Finding the origin IP address. Learn how to find the origin IP addressā€¦ | by loyalonlytoday | Feb, 2025 | InfoSec Write-ups
THM ā€” Lookup. Test your enumeration skills on thisā€¦ | by Dfaults | Feb, 2025 | InfoSec Write-ups
$100 worth Open Redirect Automation | by It4chis3c | Feb, 2025 | InfoSec Write-ups
Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
The Cyber Guardian: PAMā€™s Role in Shaping Leadership Agendas for 2025 | Syteca
SANS 2025 | Cyber Security Training in Orlando, FL
Phishing, Impersonation: CISO Insights on 2023-2024 External Threats
Phishing campaign exploits Webflow CDN to steal credit card data
SIO linked to Android malware disguised as popular apps
US releases BTC-e operator in prisoner exchange with Russia
Mongoose ODM critical RCE flaws detailed, PoC exploits revealed
Bybit Hack: $1.4B Stolen from World's 2nd Largest Crypto Exchange
Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship
Google Chrome disables uBlock Origin for some in Manifest v3 rollout
SpyLend Android malware downloaded 100,000 times from Google Play
Hacker steals record $1.46 billion from Bybit ETH cold wallet
Finding SACL Tripwires During Red Team Ops | Posts By SpecterOps Team Members
Inside Black Bastaā€™s Exposed Internal Chat Logs: A Firsthand Look | by Suyesh Prabhugaonkar (susapr) | Feb, 2025 | Medium
From a Steward Security Gaurd to a Cybersecurity Startup Founder! | by AjakCybersecurity | Feb, 2025 | Medium
Data Leak Exposes TopSec's Role in China's Censorship-as-a-Service Operations
Apple Drops iCloud's Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
Apple pulls iCloud end-to-end encryption feature in the UK
CISA flags Craft CMS code injection flaw as exploited in attacks
Salt Typhoon Exploited Cisco Devices With Custom Tool
Mobile phishing attacks on the rise
Purported Black Basta internal communications exposed
Actively exploited Microsoft Power Pages flaw patched
B1ackā€™s Stash released 1 Million credit cards -
Chinese Hackers from Salt Typhoon Deploy Custom Malware in US Telecom Cyberespionage Campaign - Security Spotlight
CISA and FBI Report Ghost Ransomware Breached 70 Countries - Security Spotlight
Darcula PhaaS 3.0 Can Now Auto-Generate Phishing Kits for Any Brand - Security Spotlight
This Week In Cybersecurity: 17th February to 21st February - Security Spotlight
Black Basta Ransomware Data Leak Exposes Internal Communications and Targets - Security Spotlight
Security and privacy concerns challenge public sector's efforts to modernize
Cybercriminals Can Now Clone Any Brand's Site in Minutes Using Darcula PhaaS v3
DoD Contractor Pays $11.2M over False Cyber Certifications Claims
Novel malware leveraged in Salt Typhoon attacks against US telcos
BlackBasta Ransomware Chatlogs Leaked Online
Skyrocket Your Bug Bounty Success Using These Crawlers | by Ott3rly | InfoSec Write-ups
AI-Powered Deception is a Menace to Our Societies
Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
Microsoftā€™s Quantum Chip Breakthrough Accelerates Threat to Encryption
Atlassian fixed critical flaws in Confluence and Crowd
Versa Sovereign SASE enables organizations to create self-protecting networks
OpenText unveils AI-powered threat detection and response capabilities
Symbiotic Security improves software vulnerability detection in the coding process
CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
Mastering the cybersecurity tightrope of protection, detection, and response
Hudson Rock Drops BlackBastaGPT: Built from 1M Internal Messages Leaked from Black Basta Ransomware Group
How to secure Notes on iOS and macOS
New infosec products of the week: February 21, 2025
Mastering Multi-Cloud Security: Strategies to Overcome Challenges & Maximize Protection | by Sudha | Feb, 2025 | InfoSec Write-ups
Setting up Malware Analysis Lab ā€” Part 1 | by Ghostploit | Feb, 2025 | InfoSec Write-ups
ā‚¹1,000 in 10 mins: BookMyShowā€™s Open redirect bug! | by Vivek PS | Feb, 2025 | InfoSec Write-ups
Escape | VulnLab ā€” Ever Heard of Windows Kiosk Mode? No? Well, Itā€™s Time to Learn! | by Mohamed Eletreby | Feb, 2025 | InfoSec Write-ups
Revamped darcula phishing kit impersonates sites with just a link
Salt Typhoon used custom malware JumbledPath to spy on U.S. telecom providers
Apiiro unveils free scanner to detect malicious code merges
Black Basta ransomware gang's internal chat logs leak online
Ghost ransomware actors compromised victims in more than 70 countries
US healthcare org pays $11M settlement over alleged cybersecurity lapses
Efficiency? Security? When the quest for oneĀ grants neither.
Cayuga Medical Center Suffers Cyberattack, Operations Temporarily Disrupted - Security Spotlight
NailaoLocker Ransomware Targets EU Healthcare Sector in a Cyberattack - Security Spotlight
The Rise of AI Agents: A New Era of AI Cyberthreats - Security Spotlight
Australian Fertility Services Giant Genea Hit by Major Security Breach - Security Spotlight
New FrigidStealer Malware Infects macOS via Fake Browser Updates
NailaoLocker ransomware targets EU healthcare-related entities
Cybersecurity jobs available right now in the USA: February 20, 2025
Chinese hackers use custom malware to spy on US telecom networks
Malicious Ads Target Freelance Developers via GitHub
Cyberattack compromises leading Australian IVF providerā€™s data
Google Docs tapped by ACRStealer malware for C2
Most impactful cyberattacks linked to vulnerable edge devices
West Coast Cybersecurity Salaries Outshine Rest of Country
Weaponized Complexity: How AI is Supercharging Cyber Threats
Mobile Phishing Attacks Surge with 16% of Incidents in US
Hunting for CVE-2023-29489. Beware of honeypots as well while CVEā€¦ | by AbhirupKonwar | Feb, 2025 | Cyber Security Write-ups
How i found 3 Bugs in 10 minutes || Easy bug #5 $$$ | by Mehboob Khan | Feb, 2025 | System Weakness
HTB ā€” Titanic. Titanic is an Easy Linux machine on HTBā€¦ | by Ievgenii Miagkov | Feb, 2025 | Medium
Top 10 Tools Every Bug Bounty Hunter Must UsešŸš€ | by Abhijeet kumawat | Feb, 2025 | Medium
PowerShell Exploits ā€” Modern APTs and Their Malicious Scripting Tactics | by Hossam Ehab | Feb, 2025 | Medium
Clinical Research Firm Exposes 1.6 Million US Medical Survey Records
PRevent: Open-source tool to detect malicious code in pull requests
Runa Assure provides end-to-end fraud protection
Integrating LLMs into security operations using Wazuh
Microsoft fixes Power Pages zero-day bug exploited in attacks
Weathering the storm: In the midst of a Typhoon
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide
Microsoft testing fix for Windows 11 bug breaking SSH connections
Over 330 Million Credentials Compromised by Infostealers
Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws
Citrix addressed NetScaler console privilege escalation flaw
Microsoft fixed actively exploited flaw in Power Pages
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
PCI DSS 4.0 Mandates DMARC By 31st March 2025
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
Hackers pose as employers to steal crypto, login credentials
Darcula PhaaS can now auto-generate phishing kits for any brand
Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
Menlo Security acquires Votiro to boost data security for enterprises
Norton's AI-powered features defend against scams and social engineering threats
Privacera enables enterprises to identify, assess, and remediate AI-related risks
1Password helps MSPs boost security and streamline their operations
Have Your Usersā€™ Credentials Been Leaked on The Dark Web?
CISA and FBI Warn of Global Threat from Ghost Ransomware
Lumu Playback strengthens threat detection
New NailaoLocker ransomware used against EU healthcare orgs
How easy is it to earn from bug bounties? The truth behind ethical hacking rewards | by Vivek PS | Feb, 2025 | InfoSec Write-ups
LFI Advanced Methodology by AbhijeetšŸ”„ | by Abhijeet kumawat | Feb, 2025 | InfoSec Write-ups
Active Directory Exploit Basics: SMBClient | by enigma_ | Feb, 2025 | InfoSec Write-ups
Enhance your Incident Investigation and Response capabilities with Palo Alto Cortex XDR. | by K O M A L | Feb, 2025 | InfoSec Write-ups
Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks
300% increase in endpoint malware detections
Unknown and unsecured: The risks of poor asset visibility
The Challenge of Remote File Transfer Security: Is Centralization the Answer?
