upload.php. The manipulation of the argument filename results in cross site scripting. The attack may be la
CVE-2025-40701 -- Reflected Cross-Site Scripting vulnerability in SOTESHOP, version 8.3.4. THis vulnerability allows an attacker execute JavaScript code in the victim's browser when a malicious URL with the 'id' parameter in '/adsTracker/checkAds' is sent to the victim. Th
CVE-2025-40986 -- Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL using the endpoint 'cookies/indes.php/<XSS>'. This vulnerability
CVE-2025-41002 -- SQL injection vulnerability in Infoticketing. This vulnerability allows
CVE-2025-69208 -- free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Versions prior to 1.4.1 contain an Improper Error Handling vulnerability with Information Exposure. All deployments of free5
CVE-2025-69232 -- free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerabil
CVE-2025-69232 -- free5GC is an an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnera
CVE-2025-69247 -- free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash
CVE-2025-69248 -- free5GC is an an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of free5GC's AMF service have a Buffer Overflow vulnerability leading to Denial of Service. Remote unauthenticated attackers can crash th
CVE-2025-69248 -- free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of free5GC's AMF service have a Buffer Overflow vulnerability leading to Denial of Service. Remote unauthenticated attackers can crash the A
CVE-2026-21665 -- The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in unsupported version 2021.2.4 (build 4.7.3155.0011) uses deprecated .NET Remoting TCP channels that allow unsafe deserialization of untrusted data. When these
CVE-2026-23693 -- ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and insufficien
CVE-2026-23694 -- Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin versions prior to 3.0.5 contain a cross-site request forgery (CSRF) vulnerability affecting multiple administrative AJAX actions. The handlers for ahsc_reset_options, ahsc_debug_status, and ahsc_e
CVE-2026-2697 -- An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.
CVE-2026-2698 -- An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.
CVE-2026-27511 -- Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a clickjacking vulnerability in the web-based administrative interface. The interface does not set the X-Frame-Options header, allowing attacker-controlled sites to embed administrativ
CVE-2026-27512 -- Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a content-type confusion vulnerability in the administrative interface. Responses omit the X-Content-Type-Options: nosniff header and include attacker-influenced content that can be re
CVE-2026-27513 -- Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a cross-site request forgery (CSRF) vulnerability in the web-based administrative interface. The interface does not implement anti-CSRF protections, allowing an attacker to induce an a
CVE-2026-27514 -- Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password
CVE-2026-27741 -- Bludit version 3.16.1 contains a cross-site request forgery (CSRF) vulnerability in the /admin/uninstall-plugin/ and /admin/install-theme/ endpoints. The application does not implement anti-CSRF tokens or other request origin validation mechanisms for the
CVE-2026-27742 -- Bludit version 3.16.2 contains a stored cross-site scripting (XSS) vulnerability in the post content functionality. The application performs client-side sanitation of content input but does not enforce equivalent sanitation on the server side. An authenti
CVE-2026-2958 -- A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely.
CVE-2026-2959 -- A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitati
CVE-2026-2960 -- A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed re
CVE-2026-2961 -- A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer ove
CVE-2026-2962 -- A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in st
CVE-2026-2963 -- A vulnerability was determined in Jinher OA C6 up to 20260210. This issue affects some unknown processing of the file /C6/Jhsoft.Web.officesupply/OfficeSupplyTypeRight.aspx. This manipulation of the argument id/offsnum causes sql injection. It is possible
CVE-2026-2964 -- A vulnerability was identified in higuma web-audio-recorder-js 0.1/0.1.1. Impacted is the function extend in the library lib/WebAudioRecorder.js of the component Dynamic Config Handling. Such manipulation leads to improperly controlled modification of obj
