Hacking EscapeTwo on HackTheBox: A Step-by-Step OSCP Journey | by enigma_ | Jan, 2025 | InfoSec Write-ups
Lo-Fi —  TryHackMe CTF Walkthrough For Beginners | By Pranav S V | Jan, 25 | by PRANAV S V | Jan, 2025 | InfoSec Write-ups
Splunk Series: Forwarding Logs Using Universal Forwarder (Part 2) | by Ghostploit | Jan, 2025 | InfoSec Write-ups
Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing”
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Russian Ransomware Groups Deploy Email Bombing and Teams Vishing
Will the last-minute Biden EO on cyber see the light of day?
Appsec Predictions for 2025 – Cody Scott – ASW #314
Experts found multiple flaws in Mercedes-Benz infotainment system
Most European Privacy Teams Are Understaffed and Underfunded
Cybersecurity jobs available right now: January 21, 2025
Fleet: Open-source platform for IT and security teams
Addressing the intersection of cyber and physical security threats
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Scam Yourself attacks: How social engineering is evolving
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
CVE-2024–45519 in Zimbra — Bounty $ 1000 | by Ajay Naik | InfoSec Write-ups
HPE is investigating IntelBroker's claims of the company hack
Enterprise News – ESW #390
FBI Warns AT&T Data Breach Exposed Agent Call Logs
HPE Data Breached by IntelBroker, HPE Data for Sale
Otelier Data Breach Exposes Hotel Reservations and PII
Esperts found new DoNot Team APT group's Android malware
Microsoft: Exchange 2016 and 2019 reach end of support in October
HPE investigates breach as hacker claims to steal source code
Belsen Group Leaks 15,000+ FortiGate Firewall Configurations
Microsoft fixes Windows Server 2022 bug breaking device boot
Phishing Attacks Are Top Security Issue for Consumers
Name That Toon: Incentives
HPE Launches Investigation After Hacker Claims Data Breach
Indian APT Group DONOT Misuses App for Intelligence Gathering
🚨 Found HTML Injection in Emails! Earned HOF 🏆 | by cryptoshant🇮🇳 | Jan, 2025 | Medium
2 Technical Hobbies I Love to Overcome Burnout as a Cybersecurity Professional | by Sara Sheon | Jan, 2025 | Medium
The Foundation of Cybersecurity: D3FEND™ 1.0 | by Prof Bill Buchanan OBE FRSE | ASecuritySite: When Bob Met Alice | Jan, 2025 | Medium
US Ban on Auto Components Could Curb Supply Chain
How I found S3 buckets in Bug bounties | InfoSec Write-ups
Is Carding Still a Thing in 2025. Is the Threat Finally Diminishing?” | by Sathyaprakash Sahoo | Jan, 2025 | InfoSec Write-ups
Reverse Engineering Chinese Social Media for Fun (REDNote App) | by Jason Jacobs, MSc. | Jan, 2025 | InfoSec Write-ups
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
Insecure Randomness on TryHackMe: Practical Guide Using a Windows MachineINSECURE RANDOMNESS ON TRYHACKME: PRACTICAL GUIDE USING A WINDOWS MACHINE | by Visir | Jan, 2025 | InfoSec Write-ups
Malicious npm and PyPI target Solana Private keys to steal funds from victims' wallets
Ukraine's State Registers Restored Following Cyber-Attack
Splunk Series: Installation Guide for Windows and Linux (Part 1) | by Ghostploit | Jan, 2025 | InfoSec Write-ups
Microsoft shares temp fix for Outlook crashing when writing emails
Former CIA Analyst Pleads Guilty to Sharing Top Secret Files
US Sanctions Chinese Hackers for Treasury, Telecom Breaches
50,000 critical exposures + one of the most vulnerable IT environments: our schools – Kiran Chinnagangannagari, Jeff Smith – ESW #390
Product Walkthrough: How Satori Secures Sensitive Data From Production to AI
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Telegram-Based "Sneaky 2FA" Phishing Kit Targets Microsoft 365 Accounts
Hotel Guest Data Exposed After Otelier Breach
CERT-UA warns against "security audit" requests via AnyDesk
One in ten GenAI prompts puts sensitive data at risk
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
AI-driven insights transform security preparedness and recovery
NDR's role in a modern cybersecurity stack
Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution
The Next Era of Data Security: AI, Cloud, & Compliance – Dimitri Sirota – ESW #390
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 29
Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale
A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks
newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION
TikTok is back up in the US after Trump says he will extend deadline
TikTok shuts down in the US as Trump throws the company a lifeline
HTB | Office — CVE-2023–23752, Abusing MS-BKRP & GPO | by anuragtaparia | Jan, 2025 | InfoSec Write-ups
TryHackMe Light Walkthrough. MODE:Easy | by 0verlo0ked | Jan, 2025 | InfoSec Write-ups
Unlocking the Doors: How I Took Over Accounts with a Single Flaw! | by Omdubey | Jan, 2025 | Medium
Amazon Cognito Cross-Account Integration | by Sena Yakut | Jan, 2025 | Medium
Star Blizzard hackers abuse WhatsApp to target high-value diplomats
HackTheBox — Compromised Sherlock Walkthrough | by Ghostploit | Jan, 2025 | InfoSec Write-ups