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
Australian Infrastructure Faces 'Acute' Foreign Threats
Russia-linked APTs target Signal messenger
Insight Partners, VC Giant, Falls to Social Engineering
Russian Groups Target Signal Messenger in Spy Campaign
CISA and FBI: Ghost ransomware breached orgs in 70 countries
Phishing attack hides JavaScript using invisible Unicode trick
Australian fertility services giant Genea hit by security breach
New FrigidStealer infostealer infects Macs via fake browser updates
Deepwatch Acquires Dassana to Boost Cyber Resilience With AI
WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
Finastra Notifies Customers of Data Breach
Sophos Firewall v21 MR1 is now available
Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes
BlackLock Ransomware: A Rapidly Rising Cyber Threat - Security Spotlight
Latvian Document Management System Leak Exposes 25 Million Records - Security Spotlight
MacOS Malware FrigidStealer Employ Sophisticated Web Injection Attacks - Security Spotlight
OpenSSH Flaws Expose SSH Servers to Critical DoS Attacks and MiTM Vulnerabilities - Security Spotlight
Venture Capital Giant Insight Partners Hit by Cyber Attack - Security Spotlight
Hackers Tricking Users Into Linking Devices to Steal Signal Messages
iOS 18 settings to lock down your privacy and security
Patch Now: Palo Alto Flaw Exploited in the Wild
New WinRAR version strips Windows metadata to increase privacy
Palo Alto Networks tags new firewall bug as exploited in attacks
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground
The Board's Role in Cyber-Risk Management in OT Environments
Australian IVF Clinic Suffers Data Breach Following Cyber Incident
How I Found an ATO in a Public Program in Hackerone | by Khaled Ahmed | Feb, 2025 | Medium
Inside Agodaā€™s Bug Bounty Program: How We Stay Ahead of Cyber Threats | by Agoda Engineering | Agoda Engineering & Design | Feb, 2025 | Medium
Free VPS for penetration testing and bug bounty part 2 | by loyalonlytoday | Feb, 2025 | InfoSec Write-ups
Footprints 4.0: Finding Your Path ā€” AI in Cybersecurity and the Journey of Discovery | by AICVS Cummins | Feb, 2025 | Medium
BlackLock ransomware on the rise, report finds
More advanced Snake Keylogger variant emerges
Novel FrigidStealer macOS malware spread via bogus browser updates
Venture capital firm Insight Partners discloses security breach
CardinalOps expands Threat Exposure Management platform
Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response
Spies Eye AUKUS Nuclear Submarine Secrets
OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
10 Best LMS SaaS Platforms for Scalable Online Learning
How Blockchain Games Ensure Transparency and Fairness
Echoworx launches Manage Your Own Keys feature powered by AWS
Free VPS for penetration testing and bug bounty part 2 | by loyalonlytoday | Feb, 2025 | InfoSec Write-ups
How I Earned a Hall of Fame Spot at UNESCO by Bypassing 403 Forbidden | by Krunal Patel | Feb, 2025 | InfoSec Write-ups
I Hacked FIDE.com ā€” Call me Hacknus Carlsen! | by Vivek PS | Feb, 2025 | InfoSec Write-ups
OTP Login Rate Limit Bypass ā€” The Easiest Bug for Beginners to Discover | by Vivek PS | Feb, 2025 | InfoSec Write-ups
Unverified Email Change Flaw on Apps.Target.com: A Sneaky Account Takeover Trick | by JEETPAL | Feb, 2025 | InfoSec Write-ups
Hong Kong: 96,000 ETAXI data exposed in unsecured Google storage. | by chum1ng0 | Feb, 2025 | Medium
Cooking Jollof Rice and Analyzing Security Risks: Why Standardization Matters | by Oshamndubisi | Jan, 2025 | Medium
You Should Really Take Care of ā€œThat Old Email Addressā€ā€¦ Itā€™s Time. | by Will Keefe | Feb, 2025 | Medium
Iā€™ve Interviewed Thousands of Cybersecurity Professionals ā€” Hereā€™s My Best Advice | by Taimur Ijlal | Jan, 2025 | AWS in Plain English
Donā€™t Trust Gmail in 2025. Top Alternatives to Consider Now | by Anshul Kumar | Bouncinā€™ and Behavinā€™ Blogs | Jan, 2025 | Medium
chmod 777 future.sh. Because Someone Has to Tell AI Whenā€¦ | by Hayden Baillio | Feb, 2025 | Medium
The Ultimate MSP Guide to Structuring and Selling vCISO Services
Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials
Russian phishing campaigns exploit Signal's device-linking feature
Cyber Investor Insight Partners Suffers Security Breach
Russian State Hackers Target Signal to Spy on Ukrainians
HTMLI to ATO leads to $$$ bounty šŸ¤‘ | by cryptoshantšŸ‡®šŸ‡³ | Feb, 2025 | InfoSec Write-ups
Explore topics
Medium
Medium: Read and write stories.
CTO at NCSC Summary: week ending February 23rd
- YouTube
Open Congress
Apple refuses UK demand for an encryption backdoor
- YouTube
Exploring OpenSSH's Agent Forwarding RCE (CVE-2023-38408) - vsociety
- YouTube
PrivacyEngine Phishing Quiz
- YouTube
B1ack's Stash Leaks 1 Million Credit Cards in Dark Web Giveaway
Probe Security Without Identification | OONI
Apple has stopped offering end-to-end encrypted iCloud backups in the UK due to a legal order.
Removing Jeff Bezos From My Bed Ć¢Ā—Ā† Truffle Security Co.
Apple pulls data protection tool after UK government security row
Apple pulls data protection tool after UK government security row - BBC News
Bettercap on Android: A Portable Network Security Toolkit
Russian hackers target Signal accounts in growing espionage effort
Home - CIS2025 - Cybersecurity & Identity Summit (CIS)
- YouTube
BloodHound: Red Team Tool for Active Directory Enumeration
Data Subject Access Rights (DSAR) Statistics | PrivacyEngine
Apple currently only able to detect Pegasus spyware in half of infected iPhones
GitHub - RoseSecurity/Red-Teaming-TTPs: Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Top Hacking Tools and Skills You Need to Learn in 2025 | by Very Lazy Tech šŸ‘¾ | Jan, 2025 | OSINT Team
New threats, social engineering tactics force cyber resiliency rethink - SiliconANGLE
Unpacking Handala - Direct Download - OP INNOVATE
How to Backdoor Large Language Models - by Shrivu Shankar
Bounty Prompt: AI-Powered Burp Suite extension ā€“ Bounty Security
Low Communication Threshold Fully Homomorphic Encryption w/ Alain PasselĆØgue Ā· Luma
Googleā€™s new policy tracks all your devices with no opt-out | Digital Trends
Threads
DeceptiveDevelopment targets freelance developers
Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand - Help Net Security
300% increase in endpoint malware detections - Help Net Security
Russian hackers find ways to snoop on Ukrainian Signal accountsĀ  ā€“ POLITICO
PlushDaemon APT: Supply Chain Attack on IPanyVPN
GitHub - roger1337/JDBG: Java Runtime Reverse Engineering and Debugging Tool
Cellular Security | Florida Institute for Cybersecurity Research
Trump DOGE layoffs: Project 2025 proposed attacking election security. The administration is doing it.
Campagne de phishing : Les dĆ©cideurs sont-ils vulnĆ©rablesĀ ? - Hackmosphere
An inside look at NSA (Equation Group) TTPs from Chinaā€™s lense
Russia-aligned hackers are targeting Signal users with device-linking QR codes - Ars Technica
NIST Announces the End of RSA and ECDSA | Joseph Bugeja
FHE.org 2025 Conference - Sofia šŸ‡§šŸ‡¬ Ā· Luma
How to prove false statements? (Part 3) ā€“ A Few Thoughts on Cryptographic Engineering
- YouTube
Las Vegas Couple Behind the ā€˜MrsFeelGoodā€™ Darknet Storefront Sentenced to Federal Prison in D.C.
- YouTube
Kimsuky Impersonates the Embassy of Japan in the United States | by Scarlet Shark | Feb, 2025 | Medium
Achieving RCE in famous Japanese chat tool with an obsolete Electron feature - GMO Flatt Security Research
CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
Authorization for non-human identities with Cerbos | Cerbos
A Signal Update Fends Off a Phishing Technique Used in Russian Espionage | WIRED
- YouTube
- YouTube
Ivanti Endpoint Manager Vulnerabilities: Critical CVEs & Exploit Details
Small hack tools
Hack Canada 2025
computer_security_tasks_python
Red Team C2 and Post Exploitation Code c2, offensive-security, post-exploitation, python3, redteam
DeepEYE is an AI-powered video surveillance system that detects anomalies in real-time using deep learning. It enhances security by identifying suspicious activities in live camera feeds.
Proof of Concept - Secure Mobile App with React, Ionic and Keycloak
Proof of Concept - Secure Mobile App with Angular, Ionic and Keycloak
Big companies have expensive security tools, but small businesses canā€™t afford them. A free, open-source cybersecurity scanner could protect millions of small businesses from attacks.
Repository for the gcp-kubernetes project in gcp-kubernetes
Hack Canada 2025
Material de Estudos em Ciber Security
Unified-CyberSecurity
SpringSecurity-JWT
proof of concept of nextjs with redux-toolkit
Proof of concept
Spring Security + JWTė„¼ ģ“ģš©ķ•œ ģžģ²“ Login & OAuth2 Login
proof of concept devcontainer for openrtx
A platform that provides customized protein solutions for individuals, PTā€™s Poc(Proof of concept)
School assignment representing a fake password checker that could have security flaws built in
Automated Ad Campaign Builder & Analytics Dashboard ā€“ MVP Proof-of-Concept for High-Quality Lead Generation
A proof of concept using playwright and dotnet
A proof-of-concept demonstrating secure secret management in Kubernetes using HashiCorp Vault, implemented with Go 1.22 and the Fiber framework. This project showcases best practices for managing both cluster-level and application-level secrets in a Kuber
Securityp1
Here is a Proof-of-Concept (PoC) in Python using Scapy to simulate a VLAN Hopping Double Tagging attack. This script creates and sends an Ethernet packet with double 802.1Q tagging, where the first tag (Outer VLAN 10) is stripped by a vulnerable switch, a
Hacking SONOFF , linking it with MQTT broker !
This is a proof of concept project to demonstrate
This is a proof of concept project to demonstrate
This is a proof of concept project to demonstrate
This is a proof of concept project to demonstrate
This is a proof of concept project to demonstrate
CyberSecurity
CSA5401---Computer-and-Internet-Security
This is a proof of concept project to demonstrate
A auth service using jwt based on spring security and vue
This is a proof of concept project to demonstrate
This demo serves as guide to create a Proof of Concept (POC) on building Full-stack Vanilla JS Web Application
Proof of concept - how to enhance Expense Management by using Continia Finance - G/L open entries.
This is a proof of concept project to demonstrate
Proof of Concept for CVE-2024-43583
A proof-of-concept AI assistant built with React Native for POC at Trybe, using RAG, reinforcement learning, and Market Basket Analysis to handle orders, provide product info, and deliver personalized recommendations.