CVE-2026-2965 -- A security flaw has been discovered in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.9. The affected element is an unknown function of the file /admin/SysModule/edit.html of the component System Extension Module. Performing a manipulation of the argument Tit
CVE-2026-2966 -- A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently
CVE-2026-2967 -- A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a commun
CVE-2026-2968 -- A vulnerability was detected in Cesanta Mongoose up to 7.20. This impacts the function mg_chacha20_poly1305_decrypt of the file /src/tls_chacha20.c of the component Poly1305 Authentication Tag Handler. The manipulation results in improper verification of
CVE-2026-2969 -- A flaw has been found in datapizza-labs datapizza-ai 0.0.2. Affected is the function ChatPromptTemplate of the file datapizza-ai-core/datapizza/modules/prompt/prompt.py of the component Jinja2 Template Handler. This manipulation of the argument Prompt cau
CVE-2026-2970 -- A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requ
CVE-2026-2971 -- A vulnerability was found in a466350665 Smart-SSO up to 2.1.1. Affected by this issue is some unknown functionality of the file smart-sso-server/src/main/resources/templates/login.html of the component Login. Performing a manipulation of the argument redi
CVE-2026-2972 -- A vulnerability was determined in a466350665 Smart-SSO up to 2.1.1. This affects the function Save of the file smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/UserController.java of the component Role Edit Page. Executing a manipu
CVE-2026-2974 -- A vulnerability was identified in AliasVault App up to 0.25.3 on Android/iOS. This vulnerability affects unknown code of the file shared_prefs/aliasvault.xml of the component Backup Handler. The manipulation of the argument accessToken/refreshToken/metada
CVE-2026-2975 -- A security flaw has been discovered in FastApiAdmin up to 2.2.0. Affected by this vulnerability is the function reset_api_docs of the file /backend/app/plugin/init_app.py of the component Custom Documentation Endpoint. The manipulation results in informat
CVE-2026-2976 -- A weakness has been identified in FastApiAdmin up to 2.2.0. Affected by this issue is the function download_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Download Endpoint. This manipulation of the argument f
CVE-2026-2977 -- A security vulnerability has been detected in FastApiAdmin up to 2.2.0. This affects the function upload_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Scheduled Task API. Such manipulation leads to unrestrict
CVE-2026-2978 -- A vulnerability was detected in FastApiAdmin up to 2.2.0. This vulnerability affects the function upload_file_controller of the file /backend/app/api/v1/module_system/params/controller.py of the component Scheduled Task API. Performing a manipulation resu
CVE-2026-2979 -- A flaw has been found in FastApiAdmin up to 2.2.0. This issue affects the function user_avatar_upload_controller of the file /backend/app/api/v1/module_system/user/controller.py of the component Scheduled Task API. Executing a manipulation can lead to unr
CVE-2026-2980 -- A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is the function strcpy of the file /goform/setSysAdm. The manipulation of the argument passwd1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been
CVE-2026-2981 -- A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely. The ex
CVE-2026-2983 -- A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted element is an unknown function of the file /admin/core/import_users.php of the component Bulk Import. This manipulation of the argument File causes imprope
CVE-2026-2984 -- A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects an unknown function of the file /admin/core/drop_user.php. Such manipulation of the argument ID leads to denial of service. The attack can be executed remo
CVE-2026-2985 -- A security flaw has been discovered in Tiandy Video Surveillance System 视频监控平台 7.17.0. This impacts the function downloadImage of the file /com/tiandy/easy7/core/bo/CLSBODownLoad.java. Performing a manipulation of the argument urlPath results in server-si
CVE-2026-2997 -- Tronclass developed by WisdomGarden has a Insecure Direct Object Reference vulnerability. After obtaining a course ID, authenticated remote attackers to modify a specific parameter to obtain a course invitation code, thereby joining any course.
CVE-2026-2998 -- ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.