How I Discovered a Critical Vulnerability in an Internet Service Provider’s Software | by Shubhang Borkar | Jan, 2025 | InfoSec Write-ups
Plan Ristriction Bypass for Slack Integration: 500$ Improper Validation Check Bug | by Abhi Sharma | InfoSec Write-ups
Finding my First SQL Injection On HackerOne | by Aleksa Zatezalo | Jan, 2025 | InfoSec Write-ups
TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
If You Want To Be A CISO, Then Read This First … | by Taimur Ijlal | InfoSec Write-ups
U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon
The rise of scammer bug bounty programs — and the reason I quit bug bounty hunting. | by Alameen Karim Merali | Jan, 2025 | Medium
FTC orders GM to stop collecting and selling driver’s data
Introducing BloodHound CLI. We created a new tool to help you… | by Christopher Maddalena | Jan, 2025 | Posts By SpecterOps Team Members
Microsoft removes Assassin’s Creed Windows 11 upgrade blocks
HTB Challenge Write-Up: Juggling Facts | by Pat Bautista | Jan, 2025 | InfoSec Write-ups
Critical Blind SQL Injection leads to $4,134 (7/30 DAYS) | by 0day stories | Jan, 2025 | InfoSec Write-ups
Stored XSS to Admin in Unauthenticated-WordPress | by c0d3x27 | Jan, 2025 | InfoSec Write-ups
Lumma Stealer Q&A. The people have spoken, you asked and… | by g0njxa | Jan, 2025 | Medium
Getting Started with Bug Bounty Hunting in 2025: A Real World Guide | by hackbynight | Jan, 2025 | Medium
Cybersecurity 2025: The Year of the Human | by Helen Patton | Dec, 2024 | Medium
A Journey of Limited Path Traversal To RCE With $40,000 Bounty! | by HX007 | Jan, 2025 | Medium
When did random code execution become a feature? | by Steve Jones | Jan, 2025 | Medium
Breaking the Speed Barrier: SQL Injection Automation Evolution | by n0apol0giz3 | Jan, 2025 | Medium
Exploring Python’s Best Libraries for Ethical Hacking | by Abhishek pawar | Jan, 2025 | InfoSec Write-ups
Why I Chose a Cybersecurity Masters in Science Degree Over the CISSP Certification | by David S Mosher | Dec, 2024 | InfoSec Write-ups
Explore topics
You Can Now Play DOOM In Microsoft Word, But You Probably Shouldn’t | Hackaday
XSSy
How we mastered Content Security Policy - monday Engineering
Reverse Engineering Call Of Duty Anti-Cheat // ssno
- YouTube
GitHub - Adversis/gql-extractor: A simple tool to dynamically extract GQL queries and mutations from loaded Javascript.
- YouTube
- YouTube
Unpacking the Diicot Malware Targeting Linux Environments | Wiz Blog
Release v0.1.0 - Hello world! Cyberbro is live · stanfrbd/cyberbro · GitHub
Cyberbro | cyberbro
The cost of false positives - how we became a target - c/side
Fake SBI Reward APK Targets Victims with Trojan via WhatsApp – Malware Analysis, Phishing, and Email Scams
Tear Down The Castle - Part 1 | dfir.ch
Redirecting to ./066-Homomorphic_Sign_Evaluation_with_a_RNS_Representation_of_Integers
How to Use Parental Controls in Your Google, Apple, and Microsoft Accounts | WIRED
- YouTube
Let’s talk about AI and end-to-end encryption – A Few Thoughts on Cryptographic Engineering
AT&T and Verizon Hacks Linked to US Army Soldier: DOJ - Newsweek
- YouTube
- YouTube
Blogs - Ashinfosecurity
Windows BitLocker -- Screwed without a Screwdriver — Neodyme
CISA, JCDC, Government and Industry Partners Publish AI Cybersecurity Collaboration Playbook | CISA
Government Monitoring Those With "Negative" Views of Health Insurance Companies
Otelier Breach Exposes Marriot, Hilton Bookings and Client Info | CyberInsider
Hackers hide malware into website images to go unnoticed | TechRadar
- YouTube
- YouTube
Chinese hackers infiltrated US Treasury Secretary's PC — attackers had access to over 400 PCs | Tom's Hardware
- YouTube
Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs | Kong Inc.
- YouTube
security-audit-tool
A high-performance, customizable network packet generator and testing tool written in Rust. Designed for network stress testing, security assessments, and protocol analysis.
Just POC (proof of concept)
Critical security update for Electrum wallets. Instructions for updating and securing your funds.
A local easy-to-use password manager written in python with multiple User Interfaces
🤖 Mev B0T: An Ethereum bot 🌍 designed in Solidity 🔒 to optimize MEV (Miner Extractable Value) 💸 extraction. Features mempool 🌊 monitoring, front-running 🚀, and robust security mechanisms 🔐.
.NET8-Proof-of-concept
content-security-policy-filter
FiveM External cheat, offers various features like aimbot, triggerbot, exploits, and customizable settings, enhancing the gameplay experience. It includes a KeyAuth system for additional security and user management. The cheat is designed to be undetectab
breachpoint-security-softwares
Tools that you need for smart contract security & web security
Proof of concept public repository
Spring Security Basic Aunthentication
Wireless power switch (proof of concept)
This Repo Includes Cyber Security Certifications Preparation From My Personal Experience
A repository dedicated to the theoretical foundations of machine learning, covering key concepts, algorithms, proofs, and mathematical principles.