This is a proof of concept project to demonstrate
Proof of concept: an interactive GraphQL API explorer
XSS-Exploit-Proof-of-Concept
This is a proof of concept project to demonstrate
This is a proof of concept project to demonstrate
Edunet Cyber Security Project of Secure_Data_Hiding_in_Image_Using_Steganography
This is a proof of concept project to demonstrate
security-visualization
Network Optimization Tool automates the analysis of Azure NSG flow logs, detects security threats, and visualizes insights to enhance network security.
Hacking-Course
Repository created to guide you thru others repositories, where you can check a few applications I created, as proof of concepts.
Yield based tracer for SWI-Prolog (proof-of-concept)
A collection of write-ups and solutions from my Hack The Box (HTB) lab challenges. This repository includes techniques, tools, and lessons learned as I worked through various labs, covering topics like penetration testing, exploitation, and cybersecurity
Hack The Chain 3.0
Report Server Proof of Concept
spring-security-ott
reactive_security_service
Wipro-Phase2-Day5-Spring-Security
JSON para simular API de validaĆ§Ć£o de hosts habilitados
Security Discord Bot (SDB)
A simple Python tool to fetch HTTP headers, check for missing security headers, and identify server technology of a target website.
Proof of Concept for CS490 @ CSUSM. Web development Capstone project.
Proof of concept - how to enhance Expense Management by using Continia Finance - G/L open entries.
Proof-of-concept modular implant platform leveraging v8
Proof of Concept project for Android App
The rest api integration using spring boot, authentication and authorization done with spring security basic auth which will be stored in the MySQL database.
This software is a proof-of-concept (PoC) of a VLAN Hopping attack based on DTP (Dynamic Trunking Protocol).
hack the chain 3
HacK KRMU 4.0
Proof of concept for university work on the software engineering 1 module (ECM3432)
certified-kubernetes-security
gh-security
Netdash is a proof-of-concept fullstack web application built to manage phone numbers via a UI used via omni-channel sales agents for large corporations. Inspired by Netcracker
Complete guide to using Simple-WebShell - A powerful PHP-based web shell tool for system administration and file management. Learn installation, usage, and security best practices.
3DMovementProofOfConcept
Deployeur is a lightweight, indie-hacker-friendly deployment tool designed to simplify CI/CD for shared hosting environments and small-scale projects
Working on proof of concept for capstone project
CVE-2023-1698 Proof of Concept (PoC)
Politicas de sguridad
SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
Cyber Security Tool Used for Detecting Boolean SQL Injection Attack.
This repository covers the fundamental concepts and principles of Operating Systems (OS). An operating system is crucial software that manages hardware resources and provides services for application programs. Topics include process management, memory man
Apache2 Egg for pterodactyl with Cloudflare Tunnel For Security Your Web Site
This tool is intended for ethical hacking and security assessment purposes only, to help identify and rectify vulnerabilities in systems
Secure SSH connection management CLI.
Hacking_Tools
Security-of-Mobile-Networks-Paper
This repository provides a comprehensive set of tools for the Sweet Bonanza slot game. Included are hack scripts, cheat features, and strategies designed to boost your profits and unlock free spins. Maximize your winnings and enhance your gameplay experie
CVZDRF is a cutting-edge encryption algorithm designed to enhance data security in applications and systems. It provides robust protection against cyber threats and unauthorized access, ensuring confidential information remains safe and secure.
php-pdf-proof-of-concept
The project developed an x86 VMM to run multiple guest OSes efficiently, ensuring resource allocation, isolation, and security. It supports JOS instances and enables inter-guest communication, advancing virtualization for multi-OS environments.
Bot that automates farming and clicker activities in Forgotten Runiverse game. Includes crypto integration and API support. Features Telegram support for managing the bot, and tools for hacks and cheats to optimize profit and enhance gameplay efficiency.
Network and Security Project Diagrams
Oliver-1 is a cutting-edge, innovative software project designed to revolutionize data encryption and security protocols. It boasts advanced encryption algorithms and customizable security features, making it an essential tool for safeguarding sensitive i
A proof of concept for a graphics library that "runs" on the server side but renders on the frontend.
proof of concept for inconsistent behavior of snackbars in Edge to Edge
CYBER-SECURITY-PROJECTS
This versatile **WordPress Cracker and Checker** tool validates login credentials, tests password lists silently, and categorizes results into `Good_WP.txt` and `Bad_WP.txt`, offering both credential checking and brute-force cracking capabilities.
API de Carteira Digital que permite realizar transferĆŖncias, gerenciar transaƧƵes e controlar saldo de usuĆ”rios. Desenvolvido com Java, Spring Boot, Spring Security, JWT, OAuth2, PostgreSQL, Lombok e Flyway para migrations. Utiliza Clean Architecture, Doc
CSA5403-Computer-and-Internet-Security
Web Security notes from Mehmet Ince
Computer-and-internet-security
Python demonstration of a secure symmetric encryption system. Features AES-256-GCM for authenticated encryption, PBKDF2 for robust key derivation, and comprehensive error handling.
A proof-of-concept (POC) real-time document store built on Cloudflare Workers and Durable Objects. Blaze provides a Firestore-like API for managing JSON documents with WebSocket-powered updates.
This is a portscanner I use for bug bounties/hack boxes
A Python-based tool that automates network security assessments through port scanning, service detection, and vulnerability checking via Exploit-DB. It identifies security weaknesses in target systems and generates detailed reports for efficient network s
Development of a (Trust Execution Enviroment) TEE-based scenario for system security management.
Proof of concept Jupyter Widget in xeusr
This is a proof-of-concept (PoC) chat application
API-SpringSecurity-JWT
MONSIF_SecurityTool
A proof-of-concept implementation exploring Large Language Model fine-tuning using Quantized Low-Rank Adaptation (QLoRA). This project demonstrates efficient fine-tuning of Microsoft's Phi-2 model for dialogue summarization tasks.
Hack 2 Skill Final Round Project
Hack for free!
Automating prompt injection attacks, jailbreak testing, and response analysis for LLMs.
AI-powered life hacks for everyday problems
Home-Security
Files i use for penetration tests, security assessments & bug bounty
PIT's hacker
CSA5403-Computer-Internet-Security
terraform-aws-securitygroup
A Gamevault admin panel proof of concept
This project enhances traditional image watermarking techniques by adapting them for video processing. It applies multiple layers of watermarking to improve security and prevent unauthorized duplication, including screen recording attacks. Note: This pro
CSA5403-Computer-and-Internet-Security-
Plugin/Tutorial implementation proof-of-concept for assignment #2!
PowerShell-Security-Tools
Hacking-Pack
java code for Lab practicals
PPT FOR CTRL+ALT+HACK NSUT
Hacker News API consumption in different platform
t,bellwright mod menu,bellwright infinity stamina,bellwright infinity health,bellwright cheat engine,bellwright cheat table,bellwright free hack,download bellwright hack,bellwright mod,bellwright mods,bellwright infinity money,bellwright cheat money,bellw
This GitHub repository contains cheats and hacks for enhancing gameplay in the popular RPG Baldur's Gate 3. Explore new ways to manipulate the game mechanics and make your journey through the Forgotten Realms more exciting.
Role-based authorization in Node.js & Express controls access using JWT authentication and middleware. Users have roles (admin, user), and middleware checks roles before granting access. Protected routes use authorize(["admin"]) to restrict access, ensuri
Modern cryptographic primitives & utilities with a focus on type safety, security, performance & best practices.
Computer-and-internet-security-CSA5403
passgen-toolkit: A versatile Python script to generate custom password lists based on various character sets and length options, including sequential number generation. Ideal for security testing and password cracking practice (use responsibly!).
CSA5403-Computer-Internet-Security
The NetSec-Generalist Palo Alto Networks Network Security Generalist certification is a valuable credential for IT professionals aiming to demonstrate their expertise in network security.
Computer and internet security
security-cases
terraform-aws-securitygroup
LAB programs
MajesticVPN is a powerful and reliable solution for your online security and privacy. With MajesticVPN you can browse the internet safely and anonymously, protecting your data from prying eyes and providing access to content blocked in your area.
A URL Scanner integration that scans a URL link to detect security threats
Computer-and-internet-security
Building an 8-bit-cpu as a proof of concept for verilog
security
A centralized API gateway that ensures secure authentication, rate limiting, and request routing across microservices. Supports both REST and gRPC protocols while enforcing security policies.
āœ… A repository for a network vulnerability scanning, threat detection, and security assessment project
OpenRDP offers a secure, web-based, and app-based RDP solution with end-to-end encryption. Access your desktop from anywhere with fast, seamless, and protected remote connections. Designed for performance and security, OpenRDP ensures safe and efficient r
Computer-and-Internet-Security
Proof of Concept (POC) for wrapping the submit function and UI component in a hook
Curso Servicios-Web-REST- Proyecto 08: API spring security Oauth2 y servicio que consume la API security
this paste exists only as a proof of concept and is not meant for anything but to show the extent to which open source intelligence can be used to gather information about a person of interest based on their (lack of) opsec. all info was gathered through
Security suite
Proof of concept end-to-end pipeline to ingest Coinbase trades, clean, run data quality checks and produce candles
Proof Of Concept
ProofOfConcepts
SECURITY_KEYCLOACK
Java Spring Boot implementation of a Service-to-Service Communication proof of concept (PoC). Weā€™ll create two services: Service A (Client) and Service B (Server). Service A will call Service B using REST APIs.
Bot that automates farming and clicker activities in Forgotten Runiverse game. Includes crypto integration and API support. Features Telegram support for managing the bot, and tools for hacks and cheats to optimize profit and enhance gameplay efficiency.
This is a Question/Answer bot built to query SQL as a proof of concept!
FiveM External Cheat is an external hack tool for FiveM that includes aimbot, ESP, Teleport, Exploit, and other features all managed through the ImGui interface.
Shield-Bash is a command-line suite of Bash scripts designed to enhance linux server security through automation.