CVE-2026-3015 -- A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launched remote
CVE-2026-3016 -- A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the attack is
CVE-2026-3025 -- A flaw has been found in ShuoRen Smart Heating Integrated Management Platform 1.0.0. Affected by this vulnerability is an unknown functionality of the file /MP/Service/Webservice/ExampleNodeService.asmx. Executing a manipulation of the argument File can l
CVE-2026-3026 -- A vulnerability has been found in erzhongxmu JEEWMS 3.7. Affected by this issue is some unknown functionality of the file /plug-in/ueditor/jsp/getRemoteImage.jsp of the component UEditor. The manipulation of the argument upfile leads to server-side reques
CVE-2026-3027 -- A vulnerability was found in erzhongxmu JEEWMS up to 3.7. This affects an unknown part of the file src/main/webapp/plug-in/ueditor/jsp/getContent.jsp of the component UEditor. The manipulation of the argument myEditor results in cross site scripting. The
CVE-2026-3028 -- A vulnerability was determined in erzhongxmu JEEWMS up to 3.7. This vulnerability affects the function doAdd of the file src/main/java/com/jeecg/demo/controller/JeecgListDemoController.java. This manipulation of the argument Name causes cross site scripti
CVE-2026-3040 -- A vulnerability was identified in DrayTek Vigor 300B up to 1.5.1.6. This affects the function cgiGetFile of the file /cgi-bin/mainfunction.cgi/uploadlangs of the component Web Management Interface. The manipulation of the argument File leads to os command
CVE-2026-3041 -- A security vulnerability has been detected in xingfuggz BaykeShop up to 1.3.20. Impacted is an unknown function of the file src/baykeshop/contrib/article/templates/baykeshop/sidebar/custom.html of the component Article Sidebar Module. Such manipulation of
CVE-2019-25366 -- microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL i
CVE-2019-25391 -- Ashop Shopping Cart Software contains a time-based blind SQL injection vulnerability that allows attackers to manipulate database queries through the blacklistitemid parameter. Attackers can send POST requests to the admin/bannedcustomers.php endpoint wit
CVE-2019-25433 -- XOOPS CMS 2.5.9 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the gerar_pdf.php endpoint with malicious cid
CVE-2019-25439 -- NoviSmart CMS contains an SQL injection vulnerability that allows remote attackers to execute arbitrary SQL queries by injecting malicious code through the Referer HTTP header field. Attackers can craft requests with time-based SQL injection payloads in t
CVE-2019-25440 -- WebIncorp ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the prod_id parameter. Attackers can send GET requests to product_detail.php with malicious prod_id va
CVE-2019-25442 -- Web Wiz Forums 12.01 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the PF parameter. Attackers can send GET requests to member_profile.asp with malicious PF value
CVE-2019-25443 -- Inventory Webapp contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through GET parameters. Attackers can supply malicious SQL payloads in the name, description, quantity, or
CVE-2019-25446 -- DIGIT CENTRIS ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the datum1, datum2, KID, and PID parameters. Attackers can send POST requests to /korisnikinfo.php
CVE-2019-25450 -- Dolibarr ERP/CRM 10.0.1 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries by injecting SQL code through POST parameters. Attackers can inject malicious SQL through parameters like actioncode,
CVE-2019-25452 -- Dolibarr ERP/CRM 10.0.1 contains an SQL injection vulnerability in the elemid POST parameter of the viewcat.php endpoint that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted POST requests with malicious SQL
CVE-2019-25455 -- Web Ofisi E-Ticaret v3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'a' parameter. Attackers can send GET requests to with malicious 'a' parameter values to
CVE-2019-25456 -- Web Ofisi Emlak v2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'ara' GET parameter. Attackers can send requests to with time-based SQL injection payloads to
CVE-2019-25457 -- Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]
CVE-2019-25458 -- Web Ofisi Firma Rehberi v1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through GET parameters. Attackers can send requests to with malicious payloads in the 'il', 'kat'
CVE-2019-25459 -- Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in the endpoint that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into parameters like emlak_durumu, emlak_tipi, il,
CVE-2019-25460 -- Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' GET parameter. Attackers can send requests to the arama endpoint with malici
CVE-2019-25461 -- Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch
CVE-2019-25462 -- Web Ofisi Rent a Car v3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'klima' parameter. Attackers can send GET requests to with malicious 'klima' values to e
CVE-2026-2896 -- A weakness has been identified in funadmin up to 7.1.0-rc4. This affects the function setConfig of the file app/backend/controller/Ajax.php of the component Configuration Handler. Executing a manipulation can lead to improper authorization. The attack can
CVE-2026-2897 -- A security vulnerability has been detected in funadmin up to 7.1.0-rc4. This vulnerability affects unknown code of the file app/backend/view/index/index.html of the component Backend Interface. The manipulation of the argument Value leads to cross site sc
CVE-2026-2898 -- A vulnerability was detected in funadmin up to 7.1.0-rc4. This issue affects the function getMember of the file app/common/service/AuthCloudService.php of the component Backend Endpoint. The manipulation of the argument cloud_account results in deserializ
CVE-2026-2903 -- A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been publish
CVE-2026-2904 -- A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly d
CVE-2026-2905 -- A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow. The at
CVE-2026-2906 -- A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overflow. The
CVE-2026-2907 -- A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_pas
CVE-2026-2908 -- A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype
CVE-2026-2909 -- A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. The attac
CVE-2026-2910 -- A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown code of the file /boaform/formPing6. Executing a manipulation of the argument pingAddr can lead to stack-based buffer overflow. The attack may be performed from remote. The e
CVE-2026-2911 -- A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disc
CVE-2026-2912 -- A vulnerability was found in code-projects Online Reviewer System 1.0. Impacted is an unknown function of the file /system/system/students/assessments/results/studentresult-view.php. The manipulation of the argument test_id results in sql injection. It is
CVE-2026-2913 -- A vulnerability was determined in libvips up to 8.19.0. The affected element is the function vips_source_read_to_memory of the file libvips/iofuncs/source.c. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the l
CVE-2026-2925 -- A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results
CVE-2026-2926 -- A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflo
CVE-2026-2927 -- A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack
CVE-2026-2928 -- A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based
CVE-2026-2929 -- A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow.