Proof-of-concept for composing a script for YT
NetworkSecurity
FHIR example data to use in Proof of Concept of using Shared Care Planning in combination with the NL Generieke Functies (developed by MinVWS)
This is a proof of concept used to read analogue water meters using chatGPT API.
A secure and scalable Moodle-based LMS hosted on Azure VM, offering course management, user roles, collaboration tools, high performance, and robust security, making it ideal for education, corporate training, and professional development.
ProofOfConcept
JWT authentication code with spring boot 3 and spring security 6
This proof-of-concept demonstrates how to hide data, or even an entire packet, within a TLS extension.
This repository contains a basic penetration testing report focusing on ethical hacking techniques and methodologies. It includes findings, analysis, and recommendations to improve the security posture of the tested system.
MEV Uniswap Bot – A sophisticated bot built for executing MEV-based trading strategies, including sandwich attacks, on Uniswap. Maximizes profitability with high security and compatibility across EVM networks. Perfect for traders and developers looking to
hackable postgresql container that includes pgvector for HNSW and pgvectorscale for DiskANN
Proof of concept SMTP relay written in Rust
ToDoApp-PHP-With-SQL_Injection A PHP-based ToDo app with MySQL, showcasing SQL injection vulnerabilities and secure coding practices. Ideal for learning about web security.
TECHNEX-25 HACK-A-THON
Cyber-Security
Placing project at the NetApp Hackathon 2024 is an energy efficient data center management system built in Python. It features two factor authentication (2FA) for security, dynamic workload redistribution to prevent overheating, and intelligent task sched
This is a sandbox mono repo containing an assortment of libraries, applications, experiments, proof of concepts.
NetworkSecurity
For cyber security oppgave på vg1 IM
Common Application Security vulnerabilities Cheatsheets
Fundamental Data Skills for Human Security students
Spring-Security-Spring-Data-JPA-Thymeleaf-2
A Python-based port scanner that scans all ports (1-65535) on a target IP to check for open ports. It uses multi-threading for fast scanning and handles connection timeouts. Ideal for network security and penetration testing. Ensure you have permission be
Nyx OS is an innovative open-source operating system designed for modern computing, with AI-driven features, quantum computing compatibility, and a revolutionary file system. Focused on security, resource optimization, and sustainability, Nyx OS aims to r
Security-Camera-Manager
ai-powered_home_security
Proof of Concept (POC) emulator for World of Warcraft : Wrath of the Lich King in Lua ! (Yes)
使用Gemini产生一个通用的exe内存hack程序
Full-stack application (Proof-of-Concept) for creating wood-based materials orders
Proof of concept of a XSS vulnerability in django-allauth <=0.63.5
Work Place Media - Doohly - Proof Of Concept - testing with sbs news feed
A proof of concept program that displays a couple of logos on the VEX V5 brain.
Hacking help service providers
Proof of Concept for pulp-cli
Roblox Basketball Legends Script Hack No Key Pastebin 2025 Keyless Free Open Source Script Roblox for all Executors! All Working Scripts! Great OP GUI Script! Byfron Bypass Script Roblox! Free Download this Script! OP Autofarm 2025!
🛠️ About Me I am a Computer Information Systems student at WTAMU, building a foundation in networking, security, databases, and programming. My passion lies in data science, particularly in using machine learning and data wrangling to uncover insights. Th
Microsoft-AZ500-Azure-Security
Proof of concept & details for CVE-2025-21298
spring-security-examples
OSINT tool with integrated penetration testing for efficient information gathering and security analysis
Bluetooth and WiFi Vulnerability Tester Scans WiFi and Bluetooth networks, performs cracking, and detects security vulnerabilities with AI-powered analysis.
This repository contains a Proof of Concept (PoC) for integrating the DocuSign API with our Treasury Management Portal. The integration demonstrates how to send and manage envelopes, track document status, and handle user signatures using DocuSign's API t
Bot that automates farming and clicker activities in Xborg game. Includes crypto integration and API support. Designed with cheats and hacks to maximize profits and enhance gameplay efficiency.
This repository offers a robust set of tools for Plinko. Inside, you ll find hack scripts, cheat strategies, and advanced Predictor Bots to give you an edge in the casino. Enhance your gameplay, predict outcomes, and maximize your winnings. For educationa
Spring_Security_Practice_v3
Simple Proof of Concept for a project at the University of Kent
ppSpringBootSECURITY
Proof of concept for the new Symbol docs.
Bot that automates farming and clicker activities in Catizen mini-game. Includes features for crypto integration and blockchain technology. The bot supports hacks and cheats to optimize profit and enhance gameplay efficiency.
Evaluating the security of a system and remediating the associated vulnerabilities
This proof of concept aims to demonstrate how to track user behavior on a webpage, including scroll depth and time spent on the page, using Google Analytics.
Bot that automates farming and clicker activities in Super Champs game. Includes crypto integration and API support. Features cheats and hacks to maximize profits and enhance gameplay efficiency.
Cryptography python scripts
spring scurity project with no database use and it include basic and form based authentication. Including Json Web Token Generation and used in this project.