AI generated proof of concept, use with caution
This versatile **WordPress Cracker and Checker** tool validates login credentials, tests password lists silently, and categorizes results into `Good_WP.txt` and `Bad_WP.txt`, offering both credential checking and brute-force cracking capabilities.
No description provided
Discover BHEH_PHP_SHELL, the Black Hat Ethical Hacking PHP Backdoor Shell v1.0, a custom PHP web shell for penetration testing. Learn how to deploy and use this tool responsibly for post-exploitation tasks.
Security-Monitoring-Project-on-AWS
simple topics of cyber security
IOT-based-Smart-Home-Security-prototype-using-alert-system
Comodo Internet Security Premium 2025 Crack is a free security application that provides complete security from virus attacks and hackers.
Quick proof-of-concept demonstrating real-time stock data via WebSockets in GO using simulated data.
My personal study notes for the Comptia Security+ Exam
A Proof of Concept for an HTML editor built with React.js using contenteditable.
App Store Connect Metrics export parser quickly hacked together.
Creation of an application for security in communication.
Monitoring-and-security-system-
Very simple proof of concept for K-means algorithm.
Keisatsu Shell Backdoor is a powerful PHP web shell/backdoor for authorized web exploitation and security testing. Discover its features, usage instructions, and ethical guidelines.
The proof of concept for the Sensory Vr Horror Game
This repository contains my write-ups for Hack The Box (HTB) challenges and machines. Each write-up provides a step-by-step guide on how I solved the challenges, including enumeration, exploitation, privilege escalation, and post-exploitation techniques.
hacking
This repository contains a Flask project with unit testing, performance testing, security auditing, and CI/CD integration using GitHub Actions.
login-spring-security
HexaShield is an AI-driven security assessment platform designed to streamline and enhance cybersecurity evaluations. It leverages advanced machine learning algorithms to identify vulnerabilities, assess risks, and provide actionable insights, making secu
End-to-End-AI-Cyber-Security-Assistant
A tool that performs network and web application vulnerability scans. It generates reports based on the scan results, identifying potential security risks and weaknesses.
ENHANCING-SECURITY-IN-BANKING-APPLICATIONS-THROUGH-IMAGE-ENCRYPTION-AND-DECRYPTION
SecurityManagementApp
of hands-on cybersecurity labs, SIEM analysis, and security investigations
A proof of concept tower defence game for mobile for my portfolio
Kappi7581 Ä°nstagram Hesap Ƈalma tool dĆ¼r
A cheap & easy solution to the security problem in JBD BMS
This repository contains a proof-of-concept (PoC) implementation of an event-driven architecture using AWS services.
A framework for balancing security and speed in CI/CD pipelines. A Shift-Left DevSecOps Approach implementation for OWASP Juice Shop using Azure DevOps. Final Year Project
This repository contains Helm configurations for deploying a monitoring system using Nginx, OpenTelemetry Collector, Splunk, and the ELK stack (Elasticsearch, Logstash, Kibana). The project serves as a proof of concept (POC) for setting up a comprehensive
A proof of concept to demonstrate the use of the Chromeleon SDK
Proof of Concept using Vercel Serverless Functions as an LINE Websocket API. Lightweight, scalable, and easy to deploy.
CLAIM - Agentic AI-powered insurance covering hacks, scams, and protocol failures.
zen-security
Scum Hack , Fortnite Hack, Enlisted Hack, Apex Legends Hack, Battlefield 2042 Hack, Battlefield 5 Hack, Battlefield 1 Hack, Cs2 Hack, Valorant Hack , Genshin Impact Hack , Honkai Star Rail Hack, Caliber Hack, Rust Hack, Last Epoch Hack, GTA5 Hack, Fivem H
AI-Powered Loan Risk Analysis System (Proof of Concept)
Kubernetes Webhook Demo: A project featuring a Go-based admission webhook that validates pod creation by enforcing required labels. It includes Docker containerization, Kubernetes manifests, and cert-manager integration for automated TLS certificate manag
azure-containerapps-security-poc
Exploratory data analysis and risk assessment on network traffic data, focusing on identifying security vulnerabilities and mitigation strategies.
SecurityJwtApp
Mastering Spring Core from the Ground Up! SpringRootX is a dedicated repository where I'll be updating Spring Core concepts one by one with real-world examples for better understanding. From IoC, DI, AOP, JDBC, ORM, MVC, to Spring Security, this repo co
Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others
Resilient-ready external token cacheable service Proof of concept
AWS learning journey. Documenting hands-on projects in IAM, S3 security, Tor, VPNs, and firewalls.
Security
This OSINT Dashboard is essentially a Web based Intelligence Gathering platform that allows users to collect and analyze publicly available information from multiple sources. It is primarily designed for Cybersecurity Professionals, Ethical Hackers and la
Network_Security
multi-level-security
This repository contains my practice projects and code snippets as I learn backend development using Node.js. I'm exploring various aspects of building scalable and efficient server-side applications, including RESTful APIs, database integration (using Mo
Hacker club criado pela comunidade do discord Soberana
Where I write proof of concepts in Java
This repository is my Cybersecurity Portfolio, showcasing hands-on projects in Linux, file permissions, network security, incident response, and scripting. Includes code, docs, and screenshots to demonstrate my skills. Explore my work! šŸ”’
love-authentication is a simple and secure authentication package designed for easy integration into your apps. It supports token-based authentication, follows best security practices, and works seamlessly with modern frameworks.
A rusty tiling window manager for X11. [ Proof of concept ]
A website for my security company
hacking
distributed system proof of concept / prototype
This repository contains resources to solve a proof of concept about data migration
Our Project for Calgary Hacks
Operating system security cource 2024-2025
Secure-Notes-App-with-Spring-Security
The voice of security
for testing security settings only
Integration of Security Orchestration, Automation, and Response (SOAR) with Endpoint Detection and Response (EDR)
Code I wrote for the Robot year 24-25. This includes all the proof of concepts and versions. Anything thats non-functional is noted as such.
cryptography-and-network-security
Data Wrangling Project - Securities Upload for Strong Oak Security Management
Skip the basic CRUDā€”this Backend Crash Course is all about building a production-ready Subscription Management System with real users, real money, and real business logic. You'll learn JWT authentication, database modeling, API architecture, security, aut
ComputerSecurityAttacks
security-check
Nuera Network: A next-generation Layer 1 blockchain combining quantum-resistant security, high-speed transactions, and cross-chain interoperability. Built for scalability, security, and the future of decentralized applications
Solutions for hacking smart contracts on TON
A comprehensive directory of security tools for bug bounty hunters and penetration testers. This project aims to provide a curated collection of open-source security tools to enhance your bug hunting workflow.
A collection of ethical hacking tools built with Python. This repository includes scripts for penetration testing, network scanning, password cracking, and more, designed for educational and ethical use only.
šŸ•·ļø | dezcrwl is a website osint history crawler gather hidden information and check vulnerabilities for extracted .js endpoints & much more!
This project is a Cyber Security Internship Project offered by Edunet Foundation that demonstrates the use of steganography to ensure confidentiality and secure communication.
Repository to store AMD's edk2 platform FW source. This code was developed to work with the AMD openSIL Proof-Of-Concept (POC) for Turin.
Repository to store AMD's edk2 FW source. This code was developed to work with the AMD openSIL Proof-Of-Concept (POC) for Turin.
šŸ“‚ A curated collection of cybersecurity texts, resources, and learning materials. This repository includes books, articles, research papers, courses, tools, and practical guides to help enhance cybersecurity knowledge. Contributions are welcome! šŸ”
The Certified in Cybersecurity (CC) Practice Quiz helps you prepare for the ISC2 CC certification exam. Test your knowledge across security principles, incident response, access controls, network security, and security operations. Customize quiz length, g
Repository to store build tools for AMD's edk2 platform FW source. These tools are intended to work with the AMD openSIL Proof-Of-Concept (POC) for Turin.
Hacking notes so good, even my firewall took notes.
CCS6314 Cryptography & Data Security Trimester 2430 Assignment
This Repository is designed to assist the Indian military in enhancing aerial surveillance, threat assessment, and strategic decision-making. The efficient and rapid identification of aircraft can help in monitoring border security, improving situational
Hackable launcher for macOS
sae_hacking
Just another malware database.
Visualize and inspect your npm dependencies.
Securityservices.github.io
Rofi-based tool render common security related templates to clipboard
This project is a Proof-of-Concept for a message-streaming distributed system that ensures consistency across configurable servers using the Raft algorithm, implemented in Go. Additionally, a simple Single-Page Application (SPA) is provided, encompassing
A hub for testing out security functionality and solutions using GitHub Actions.
This repository contains a hands-on workshop designed to help you learn how to implement and explore Istio Ambient Mode, a new approach to managing traffic and security in service meshes without requiring sidecars.
Code from lectures in my Spring 2025 "Hack Your Own Language" course
This repo is intended to help you deploy your own Trend Vision One Network Sensor (NDR)
Security Observability Framework for ML/AI Model File Loading
AIGraphCodeScan is a tool designed for performing security reviews of codebases using graph analysis.
Proof of Concept
Advanced firmware for M5Dial devices, enabling WiFi captive portals, SSID management, Karma attack tools, and BadUSB scripting for enhanced security testing and automation.
This project is a multi-user front-end Todo application designed to enhance mastery of client-server interactions in modern web development. The challenge focuses on managing asynchrony with async/await, adhering to REST architecture principles, ensuring
Developed an Online Voting System using Spring Boot, Spring Security, and MySQL, enabling secure user authentication and voting process management. Implemented REST APIs for seamless communication, with a Thymeleaf-based UI for user-friendly interaction
A mobile app that integrates with a machine learning model, implemented in Python, designed to detect skin cancer. User data, including medical records, is stored securely on a blockchain, ensuring the highest standards of security and privacy.
zhejiang_univ_hacking_project
Proof of concept for distributing tasks like virus scanning and file transfer using Hazelcast.
Home_Security_Application
CloudSecTools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers find the best resources for securing cloud environments.