CVE-2026-2930 -- A vulnerability was identified in Tenda A18 15.13.07.13. The affected element is the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. Such manipulation of the argument boundary leads to stack-based buffer overflo
CVE-2026-2932 -- A security flaw has been discovered in YiFang CMS up to 2.0.5. The impacted element is the function update of the file app/db/admin/D_adPosition.php of the component Extended Management Module. Performing a manipulation of the argument name/index results
CVE-2026-2933 -- A weakness has been identified in YiFang CMS up to 2.0.5. This affects the function update of the file app/db/admin/D_adManage.php of the component Extended Management Module. Executing a manipulation of the argument Name can lead to cross site scripting.
CVE-2026-2934 -- A security vulnerability has been detected in YiFang CMS up to 2.0.5. This impacts the function update of the file app/db/admin/D_friendLinkGroup.php of the component Extended Management Module. The manipulation of the argument Name leads to cross site sc
CVE-2026-2935 -- A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. This issue affects the function strcpy of the file /goform/ConfigExceptMSN. Executing a manipulation of the argument remark can lead to buffer overflow. The attack can be executed remote
CVE-2026-2938 -- A vulnerability has been found in SourceCodester Student Result Management System 1.0. The affected element is an unknown function of the file /srms/script/admin/core/update_smtp.php. The manipulation leads to improper access controls. It is possible to i
CVE-2026-2939 -- A vulnerability was found in itsourcecode Student Management System 1.0. The impacted element is an unknown function of the file /add_student/ of the component Add Student Module. The manipulation results in cross site scripting. It is possible to launch
CVE-2026-2940 -- A vulnerability was determined in Zaher1307 tiny_web_server up to 8d77b1044a0ca3a5297d8726ac8aa2cf944d481b. This affects the function tiny_web_server/tiny.c of the file tiny_web_server/tiny.c of the component URL Handler. This manipulation causes out-of-b
CVE-2026-2943 -- A vulnerability was identified in SapneshNaik Student Management System up to f4b4f0928f0b5551a28ee81ae7e7fe47d9345318. This impacts an unknown function of the file index.php. Such manipulation of the argument Error leads to cross site scripting. The atta
CVE-2026-2944 -- A security flaw has been discovered in Tosei Online Store Management System ネット店舗管理システム 1.01. Affected is the function system of the file /cgi-bin/monitor.php of the component HTTP POST Request Handler. Performing a manipulation of the argument DevId resu
CVE-2026-2945 -- A weakness has been identified in JeecgBoot 3.9.0. Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The attack may
CVE-2026-2946 -- A security vulnerability has been detected in rymcu forest up to 0.0.5. Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio. The
CVE-2026-2947 -- A vulnerability was detected in rymcu forest up to 0.0.5. This affects the function updateUserInfo of the file - src/main/java/com/rymcu/forest/web/api/user/UserInfoController.java of the component User Profile Handler. The manipulation results in cross s
CVE-2026-2952 -- A flaw has been found in Vaelsys 4.1.0. This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler. This manipulation of the argument xajaxargs causes os command injection. The attack is possible t
CVE-2026-2953 -- A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed f
CVE-2026-2954 -- A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results i
CVE-2026-2956 -- A security flaw has been discovered in qinming99 dst-admin up to 1.5.0. This affects the function revertBackup of the file /home/restore. The manipulation of the argument Name results in command injection. The attack can be launched remotely. The exploit
CVE-2026-2957 -- A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of serv