Welcome to my repository! I’m a student at UTM, pursuing a degree in Network & Security. This repository offers an insight into my learning journey including my exploration of C++ and my growing passion for coding and cybersecurity. Feel free to explore m
Proof of Concept du TwoTower LCM (Large Concept Model)
macOS 版本史努比屏幕保护
This repository contains resources, scripts, and lecture notes used during the internship program. It is designed to support your self-study efforts and help you gain hands-on experience to further enhance your skills.
A web application for secure URL filtering in educational environments. Built with Flask, LDAP authentication, MongoDB storage, and pfSense firewall management, this system helps teachers and administrators manage internet access, block restricted website
security_backend
Information-System-Security
A proof of concept for compiling Cython to WASM.
Website and desktop app framework. Meant as a proof-of-concept full-stack project that features a website where the user can make an account, subscribe to the service, download an obfuscated python desktop app, and authenticate to the app using the accou
A ddoser is a tool used for launching Distributed Denial of Service (DDoS) attacks on targeted websites or online services by flooding them with massive amounts of traffic, causing them to become inaccessible. These attacks are often carried out with mali
Proof Of Concept
A proof of concept simulation of ethos - an ethics driven negotiation agent
An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.
Proof of concept not using loops, if-else or any switch statements
davinci resolve crack keygen serial-key free-download license-key activation-crack cracked-software torrent no-activation-needed patch full-version-free unlocked repack activation-bypass warez key-generator activation-code software-hack bypass-protection
Proof of concept for a Go backend that embeds and builds its frontend with `go generate`.
iobit driver booster crack keygen serial-key free-download license-key activation-crack cracked-software torrent no-activation-needed patch full-version-free unlocked repack activation-bypass warez key-generator activation-code software-hack bypass-protec
This is our hackathon project for United Hacks v4. It is a platform where organizations can connect with volunteers,
A decentralized authentication system combining blockchain and MFA for enhanced security. Built with Solidity, Python, and Web3.js, it features cryptographic hashing, dynamic OTPs, and Ethereum smart contracts. Python powers backend logic, while JavaScrip
CSE 251 , Only For EWU Student's.
Demo social media platform for USER using spring boot 3.3.7, Security 6 with JWT
PC-security-feature
Proof of concept written in Rust for the paper CSD-JWT: Compact and Selective Disclosure for Verifiable Credentials
ProofOfConcept_TPH_vs_join
security-tools
This is Cyber Security Challenge Task 2, Check or Inspect this Source Code For Any Backdoor, Hidden Malicious code etc. Informative dashboard, category of products management, customer management, staff management, email notifications, product sale and p
Code for K-Hacks - Humanoid Robot Hackathon
Tweet Simplificado utilizando Spring Security + JWT + Auth2
Proof of concept to use the CoreML GFPGAN model to upscale images locally in a Mac App
this app by anas
U of T Hacks 2025
Synthron Crypto Trader is a Solana-based crypto trading bot designed for real-time, high-frequency trading. It integrates advanced strategies, risk management, and machine learning models for optimized decision-making. Built with scalability and security
Security_CICD
Simple task management application for revising Spring Security beyond
CYBER-SECURITY-TASK-1
An AI system for real-time detection of violence, fire, smoke, and weapons. It analyzes live video feeds using advanced models to identify threats and send alerts, ensuring safety and security with accurate, low-latency detection and a user-friendly dashb
a scripting and security framework
Cyber-Security-Essential-Training
This Repo contains Machine Learning Project - Network Security
securitymaze
WebGuard is an advanced web vulnerability scanning tool designed to identify and mitigate security vulnerabilities in web applications. It provides a comprehensive solution for developers, cybersecurity enthusiasts, and organizations to detect and address
Critical security update for Electrum wallets. Instructions for updating and securing your funds.
awfixer-security-bot
🚀 Solara Executor is a state-of-the-art Roblox script executor, crafted for advanced script execution, exceptional performance, and an intuitive user experience. Fully compatible with the latest Roblox updates, Solara Executor offers unmatched security a
🤖 Mev B0T: An Ethereum bot 🌍 designed in Solidity 🔒 to optimize MEV (Miner Extractable Value) 💸 extraction. Features mempool 🌊 monitoring, front-running 🚀, and robust security mechanisms 🔐.
A Password Generator is a tool that creates strong, random passwords to enhance online security. It generates complex passwords with a mix of letters, numbers, and special characters, making them harder to guess or crack. Ideal for safeguarding accounts a
This project concerns the implementation of a proof-of-concept editor for DAO-ML using Cinco Cloud. The project folder contains all the files necessaary to execute the editor locally, to generate and edit DAO-ML files (.dao), and to automatically generat
Proof of concept: Spring Restful service that exposes a graphql endpoint that calls an external service (RandomUser's API) using Apache Camel. Exposes a playground using GraphiQL/Swagger
All in one public resources for binary rom hackers. Anyone can contribute.
Hacker News latest news scraper
A database for people to check for unethical hackers.
FiveM External cheat, offers various features like aimbot, triggerbot, exploits, and customizable settings, enhancing the gameplay experience. It includes a KeyAuth system for additional security and user management. The cheat is designed to be undetectab
A secure User Authentication System built with Node.js, Express.js, and MongoDB. It includes JWT-based authentication, user registration, login, and password reset via OTP. Passwords are securely hashed with bcrypt. This project demonstrates modern securi
Config files for my GitHub profile.