A hack for Mark Rober's Crunchlabs Sand Garden Hackpack that converts an image (or even your voice) into a pattern that can be drawn in the sand.
CloakScan is a browser extension that enhances online safety by collecting and analyzing all links on a webpage. Using Docker containers for isolated security checks and ChatGPT for accurate link extraction, CloakScan detects suspicious or malicious links
A directory of who is who in #buildinpublic. Indie hackers, startup founders, and ambitious makers. Being built in public of course.
The official website of the National Security Framework of the Polar Regions
Zero-knowledge server for secure storage and transfer of E2E encrypted data.
Screen Lock Windows PERURI Security
spring-security-friday-talk
The proof of concept for the BrickMMO Roadview application
LLM-Assisted Secure Coding is a VS Code extension that helps developers test and validate code generated by Large Language Models (LLMs) for security vulnerabilities. It provides real-time feedback, addressing common security issues like input sanitizatio
Workflowy clone made in ImGui. Proof-of-concept of a real-time, inline-previewing Markdown editor. Proof-of-concept of a lazy repaint and animation system.
Repo for Copilot for Security plugins
RwandaPay is a secure and user-friendly digital wallet system designed to simplify and streamline money transfers, balance checks, and profile management. Built with the powerful Java Spring Boot framework and backed by a robust PostgreSQL/MySQL database,
Security course
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security
Gen 1 Fakemon Overhaul hack, this time with a new, custom region, using pokered-crysaudio as a base
RSAKeyVault contains two powerful tools for managing digital security. SecurePass allows users to securely generate, store, and manage passwords, while NeuroRSA enables the generation and management of RSA key pairs, offering encryption and decryption of
Proof of Concept project, to demonstrate the integration of the chosen tech stack to customers.
Fast fuzzy search proof of concept
A Proof Of Concept Digital Audio Workstation
A proof of concept implementation of WoW's GladiatorlosSA in Arche(R)age. It listens to the combat log and plays audio when certain skills appear. All hardcoded garbage right now but it's just a proof of concept to show this is possible without modding yo
Latest CVEs with their Proof of Concept exploits.
A scalable and customizable eCommerce platform with robust features, top-tier security, and community-driven support for businesses and developers.
Previous Proof of concept API
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand data transformation within the MD5 hashing algorithm
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand OS command injection due to improper sanitization of user inputs
Bear hack project
brasil eternity web site for the hackers the game
Fundamentals of Cyber Security course - Spring 2024
Unified EasyList hosts blacklist for use with DNS and domain blocking tools as pi-hole for the purpose of blocking bad domains used for serving ads, tracking, mining, malware and other nasty content.
security
Zinc is a web framework written in pure Zig with a focus on high performance, usability, security, and extensibility.
Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters
Repository for PokƩmon YAEEH. A ROM hack based on pokeemerald-expansion!
Script collection to enhance Linux security / initial configuration & automate install process
A proof of concept I hacked together to setup CI / CD testing of an autonomous racing stack
Open Security Controls Assessment Language Toolbox
A proof-of-concept Copy-And-Patch JIT compiler backend for Julia
Minigame instant complete, skip hacking process
Language server provider for the Firestore Security Rules language
The repository contains a proof of concept (POC). The POC demonstrates how a FHIR subscription can be used to inform about happened merges within the ISIK context.
Database security lecture contents
A multi module spring boot security project with OAuth2 Authorization Server
ai-security-app
Personal website and Java microservices project being a showcase of my skills
Hackerium Wiki | Offensive Cybersecurity Checklist
Known vulnerability scanning for your GitHub repository using CVE Binary Tool. This Action can scan binaries, component lists and SBOMs for known vulnerabilities and CVEs. It can generate SBOM component lists as well as reports in the Security Tab and i
A proof of concept tool to help you find the right `traffic_sign=*` tag as well as recommended tags for the road that it applies to.
It can be used to discover subdomains and other related domains
Really sucked at writing chemical equations, leave alone balancing. Really just trying to see if it's possible too have a program do it for me
CISA KEV Tracker
A collection of exploratory projects and experiments. Code snippets, proof-of-concepts, and works-in-progress for learning and testing new ideas. šŸ§ šŸ’”
OWASP Foundation Web Respository
WIP disassembly of Sonic the Hedgehog 2, targeting AXM68K (hacked ASM68K with Z80 macros)
(Proof of concept) A community mapping tool. Live: https://tairea.github.io/community-grid
Hello, Hacker!
Ant Chain SECURITYTECH SDK for Go
open source, cloud-native, graph-based asset inventory
TCM Security Academy Notes
éŗ¦å°¼ę”¶é“¶ē³»ē»Ÿļ¼šåŸŗäŗŽSpring Boot 2.7态Spring Security态MybatisPlus ļ¼ŒåŒ…含ē³»ē»Ÿē®”ē†ć€ę”¶é“¶å°ć€ä¼šå‘˜ē®”ē†ć€å•†å“ē®”ē†ć€č®¢å•ē®”ē†åŠŸčƒ½ć€‚
SecuritySnack data that doesn't fit into a single tweet.
Backup of custom tweaks & hacks in the /usr/local directory for Fedora Silverblue
Proof of Concept of using Istio to redirect traffic to custom plugin components
Mirror private Azure DevOps repositories to public Github repos to share know-how, proof of concepts, or other valuable content which would otherwise gather dust in your company.
Security Audit reports by BlockApex
Web-Security-Academy-Series
Cheat sheet for xonsh shell with copy-pastable examples. The best doc for the new users.
SSH-MITM - ssh audits made simple
felles bibliotek for sts
In this repository you can find stuff related to hack Facebook & Instagram. Disclaimer: This is only the proof of concept of my piece of code and only for educational purpose. So we are not responsible for any illegal use of this code.
Daily email digest of the best posts on Hacker News
Deploy custom push protections and policies on top of Git
Spring Security with JWT based authentication
Audit Composer dependencies for security vulnerabilities without using an external service.
Serverless Log Search Architecture for Security Monitoring based on Amazon Athena
The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware traffic from different geolocations.
Super Metroid Practice Hack
šŸ” Secure your cluster with TLS, numerous authentication backends, data masking, audit logging as well as role-based access control on indices, documents, and fields
A proof of concept using Kafka as a persistent source of configuration property updates.
YNaMi -> Why Not Me: Template project to help with future projects. It aims to provide a template with web layout, database, database migrations, testing, feature toggles, security etc.
OpenID Connect Library for Rust
:closed_lock_with_key: Server API to support End-to-End Encryption
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A slightly updated version of Romi's sprite tool for Super Mario World hacking
Secure Password Hashes for Python
Obfuscate string literals in JavaScript code.
Make comments management easier by applying some simple hacks.
Portable OpenSSH
Proof of concepts (Expect ugly code :D )
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Low code web framework for real world applications, in Python and Javascript
CVE-2023-4261 -- Rejected reason: This CVE ID is Rejected because the issue was not a vulnerability. The data field reported is not attacker controlled.
CVE-2024-12038 -- The Post Form ā€“ Registration Form ā€“ Profile Form for User Profiles ā€“ Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buddyforms_nav' shortcode in all versions up to, and
CVE-2024-12467 -- The Pago por Redsys plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'Ds_MerchantParameters' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possi
CVE-2024-13474 -- The LTL Freight Quotes ā€“ Purolator Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 2.2.3 due to insufficient escaping on the user supplied parameter and
CVE-2024-13798 -- The Post Grid and Gutenberg Blocks ā€“ ComboBlocks plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 2.3.5. This is due to insufficient verification on form fields. This makes it possible for unauthentic
CVE-2024-13873 -- The WP Job Portal ā€“ A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.8 via the deleteUserPhoto() function due to missing validat
CVE-2024-13899 -- The Mambo Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0 via deserialization of untrusted input via the $data parameter in the fImportMenu function. This makes it possible for authenticated at
CVE-2024-22341 -- IBM Watson Query on Cloud Pak for Data 4.0.0 through 4.0.9, 4.5.0 through 4.5.3, 4.6.0 through 4.6.6, 4.7.0 through 4.7.4, and 4.8.0 through 4.8.7 could allow unauthorized data access from a remote data source object due to improper privilege management.
CVE-2024-45674 -- IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11
CVE-2025-1509 -- The The Show Me The Cookies plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0. This is due to the software allowing users to execute an action that does not properly validate a value before runni
CVE-2025-1510 -- The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value
CVE-2019-8900 -- A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulner
CVE-2020-19248 -- SQL Injection vulnerability in PbootCMS 1.4.1 in parsing if statements in templates, resulting in a malicious user's ability to contaminate template content by searching for page contamination URLs, thus triggering vulnerabilities when the program uses ev
CVE-2020-6158 -- Opera Mini for Android before version 52.2 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate anothe
CVE-2024-10222 -- The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attack
CVE-2024-11260 -- The Events Manager ā€“ Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the active_status parameter in all versions up to, and including, 6.6.3 due to insufficient escaping on the user supplied parame
CVE-2024-12276 -- The Ultimate Member ā€“ User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to second-order SQL Injection via filenames in all versions up to, and including, 2.9.2 due to insufficie
CVE-2024-12452 -- The Ziggeo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ziggeo_event' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This m
CVE-2024-13235 -- The Pinpoint Booking System ā€“ #1 WordPress Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'language' parameter in all versions up to, and including, 2.9.9.5.2 due to insufficient escaping on the user supplied parameter and lack
CVE-2024-13314 -- The Carousel, Slider, Gallery by WP Carousel WordPress plugin before 2.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_htm
CVE-2024-13353 -- The Responsive Addons for Elementor ā€“ Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.6.4 via several widgets. This makes it possible for authenticated
CVE-2024-13379 -- The C9 Admin Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated
CVE-2024-13388 -- The TCBD Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbdtooltip_text' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attribut
CVE-2024-13455 -- The igumbi Online Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'igumbi_calendar' shortcode in all versions up to, and including, 1.40 due to insufficient input sanitization and output escaping on user supplied
CVE-2024-13461 -- The Autoship Cloud for WooCommerce Subscription Products plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'autoship-create-scheduled-order-action' shortcode in all versions up to, and including, 2.8.0 due to insufficient
CVE-2024-13537 -- The C9 Blocks plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.7.7. This is due the plugin containing a publicly accessible composer-setup.php file with error display enabled. This makes it possible for un
CVE-2024-13585 -- The Ajax Search Lite WordPress plugin before 4.12.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallo
CVE-2024-13648 -- The Maps for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'MapOnePoint' shortcode in all versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping on user supplied attributes.