A comprehensive backend service for creating, listing, and canceling e-commerce orders. Includes webhook support, a CI/CD pipeline, Docker-based deployment, and optional scalability, caching, and security features.
Made for hack and roll 2025
Unlock the Hacker Within! Master🐧, the hacker's playground, with scripting, networking, and cybersecurity skills. #HackThePlanet!🚀
This repository provides a comprehensive overview of the healthcare database system, including its design, implementation, testing, and deployment details. The system is designed to store and manage patient health information while ensuring data integrity
A GUI based program for making customised crypto stealing malware written in python
2-10g OVH, 90-100G UDP Stable Power
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about poten
fable_proof_of_concept
IMDB with Security
mlops_network_Security
onboarding_security
MLOPS-project-Network-Security-system
rbc-security
Carbon Executor is a state-of-the-art Roblox exploit that offers unmatched performance and security, boasting 90% UNC support and Level 8 execution capabilities. Compatible with Windows 7 through 11, it empowers users to unlock the full potential of Roblo
https://www.youtube.com/watch?v=IPWBQDMIYkc&t=935s
Proof Of Concept Next.js
Develop a Node.js service to scrape real-time stories from Hacker News.
A proof-of-concept ecommerce system with a product catalog and basic user management.
A lightweight HTTP reverse proxy that routes requests to multiple Ollama servers. It includes features like rate limiting, API key validation, security filtering, metrics collection, and hot-reloading of configurations.
Developed a Python-based tool to detect and evaluate sensitive data (names, emails, phone numbers, etc.) in text files. Key Features: PII detection using regex, PII scoring, and visualization with Plotly and Matplotlib. Outcome: Incorporated regex-ba
Finds security vulnerabilities in your Python dependencies. (Github Action)
proof of concept
-AI-Powered-Face-Recognition-Multi-Factor-Security-System-
A proof of concept of a programm to find the most efficient distribution of drills on ores in a 2d enviroment
Spring-Boot-Security
A repository for any code or results approves by Quorvo to be used as proof of concept.
Roblox The Strongest Battlegrounds Script Hack No Key Pastebin 2025 Keyless OP GUI Byfron Bypass Autofarm Mobile PC Anti-Ban Undetected 100% Cheat Exploit Executor Injector Download FPS Booster
(working title)
NW Hacks
proof of concept application
Proof of concept implementation of a GPU accelerated terminal
scada system
gta5 hacks hack cheat cheats x-ray ESP fly speed auto-build instant-mine god-mode teleport reach noclip fast-place scaffold infinite-health infinite-food radar fullbright anti-knockback chest-ESP player-ESP cave-finder speedmine auto-fish no-fall
Auto do tasks, use best banana, tapping, watch ads.
Proof of concept to explore MailKit in a practical and experimental way.
quack hacks
Our submission for Uoft Hacks 12
🚀Reverse Proxy Service: A lightweight Node.js application that routes incoming HTTP requests to a designated backend, effectively masking the target service's IP address.
valorant hacks hack cheat cheats x-ray ESP fly speed auto-build instant-mine god-mode teleport reach noclip fast-place scaffold infinite-health infinite-food radar fullbright anti-knockback chest-ESP player-ESP cave-finder speedmine auto-fish no-fall
Simulación de un método de securización en PostgreSQL
SpringSecurityStudy
GoatHacks 2025 hack! A research paper tracking Flask app inspired by Goodreads
PoC implementatie voor afstudeerstage
My favorite ad-server, telemetry and security blocklists.
SecurityPassword
spring-security-jwt
CloudQuest-Security
It connects directly to GitHub's platform using the user's GitHub Personal Access Token (classic), providing detailed insights into user activity across both public and private repositories. The API ensures high performance, security, and transparency, wi
Docker image for Duo Security Authentication Proxy with RADIUS support.
Scalable database designed for secure password management. It features user account management, customizable password generation rules, password history tracking, and categorization for organization, supporting over 100,000 entries with strong security st
NetworkSecurity
security_cw2
Cloudit automates compliance with evidence collection. Cloudit streamlines vulnerability tracking, audit workflows, and compliance reporting by gathering artifacts, comparing findings, and generating actionable plans—keeping your organization audit-ready
Hacker presentation for class IFT6164 on Practical Black-Box Attacks against Machine Learning
security-bot
backend app fisioterapia con spring security
LLM security agent capable of triaging vulnerabilities in source code using open source SAST/SCA
Homework reports for Information Security course taught by Tero Karvinen
SMS Spam Detection using NLP leverages natural language processing techniques to analyze and classify text messages as spam or legitimate. It enhances communication security by identifying patterns, keywords, and context in messages for effective and auto
Homework reports for Information Security course by Tero Karvinen
CyberSecurity_Imagine_Shirt
Network Security Laboratory Work Conducted in the Second Semester at NIT Jamshedpur, Master of Technology - Information Systems Security Engineering, Department of Computer Science and Engineering.
A modern email app for sending, receiving, and managing emails. Features include secure user authentication, real-time inbox updates, and email composition with subject and message details. Designed with robust data security and scalability, it offers an
An AI integrated project made with the core idea of food security in mind.