CVE-2024-13672 -- The Mini Course Generator | Embed mini-courses and interactive content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mcg' shortcode in all versions up to, and including, 1.0.5 due to insufficient input sanitization an
CVE-2024-13713 -- The WPExperts Square For GiveWP plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the
CVE-2024-13751 -- The 3D Photo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'des[]' parameter in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated
CVE-2024-13818 -- The Registration Forms ā€“ User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.3.9 t
CVE-2024-13846 -- The Indeed Ultimate Learning Pro plugin for WordPress is vulnerable to time-based SQL Injection via the ā€˜post_idā€™ parameter in all versions up to, and including, 3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient prepar
CVE-2024-13883 -- The WPUpper Share Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.51. This is due to missing or incorrect nonce validation on the 'save_custom_css_request' function. This makes it possible f
CVE-2024-13900 -- The Head, Footer and Post Injections plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 3.3.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject PHP Code in
CVE-2024-38657 -- External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files.
CVE-2024-45673 -- IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores user credentials in configuration files which can be
CVE-2024-55156 -- An XML External Entity (XXE) vulnerability in the deserializeArgs() method of Java SDK for CloudEvents v4.0.1 allows attackers to access sensitive information via supplying a crafted XML-formatted event message.
CVE-2024-55159 -- GFast between v2 to v3.2 was discovered to contain a SQL injection vulnerability via the SortName parameter at /system/loginLog/list.
CVE-2024-57176 -- An issue in the shiroFilter function of White-Jotter project v0.2.2 allows attackers to execute a directory traversal and access sensitive endpoints via a crafted URL.
CVE-2024-9150 -- Report generation functionality in Wyn Enterprise allows for code inclusion, but not sufficiently limits what code might be included. An attacker is able use a low privileges account in order to abuse this functionality and execute malicious code, load DL
CVE-2025-0728 -- In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
CVE-2025-0838 -- There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass
CVE-2025-1001 -- Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modi
CVE-2025-1402 -- The Event Tickets and Registration plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'ajax_ticket_delete' function in all versions up to, and including, 5.19.1.1. This makes it possible for authentica
CVE-2025-1403 -- Qiskit SDK 0.45.0 through 1.2.4 could allow a remote attacker to cause a denial of service using a maliciously crafted QPY file containing a malformed symengine serialization stream which can cause a segfault within the symengine library.
CVE-2025-1406 -- The Newpost Catch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's npc shortcode in all versions up to, and including, 1.3.19 due to insufficient input sanitization and output escaping on user supplied attributes. This ma
CVE-2025-1407 -- The AMO Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's amoteam_skills shortcode in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attri
CVE-2025-1410 -- The Events Calendar Made Simple ā€“ Pie Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's piecal shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on us
CVE-2025-1470 -- In Eclipse OMR, from the initial contribution to version 0.4.0, some OMR internal port library and utilities consumers of z/OS atoe functions do not check their return values for NULL memory pointers or for memory allocation failures. This can lead to NU
CVE-2025-1471 -- In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs. Beginning in version 0
CVE-2025-1489 -- The WP-Appbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's appbox shortcode in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This make
CVE-2025-1535 -- A vulnerability was found in Baiyi Cloud Asset Management System 8.142.100.161. It has been classified as critical. This affects an unknown part of the file /wuser/admin.ticket.close.php. The manipulation of the argument ticket_id leads to sql injection.
CVE-2025-1536 -- A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manip
CVE-2025-1537 -- A vulnerability was found in Harpia DiagSystem 12. It has been rated as critical. This issue affects some unknown processing of the file /diagsystem/PACS/atualatendimento_jpeg.php. The manipulation of the argument codexame leads to sql injection. The atta
CVE-2025-1538 -- A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by this vulnerability is the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The ex
CVE-2025-1539 -- A vulnerability, which was classified as critical, has been found in D-Link DAP-1320 1.00. Affected by this issue is the function replace_special_char of the file /storagein.pd-XXXXXX. The manipulation leads to stack-based buffer overflow. The attack may
CVE-2025-1543 -- A vulnerability, which was classified as problematic, has been found in iteachyou Dreamer CMS 4.1.3. This issue affects some unknown processing of the file /resource/js/ueditor-1.4.3.3. The manipulation leads to path traversal. The attack may be initiated
CVE-2025-1544 -- A vulnerability, which was classified as critical, was found in dingfanzu CMS up to 20250210. Affected is an unknown function of the file /ajax/loadShopInfo.php. The manipulation of the argument shopId leads to sql injection. It is possible to launch the
CVE-2025-1546 -- A vulnerability has been found in BDCOM Behavior Management and Auditing System up to 20250210 and classified as critical. Affected by this vulnerability is the function log_operate_clear of the file /webui/modules/log/operate.mds. The manipulation of the
CVE-2025-1548 -- A vulnerability was found in iteachyou Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/archives/edit. The manipulation of the argument editorValue/answer/content leads to cross site script
CVE-2025-1555 -- A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. This vulnerability affects the function saveImage. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely.
CVE-2025-25282 -- RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list
CVE-2025-25505 -- Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the sub_452A4 function.
CVE-2025-25507 -- There is a RCE vulnerability in Tenda AC6 15.03.05.16_multi. In the formexeCommand function, the parameter cmdinput will cause remote command execution.
CVE-2025-25510 -- Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the get_parentControl_list_Info function.
CVE-2025-25604 -- Totolink X5000R V9.1.0u.6369_B20230113 is vulnerable to command injection via the vif_disable function in mtkwifi.lua.
CVE-2025-25605 -- Totolink X5000R V9.1.0u.6369_B20230113 is vulnerable to command injection via the apcli_wps_gen_pincode function in mtkwifi.lua.
CVE-2025-25765 -- MRCMS v3.1.2 was discovered to contain an arbitrary file write vulnerability via the component /file/save.do.
CVE-2025-25766 -- An arbitrary file upload vulnerability in the component /file/savefile.do of MRCMS v3.1.2 allows attackers to execute arbitrary code via uploading a crafted .jsp file.
CVE-2025-25767 -- A vertical privilege escalation vulnerability in the component /controller/UserController.java of MRCMS v3.1.2 allows attackers to arbitrarily delete users via a crafted request.
CVE-2025-25768 -- MRCMS v3.1.2 was discovered to contain a server-side template injection (SSTI) vulnerability in the component \servlet\DispatcherServlet.java. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
CVE-2025-25769 -- Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /controller/UserController.java.
CVE-2025-25770 -- Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /agency/AgencyUserController.java.
CVE-2025-25772 -- A Cross-Site Request Forgery (CSRF) in the component /back/UserController.java of Jspxcms v9.0 to v9.5 allows attackers to arbitrarily add Administrator accounts via a crafted request.
CVE-2025-25875 -- A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /message.php. The attack can use SQL injection to obtain sensitive data.
CVE-2025-25876 -- A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /delete.php. The attack can use SQL injection to obtain sensitive data.
CVE-2025-25877 -- A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /admin.php. The attack can use SQL injection to obtain sensitive data.
CVE-2025-25878 -- A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /del.php. The attack can use SQL injection to obtain sensitive data.
CVE-2025-26013 -- An issue in Loggrove v.1.0 allows a remote attacker to obtain sensitive information via the read.py component.
CVE-2025-26014 -- A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 allows a remote attacker to execute arbitrary code via the path parameter.
CVE-2025-26622 -- vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the babylonian method to calculate square roots of decimals. Unfortunately, improper handling of the oscillating final states may lead to sqrt incorrectly returning round
CVE-2025-26794 -- Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection.
CVE-2025-27100 -- lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been
CVE-2025-27104 -- vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single expression is possible in the iterator target of a for loop. While the iterator expression cannot produce multiple writes, it can consume side effects produced in the
CVE-2025-27105 -- vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statements by first caching the target location to avoid double evaluation. However, in the case when target is an access to a DynArray and the rhs modifies the array, the ca
CVE-2025-27106 -- binance-trading-bot is an automated Binance trading bot with trailing buy/sell strategy. Authenticated users of binance-trading-bot can achieve Remote Code Execution on the host system due to a command injection vulnerability in the `/restore` endpoint. T
CVE-2025-27108 -- dom-expressions is a Fine-Grained Runtime for Performant DOM Rendering. In affected versions the use of javascript's `.replace()` opens up to potential Cross-site Scripting (XSS) vulnerabilities with the special replacement patterns beginning with `$`. Pa
CVE-2025-27109 -- solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put dire
CVE-2023-51306 -- PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "name, title" parameters.
CVE-2023-51308 -- PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple HTML Injection in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title" parameters.
CVE-2023-51309 -- A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e
CVE-2023-51310 -- A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large am
CVE-2023-51311 -- PHPJabbers Car Park Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System
CVE-2023-51312 -- PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter.
CVE-2023-51313 -- PHPJabbers Restaurant Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in Syste
CVE-2023-51314 -- A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Restaurant Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large
CVE-2023-51315 -- PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name" parameters.
CVE-2023-51316 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Bus Reservation System v1.1 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e
CVE-2023-51317 -- PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple HTML Injection in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title" parameters.
CVE-2023-51318 -- PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "title, name" parameters.
CVE-2023-51319 -- PHPJabbers Bus Reservation System v1.1 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System O
CVE-2023-51320 -- PHPJabbers Night Club Booking Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in Sys
CVE-2023-51321 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Night Club Booking Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of genera
CVE-2023-51323 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Shared Asset Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of genera
CVE-2023-51324 -- PHPJabbers Shared Asset Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in Sys
CVE-2023-51325 -- PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "title, name" parameters.
CVE-2023-51327 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generat
CVE-2023-51330 -- PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu "date" parameter.
CVE-2023-51331 -- PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in Syst
CVE-2023-51332 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of genera
CVE-2023-51333 -- PHPJabbers Cinema Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Op
CVE-2023-51334 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cinema Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-
CVE-2023-51335 -- PHPJabbers Cinema Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "title, name" parameters.
CVE-2023-51336 -- PHPJabbers Meeting Room Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in Sys
CVE-2023-51337 -- PHPJabbers Event Ticketing System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in "lid" parameter in index.
CVE-2023-51338 -- PHPJabbers Meeting Room Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "title, name" parameters of index.php page.
CVE-2023-51339 -- A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Event Ticketing System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e
CVE-2024-12284 -- Authenticated privilege escalation inĀ NetScaler Console and NetScaler Agent allows.
CVE-2024-13155 -- The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Transparent Split Hero widget in all versions up to, and including, 1.5.140 due to insufficient input sanitization and output escaping
CVE-2024-13445 -- The Elementor Website Builder ā€“ More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the border, margin and gap parameters in all versions up to, and including, 3.27.4 due to insufficient input sanitization a
CVE-2024-13476 -- The LTL Freight Quotes ā€“ GlobalTranz Edition plugin for WordPress is vulnerable to SQL Injection via the 'engtz_wd_save_dropship' AJAX endpoint in all versions up to, and including, 2.3.11 due to insufficient escaping on the user supplied parameter and la
CVE-2024-13520 -- The Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'update_voucher_price', 'update_voucher_date', 'update_vouche
CVE-2024-13748 -- The Ultimate Classified Listings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Title parameter in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for aut
CVE-2024-13753 -- The Ultimate Classified Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the update_profile function. This makes it possible for un
CVE-2024-13789 -- The ravpage plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.31 via deserialization of untrusted input from the 'paramsv2' parameter. This makes it possible for unauthenticated attackers to inject a PHP Ob
CVE-2024-13792 -- The WooCommerce Food - Restaurant Menu & Food ordering plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.2. This is due to the software allowing users to execute an action that does not properly
CVE-2024-13802 -- The Bandsintown Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bandsintown_events' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplie
CVE-2024-13849 -- The Cookie Notice Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admini
CVE-2024-13855 -- The Prime Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.1 via the pae_global_block shortcode due to missing validation on a user controlled key. This makes it possible
CVE-2024-13888 -- The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the 'redirect' parameter. This makes it possible for unauthenticated
CVE-2024-37361 -- The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)
CVE-2024-37362 -- The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522)
CVE-2024-37363 -- The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)
CVE-2024-46933 -- An issue was discovered in Atos Eviden BullSequana XH2140 BMC before C4EM-125: OMF_C4E 101.05.0014. Some BullSequana XH products were shipped without proper hardware programming, leading to a potential denial-of-service with privileged access.
CVE-2024-49355 -- IBM OpenPages with Watson 8.3 and 9.0Ā may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature.
CVE-2024-49779 -- IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages
CVE-2024-49780 -- IBM OpenPages with Watson 8.3 and 9.0Ā IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing "dot dot" sequences
CVE-2024-49781 -- IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
CVE-2024-49782 -- IBM OpenPages with Watson 8.3 and 9.0Ā 
CVE-2024-54756 -- A remote code execution (RCE) vulnerability in the ZScript function of ZDoom Team GZDoom v4.13.1 allows attackers to execute arbitrary code via supplying a crafted PK3 file containing a malicious ZScript source file.
CVE-2024-54958 -- Nagios XI 2024R1.2.2 is susceptible to a stored Cross-Site Scripting (XSS) vulnerability in the Tools page. This flaw allows an attacker to inject malicious scripts into the Tools interface, which are then stored and executed in the context of other users
CVE-2024-54959 -- Nagios XI 2024R1.2.2 is vulnerable to a Cross-Site Request Forgery (CSRF) attack through the Favorites component, enabling POST-based Cross-Site Scripting (XSS).
CVE-2024-54960 -- A SQL Injection vulnerability in Nagios XI 2024R1.2.2 allows a remote attacker to execute SQL injection via a crafted payload in the History Tab component.
CVE-2024-54961 -- Nagios XI 2024R1.2.2 has an Information Disclosure vulnerability, which allows unauthenticated users to access multiple pages displaying the usernames and email addresses of all current users.
CVE-2024-55457 -- MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information
CVE-2024-57401 -- SQL Injection vulnerability in Uniclare Student portal v.2 and before allows a remote attacker to execute arbitrary code via the Forgot Password function.
CVE-2024-57716 -- An issue in trenoncourt AutoQueryable v.1.7.0 allows a remote attacker to obtain sensitive information via the Unselectable function.
CVE-2024-6432 -- The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ā€˜contentā€™ parameter within the plugin's shortcode Content Block in all versions up to, and including, 3.3.5 due to insufficient input sanitiz
CVE-2024-6696 -- The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, whic
CVE-2024-6697 -- The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state
CVE-2024-7141 -- Versions of Gliffy Online prior to versions 4.14.0-7 contains a Cross Site Request Forgery (CSRF) flaw.
CVE-2025-0112 -- A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XD
CVE-2025-0161 -- IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation.
CVE-2025-0352 -- Rapid Response Monitoring My Security Account App utilizes an API that could be exploited by an attacker to modify request data, potentially causing the API to return information about other users.
CVE-2025-0866 -- The Legoeso PDF Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ā€˜checkedValsā€™ parameter in all versions up to, and including, 1.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparati
CVE-2025-0868 -- A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.
CVE-2025-0897 -- The Modal Window ā€“ create popup modal window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 6.1.5 due to insufficient input sanitization and output escaping on
CVE-2025-1039 -- The Lenix Elementor Leads addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL form field in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unaut
CVE-2025-1043 -- The Embed Any Document ā€“ Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.5 via the 'embeddoc' shortcode. This makes it possible for authenticated attac
CVE-2025-1064 -- The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's xoo_el_action shortcode in all versions up to, and including, 2.8.5 due to insufficient input sanitization and output e
CVE-2025-1223 -- An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data inĀ Citrix Secure Access Client for Mac
CVE-2025-1265 -- An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system.
CVE-2025-1293 -- Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0.
CVE-2025-1328 -- The Typed JS: A typewriter style animation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ā€˜typespeedā€™ parameter in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes i
CVE-2025-1483 -- The LTL Freight Quotes ā€“ GlobalTranz Edition plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the engtz_wd_save_dropship AJAX endpoint in all versions up to, and including, 2.3.12. This makes it
CVE-2025-1492 -- Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
CVE-2025-20059 -- Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9.
CVE-2025-21105 -- Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action pe
CVE-2025-21106 -- Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system.
CVE-2025-22973 -- An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content.
CVE-2025-23020 -- An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with collidin
CVE-2025-24893 -- XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability
CVE-2025-24946 -- The hash table used to manage connections in picoquic before b80fd3f uses a weak hash function, allowing remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SC
CVE-2025-24947 -- A hash collision vulnerability (in the hash table used to manage connections) in LSQUIC (aka LiteSpeed QUIC) before 4.2.0 allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding S
CVE-2025-25299 -- CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. During a recent internal audit, a Cross-Site Scripting (XSS) vulnerability was discovered in the CKEditor 5 real-time collaboration package. This vulnerability affects user marke
CVE-2025-25662 -- Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time.
CVE-2025-25663 -- A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow.
CVE-2025-25664 -- Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function.
CVE-2025-25667 -- Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info.
CVE-2025-25668 -- Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function.
CVE-2025-25674 -- Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid.
CVE-2025-25675 -- Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the d
CVE-2025-25676 -- Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.
CVE-2025-25678 -- Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function.
CVE-2025-25679 -- Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.
CVE-2025-25957 -- Cross Site Scripting vulnerabilities in Xunruicms v.4.6.3 and before allows a remote attacker to escalate privileges via a crafted script.
CVE-2025-25958 -- Cross Site Scripting vulnerabilities in phpcmsv9 v.9.6.3 allows a remote attacker to escalate privileges via a crafted script.
CVE-2025-25960 -- Cross Site Scripting vulnerability in phpcmsv9 v.9.6.3 allows a remote attacker to escalate privileges via the menu interface of the member center of the background administrator.
CVE-2025-25968 -- DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file'
CVE-2025-25973 -- A stored Cross Site Scripting vulnerability in the "related recommendations" feature in Ppress v.0.0.9 allows a remote attacker to execute arbitrary code via a crafted script to the article.title, article.category, and article.tags parameters.
CVE-2025-26304 -- A memory leak has been identified in the parseSWF_EXPORTASSETS function in util/parser.c of libming v0.4.8.
CVE-2025-26305 -- A memory leak has been identified in the parseSWF_SOUNDINFO function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file.
CVE-2025-26306 -- A memory leak has been identified in the readSizedString function in util/read.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted file.
CVE-2025-26307 -- A memory leak has been identified in the parseSWF_IMPORTASSETS2 function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file.
CVE-2025-26308 -- A memory leak has been identified in the parseSWF_FILTERLIST function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file.
CVE-2025-26309 -- A memory leak has been identified in the parseSWF_DEFINESCENEANDFRAMEDATA function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file.
CVE-2025-26310 -- Multiple memory leaks have been identified in the ABC file parsing functions (parseABC_CONSTANT_POOL and `parseABC_FILE) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted ABC file.
CVE-2025-26311 -- Multiple memory leaks have been identified in the clip actions parsing functions (parseSWF_CLIPACTIONS and parseSWF_CLIPACTIONRECORD) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted SWF file.