Information_Security Assihnments
Card Guard is a fraud detection application that analyzes credit card transactions stored in a PostgreSQL database. It applies machine learning and rule-based logic to identify fraudulent activities, providing a robust solution for financial security and
Homework reports for Information security course by Tero Karvinen (Spring 2025)
A task given by TriFork for my first interview as an AI developer. The task was to make a RAG chatbot proof of concept
boardgame/hacker-notebook-setup
security_frontend
Securely generate, store, and manage your passwords and passkeys with ease
A proof-of-concept home rentals application built with Apple platforms, Google Cloud, and graph-based technologies.
Youdemy is a platform built primarily with PHP and Hack. It aims to provide an educational experience similar to popular online learning platforms, offering various courses and learning materials.
UFRN_Security
(Work-in-progress) A cyber security roleplaying game
spring security using BCryptPasswordEncoder for encoding password
Take Control of Your Digital Sovereignty: Privacy, Anonymity, and Security in Your Hands
A handy repo 📂 for cybersecurity pros 🔍 and bug hunters 🐞, packed with small but powerful XSS payloads 💥 for testing vulnerabilities in HTML, JS, URL, and DOM 🌐. Perfect for web app testing 🕸️, security hardening 🔧, and ethical hacking practice 👨‍💻.
web-security
a platform for online courses with video streaming, quizzes, and progress tracking. Tech Stack: Spring Boot, Spring Security, Spring Data JPA, MySQL, Docker.
web-security-lab
A mirror of my NixOS Dotfiles repo which is more than just my system configs but also my mono repo of almost all the things I hack on.
Магистерская работа по кибербезопасности
Security for AI and AI for Security
Blockchain-Technology-using-Data-Security-and-Integrity-Audit-Scheme
Hardware hack session for Gophercon Singapore 2025
A starter kit for proof of concepts.
Network-Security-Project
ESP32-security-system
Juego de creación de mazos de estilo de roguelike de combate con el objetivo de acabar con el gran hacker y los bugs en el sistema.
63681-System-and-Network-Security
Recreating Leetr. A project originally created for Hack Western
Class Website for ECE239AS:Topics in Computer Network Measurement and Security
Personal blog part of app uses React for the frontend and SQLite for the backend. Blog content, including rich HTML (text, videos, etc.), is stored securely in the db.--safe from security risks from user-generated input b/c only site curator inputs blogs.
Personal Cyber Security Blog
Security-Headers-Scanner
CS 6102: Implementation Security In Cryptography by Prof. Sayandeep Saha
2025 up-to-date cathook training software for tf2 x32
part 2 of a series of labs/projects to learn AWS networking
Website security scanning
Jet Container Security Framework (JCSF)
Systematic Literature Review on Smart Contract Vulnerabilities
Educational purposes, security research, and testing your own networks for vulnerabilities.
A web security research tool for DOM testing
codehawks-security-learning
Proof of concept showing how two plotly animated plots (in this case, event logs of a simulation) can be triggered (almost) simultaneously
Security
🔬 Proof of Concept of Source Generators with .NET
A collection of custom scripts and tools for cybersecurity, showcasing automation, encryption, and security analysis capabilities.
For Classroom
database-cloud-security
Sleep Detection project is a project developed to detect different sleep phases while being memory efficent. This is designed to be mostly used in Bangle watches as a Proof of Concept.
OWASP Foundation web repository
Cyber-Security-Base-Project-1
📦 The Largest Collection of Pre-Compiled Linux Static Binaries for Soar: The Modern, Bloat-Free Distro-Independent Package Manager
These are Resource from Hack BI VIII workshops
h4ck for Fortnite provides powerful tools to elevate your gameplay. With features like aimbots, wallhacks, and resource generators, you can gain an edge over your opponents. Designed for both casual and competitive players, this hack enhances your Fortnit
BruteCryptoWallet is a specialized tool designed for brute force attacks on cryptocurrency wallets. It utilizes advanced algorithms to attempt to crack wallet passwords, enabling access to locked assets. Ideal for security researchers and ethical hackers,
Software to redirect http calls including security, logs and others feature not available on software target.
🔬 Proof of Concept of the MVC in PHP
Proof-of-Concept for Tribler v8 with xx Network Haven
proof of concept for crm backend services in python
Project currently under development for proof-of-concept.
Implementation of "Hack" Assembler, VMTranslator, Jack Compiler (Not Yet Implemented) In C#
Spatial analysis of food security with conflict, disaster, and fragility data
This repository updates latest Bug Bounty medium writeups every 10 minutes
A proof-of-concept persistent AI agent implementation
SpringBootSecurity
A proof of concept of wgpu-native bindings in Mojo.
CIS Ubuntu 24.04 - v1.0.0 - Ansible Role
CISO. Help for the Head of Information Security Department
security-manager-bot
🎒 An up-to-date collection of precompiled binaries and hacking scripts.
Materials for the "Open Source, Open Threats? Investigating Security Challenges in Open-Source Software" paper
This is a Chrome extension that allows you to modify request headers for all requests in a page. It can be useful for development, debugging and security testing.
🔬 Proof of Concept template repository for .NET
HSHacks is a 12-hour, in-person, hackathon powered by Hack Club, a nonprofit organization, to empower the next generation of coders.
A Small Large Language Model This repository contains a small-scale transformer-based language model with 70 million parameters, trained on 1.2 lakh tokens. Developed in Python, it uses self-attention for context understanding and text generation, serving
The Almightyhak Extension Scans page offers detailed virus scan results for APKs from Almightyhak Extensions, using VirusTotal to check for security threats. It provides specifics like file name, hash, and scan outcomes, with language filters for easy nav
Malicious IP List and AbuseIPDB scripts
Integrates Spring Boot v3 with IBM Cloud Secrets Manager for secure keystore retrieval. This repository ensures enhanced security in production-grade applications through efficient secret management.
A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有14wPOC,已校验有效性并去重)
Security and compliance management
Hacking GitHub contributions map thingie to display a message over the course of a year.
This is me practicing for cyber security
Set of scripts that will be useful for bug hunters
Contains proof of concepts and various code snippets
This project aims to scale the Ethereum Name Service (ENS) by consolidating existing patterns and proofs of concept into a unified and production-ready codebase.
SEAL 911 is a project designed to give users, developers, and security researchers an accessible way to connect with a small group of highly trusted security professionals in case of emergency.
Public repository for accessing information on the Shiftkey GenAi Hacks
Realtime secret and configuration management tool, with the best in class security and seamless integration support
A distributed honeypot for monitoring large scale web attacks
Exercise from the course Security and Robustness in ICT Systems.
All my personal IT notes and proof-of-concept projects.
The Binary Code Recognition Library for game hacking/modding and function reidentification for linux
This provides a proof of concept for Okta integration in Go
CIS Ubuntu 22.04 - v2.0.0 - Ansible Role
Northern Lights development repository. Pull requests are not yet accepted
Proof of concept UI library to investigate Angular UI issues for HoSE
Open Geoservice scraper proof of concept to extract info of each dataset contained in an OGC compliant Geoservice
Connecting secrets' security with random's versatility
My Red Team Notes, Notes from years ago and new notes.
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
sammcj
Visual Studio Code extension that allows you to perform a web search for the selected text using your favorite search engines (add as many as you like, editable in extension settings). I wrote this as a proof-of-concept idea when teaching myself TypeScrip
Proof of Concept Tampermonkey Discord Token Logger: A demonstration tool to highlight the vulnerability of Discord accounts by logging user tokens.
CRUSTDE - Containerized Rust development environment - Hack Without Fear and Trust! (2024-03)
Attack surface detector that identifies endpoints by static analysis
Tool to find common vulnerabilities in cryptographic public keys
Basic security backend including user management and some general utilities for ASP.NET Core applications
A feature-rich Hacker News client.
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
BadRobot - Operator Security Audit Tool
OpenZeppelin Contracts written in Cairo for Starknet, a decentralized ZK Rollup
ansible playbooks with roles to setup client or server. with security related parts
Portfolio Website
FirmwareDroid is an analysis framework for Android firmware and Apps.
A Go library for interacting with Myra Security API.
Common go library shared across sigstore services and clients
Browser extension for console monitoring, tab recording, Content Security Policy (CSP) disabling, and JavaScript/CSS injection
Coverage-guided, in-process fuzzing for the JVM
Proof of concept ranged integers in Rust.
MyAccounts is a simple accounts database manager for Android.
Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities required for efficient Vulnerability Assessment and Pe
Provision strong AWS security policies easily using the AWS CDK, v1 or v2.
Desktop Bitcoin Wallet focused on security and privacy. Free and open source.
Proof-of-concept of using Metal in SwiftUI
Catalog of security breaches
Homebridge plugin that creates a security system accessory that can be triggered by HomeKit sensors.
A toolbox based on powsybl framework dedicated to power systems coordinated capacity calculation and security analysis projects
Find secrets with Gitleaks 🔑
The thing for hack club? I don't know what exactly is going to happen to this, but I hope it works.
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
Security extensions for openstack
GlobaLeaks is a free and open-source whistleblowing software enabling anyone to easily set up and maintain a secure reporting platform.
A compilation-friendly fexpr language. (Proof of concept.)
CVE-2024-10936 -- The String locator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated at
CVE-2024-12005 -- The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenti
CVE-2024-12104 -- The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpf_delete_file and wpf_delete_file functions in all versions up to, and incl
CVE-2024-13404 -- The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'searchll' parameter in all versions up to, and including, 7.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthent
CVE-2024-13536 -- The 1003 Mortgage Application plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.87. This is due the /inc/class/fnm/export.php file being publicly accessible with error logging enabled. This makes it possibl
CVE-2024-45091 -- IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.24, 7.1 through 7.1.2.10, and 7.2 through 7.2.3.13 stores potentially sensitive information in log files that could be read by a local user with access to HTTP request logs.
CVE-2024-6466 -- NEC Corporation's WebSAM DeploymentManager v6.0 to v6.80 allows an attacker to reset configurations or restart products via network with X-FRAME-OPTIONS is not specified.
CVE-2025-0371 -- The JetElements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 2.7.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possi
CVE-2025-23086 -- On most desktop platforms, Brave Browser versions 1.70.x-1.73.x included a feature to show a site's origin on the OS-provided file selector dialog when a site prompts the user to upload or download a file. However the origin was not correctly inferred in
CVE-2025-23184 -- A potential denial of service vulnerability is present in versions of Apache CXF before 3.5.10, 3.6.5 and 4.0.6. In some edge cases, the CachedOutputStream instances may not be closed and, if backed by temporary files, may fill up the file system (it appl
CVE-2024-13176 -- Issue summary: A timing side-channel which could potentially allow recovering
CVE-2024-13454 -- Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3
CVE-2024-13524 -- A vulnerability has been found in obsproject OBS Studio up to 30.0.2 on Windows and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path. The attack needs to be approached l
CVE-2024-22347 -- IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2024-22348 -- IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited t
CVE-2024-22349 -- IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 allows web pages to be stored locally which can be read by another user on the system.
CVE-2024-45647 -- IBM Security Verify Access 10.0.0 through 10.0.8 and IBM Security Verify Access Docker 10.0.0 through 10.0.8 could allow could an unverified user to change the password of an expired user without prior knowledge of that password.
CVE-2024-51738 -- Sunshine is a self-hosted game stream host for Moonlight. In 0.23.1 and earlier, Sunshine's pairing protocol implementation does not validate request order and is thereby vulnerable to a MITM attack, potentially allowing an unauthenticated attacker to pai
CVE-2025-0479 -- This vulnerability exists in the CP Plus Router due to insecure handling of cookie flags used within its web interface. A remote attacker could exploit this vulnerability by intercepting data transmissions during an HTTP session on the vulnerable system.
CVE-2025-0576 -- A vulnerability was found in Mobotix M15 4.3.4.83 and classified as problematic. This issue affects some unknown processing of the file /control/player?center&eventlist&pda&dummy_for_reload=1736177631&p_evt. The manipulation of the argument p_qual leads t
CVE-2025-0578 -- A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107. It has been classified as problematic. Affected is an unknown function of the file /account/forgotpassword of the component Password Reset Handler. The manipulation of the argument re
CVE-2025-0579 -- A vulnerability was found in Shiprocket Module 3/4 on OpenCart. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php?route=extension/shiprocket/module/restapi of the component REST API Module.
CVE-2025-0580 -- A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The
CVE-2025-0581 -- A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. This affects an unknown part of the file /chat/group/send of the component Chat History. The manipulation of the argument message leads to cross site scr
CVE-2025-0582 -- A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be
CVE-2025-0583 -- The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
CVE-2025-0584 -- The a+HRD from aEnrich Technology has a Server-side Request Forgery, allowing unauthenticated remote attackers to exploit this vulnerability to probe internal network.
CVE-2025-0585 -- The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
CVE-2025-0586 -- The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution.
CVE-2025-0590 -- Improper permission settings for mobile applications (com.transsion.carlcare) may lead to
CVE-2025-22131 -- PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
CVE-2025-22620 -- gitoxide is an implementation of git written in Rust. Prior to 0.17.0, gix-worktree-state specifies 0777 permissions when checking out executable files, intending that the umask will restrict them appropriately. But one of the strategies it uses to set pe
CVE-2025-23044 -- PwnDoc is a penetration test report generator. There is no CSRF protection in pwndoc, allowing attackers to send requests on a logged-in user's behalf. This includes GET and POST requests due to the missing SameSite= attribute on cookies and the ability t
CVE-2025-23214 -- Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. By monitoring the error code returned in the login, it is possible to figure out whether a user exist or not in the d
CVE-2025-23218 -- WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_especie.php endpoint. This vulnerability allows a
CVE-2025-23219 -- WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_cor.php endpoint. This vulnerability allows attac
CVE-2025-23220 -- WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_raca.php endpoint. This vulnerability allows atta
CVE-2025-23221 -- Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. This vulnerability allows a user to maneuver the Webfinger mechanism to perform a GET request to any internal resource on any Host, Port, URL com
CVE-2025-24010 -- Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vu
CVE-2025-24013 -- CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functi
CVE-2025-24014 -- Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the f
CVE-2025-24337 -- WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.
CVE-2024-38337 -- IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow an unauthorized attacker to retrieve or alter sensitive information contents due to incorrect permission assignments.
CVE-2024-41742 -- IBM TXSeries for Multiplatforms 10.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a d
CVE-2024-41743 -- IBM TXSeries for Multiplatforms 10.1 could allow a remote attacker to cause a denial of service using persistent connections due to improper allocation of resources.
CVE-2024-41783 -- IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.
CVE-2024-45652 -- IBM Maximo MXAPIASSET API 7.6.1.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
CVE-2024-45653 -- IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system.
CVE-2024-45654 -- IBM Security ReaQta 3.12 could allow an authenticated user to perform unauthorized actions due to reliance on untrusted inputs.
CVE-2024-8722 -- The Import any XML or CSV File to WordPress PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.9.7 due to insufficient input sanitization and output escaping. This makes it po
CVE-2025-0561 -- A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initia
CVE-2025-0562 -- A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The
CVE-2025-0563 -- A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the a
CVE-2025-0564 -- A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The
CVE-2025-0565 -- A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The explo
CVE-2025-0566 -- A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to in
CVE-2025-0567 -- A vulnerability classified as problematic was found in Epic Games Launcher up to 17.2.1. This vulnerability affects unknown code in the library profapi.dll of the component Installer. The manipulation leads to untrusted search path. Attacking locally is a
CVE-2025-0575 -- A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure. The attack need