CVE-2025-26618 -- Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use comp
CVE-2025-26856 -- Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests
CVE-2025-27088 -- oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to sessio
CVE-2025-27091 -- OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due t
CVE-2025-27096 -- WeGIA is a Web Manager for Institutions with a focus on Portuguese language. A SQL Injection vulnerability was discovered in the WeGIA application, personalizacao_upload.php endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQ
CVE-2025-27097 -- GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. When a user transforms on
CVE-2025-27098 -- GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerabilit
CVE-2025-27218 -- Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
Exploiting the TP-Link TL-WR940N router with CVE-2024ā€“54887 (stack buffer overflow) https://infosecwriteups.com/reversing-discovering-and-exploiting-a-tp-link-router-vulnerability-cve-2024-54887-341552c4b104ā€¦ #embedded #infosec -- 0xor0ne
TL-WR841N home router: UART protection bypass https://iotsrg.org/blog/unlocking-full-shell-functionality-uart-rx-mitigation-bypass-on-tl-wr841nā€¦ #iot #cybersecurity -- 0xor0ne
Intro to embedded devices reverse engineering Ghidra setup: https://voidstarsec.com/blog/ghidra-dev-environmentā€¦ Tools: https://voidstarsec.com/blog/intro-to-embedded-part-1ā€¦ Firmware extraction: https://voidstarsec.com/blog/uart-uboot-and-usbā€¦ Credi -- 0xor0ne
Trend Micro: Two recent incident response cases in Europe involved Shadowpad, a malware family connected to various Chinese threat actors. https://trendmicro.com/en_us/research/25/b/updated-shadowpad-malware-leads-to-ransomware-deployment.htmlā€¦ @TrendMic -- 780thC
Stately Taurus Activity in Southeast Asia Links to Bookworm Malware https://unit42.paloaltonetworks.com/stately-taurus-uses-bookworm-malware/ā€¦ @Unit42_Intel -- 780thC
DeceptiveDevelopment targets freelance developers - DeceptiveDevelopment is a North Korea-aligned activity cluster that we currently do not attribute to any known threat actor. https://welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freel -- 780thC
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware | https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.htmlā€¦ @TheHackersNews -- 780thC
HCRG Care Group is one of the largest independent health care providers in the United Kingdom. Medusa Team breached HCRG Care and is threatening to leak 2.3TB of their data unless they receive a $2 million ransom. Medusa sucks -- alvieriD
Phishing attack hides JavaScript using invisible Unicode trick - @billtoulas https://bleepingcomputer.com/news/security/phishing-attack-hides-javascript-using-invisible-unicode-trick/ā€¦ -- alvieriD
Russian phishing campaigns exploit Signal's device-linking feature - @Ionut_Ilascu https://bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/ā€¦ -- alvieriD
Anyone else realised that the Russian SVR appears to be simply going back through old @BHinfoSecurity blogs and testing to see if these known techniques still work First Rogue RDP and now Device Code Phishing 1. https://blackhillsinfosec.com/rogue-rdp -- bushidotoken
Update ā€” Cloudflare has retaliated to LaLiga and is taking legal action after their pursuit of IP blocks via Spanish ISPs https://xataka.com/empresas-y-economia/cloudflare-inicia-acciones-legales-laliga-sus-bloqueos-ips-torpes-e-ineficacesā€¦ h/t @0xDaniel -- bushidotoken
Your industry. Your data. Your risk. 211 ransomware attacks in a weekā€”will you be next? Top targets: Manufacturing, Consumer Goods, Construction. Biggest threats: Cl0p, RansomHub, PLAY. Stay ahead with http://falconfeeds.io #CyberSecurityAwaren -- FalconFeedsio
Akira Ransomware Alert: Berg Engineering Consultants, Ltd. (http://berg-eng.com) has been listed as a victim by the Akira Ransomware. The group claims to have obtained more than 30 GB of the organization's data, including confidential licenses, agreeme -- FalconFeedsio
Ransomware Alert: RansomHub Ransomware group has added 3 new victims to their darkweb portal. - Riverdale Country School - ā ProHEALTH Dental Management LLC - ā PRAN Systems Inc. NB: The group intends to publish the organizations' data within 4-7 da -- FalconFeedsio
Ransomware Alert: M-1 Tool Works, Inc. (http://m1toolworks.com), a USA-based aerospace-quality precision machining provider, has fallen victim to Apos Security Ransomware. Key Details: Published date: February 20, 2025 Threat Actor: Apos Security -- FalconFeedsio
DDoS Alert NoName claims to have targeted multiple websites in Italy. - Ports of Olbia and Golfo Aranci - Port of Ravenna - Port of Venice - Port of Genoa - Ports of Civitavecchia - ATB Bergamo - CTM Cagliari S.p.A. - UNI -- FalconFeedsio
The 2nd ever BlueHat India in Hyderabad will take place on May 14-15, 2025, and our Call for Papers is now open! This is your chance to showcase your thought leadership in the vulnerability and mitigation space, emerging security threats and techniques, n -- MsftSecIntel
Tracked by Microsoft as Blizzard threat actor groups, Russian threat actors launch campaigns with intelligence gathering and espionage as their main motivation. Their campaigns focus on industries that can provide them access to intelligence related to su -- MsftSecIntel
Hombres confirmen -- n4hualH
Todos los sindicatos son, actualmente, conservadores. Al existir, declaran la revoluciĆ³n terminada, y cualquier intento de cambiar algo, se convierte automĆ”ticamente, en cuestiĆ³n fascista o algo similar. Entonces sĆ­, los sindicatos son enemigos del cambio -- n4hualH
Itā€™s silly how much the algorithm here penalizes tweets that contain outbound URLs and/or non-inflammatory content. -- nullcookies
#TTP [T1566.001] Spear-Phishing [T1027.012] LNK file [T1059] PS & BAT script execution [T1620] Load SC (.BAT execution) [T1140] Decrypt PE (#RokRat) [T1070] Delete traces of Samples | Scripts [T1071.001] C&C -- RexorVc0
#IOC 936888d84b33f152d39ec539f5ce71aa 5adfa76b72236bf017f7968fd012e968 3323777ca4ac2dc2c39f5c55c0c54e3c f3c087a0be0687afd78829cab2d3bc2b ee7e3e39dd951f352c669f64bd8ec1b5 144928fc87e1d50f5ed162bb1651ab24 0253b33cfb3deb6a1d4bb197895c4530 [...] VT: -- RexorVc0
AMOS Stealer C2 [new] 45.9.117.152 WeChat_v.8.13.dmg 88a0b6a50a75f89f11ba8df5b21053f3 .WeChat 7d2393a30e7a1fc56fb63fdd219e3f56 b9b7923f5bc9ac27d7695f1cb3a33b61 -- suyog41
Cowboy Stealer Phishim_attack_dont_open_attachment-important-file.PDF.iso 3c8baf9d029234bbd9ffe45a4a3f6066 attachmentpdf.exe ca510a8da8effc9c4178b2a3b4dafa58 #Cowboy #Stealer #IOC -- suyog41
BeeRat 174b4d0fa8bb9fc7c0f2321ad6b43f01 #BeeRat #RAT #IOC -- suyog41
CipherLocker Ransomware 627bf6f03e23f703fe180af4629a07f8 #CipherLocker #Ransomware #IOC -- suyog41
New #FrigidStealer = old #Banshee stealer? --> -- suyog41
Another Great report from Google Threat Intelligence Group A pivot on the html page finds further domains not mentioned in the report and are almost certainly controlled by Russian Nation State Threat Actors : 5.78.109[.]113 group-signal[.]tech Alwa -- TLP_R3D
Are you one of the millions of developers utilizing #CUDA? Unit 42 researchers discovered multiple vulns in #NVIDIA's CUDA Toolkit. These tools assist with inspecting and optimizing CUDA-based programs for NVIDIA GPUs. Read more: https://bit.ly/3X5PKtm -- unit42_intel
If you wanna demo our small little browser-based video game, you now can. Introducing: Malware Collector A small clicker / idle game where you ... collect malware! There is a lot more we wanna do with it. Play here: https://mini-01-s3.vx-underground.or -- vxunderground
stop yelling at me :( -- vxunderground
Hello, We are looking for people to make "guest" appearances in our little malware video game. All we need is a headshot of you (it can be silly, doesn't matter). In our game we need people to take the role of 1. Project Manager 2. Malware Analyst I - -- vxunderground
Chat, we hijacking Red Team operations today fr -- vxunderground
Found an SSRF in Sliver C2 (CVE-2025-27090), allowing an attacker to read and write TCP traffic through affected teamservers. Demo shows leaking the IP of a Sliver teamserver hidden behind redirectors Writeup and PoC in replies -- vxunderground
Per @404mediaco , an Instagram extortionist named UNLOCKED went onto Adam22's No Jumper podcast where he discussed extorting people for money and how he's making $600,000/month from it. In 2024, he was arrested by the Federal Bureau of Investigation. No -- vxunderground
NEW: Little-known Spanish spyware maker Mollitiam Industries filed for bankruptcy last month. I looked back at all the public information there is about the company, whose tech was allegedly used to spy on journalists in Colombia. The spyware industry -- 58_158_177_102
Mirai is the #1 malware family on @abuse_ch 's URLhaus AND MalwareBazaar, with 5,363 sites reported and 3,210 samples shared. URLHaus: https://spamhaus.org/malware-digest/#urlhausā€¦ MalwareBazaar: https://spamhaus.org/malware-digest/#malwarebazaarā€¦ B -- abuse_ch
Next week | New features coming to ALL platforms on Tues, 25th Feb! Hereā€™s a reminder of whatā€™s new for "authenticated" users: False Positive List ā€“ for all platforms, accessible via GUI and API. URLhaus Hunting Functionality ā€“ respond faster to new -- abuse_ch
Cut detection time, reduce manual tasks, and train your team in real-world scenarios with #ANYRUN Interactive Sandbox Join our FREE #webinar to explore actionable strategies for your #SOC Wed, Feb 26 Register now: https://anyrun.webinargeek.com/better -- anyrun_app
#Quasar is a .NET-based open-source #RAT used for cyber espionage It enables keylogging, file theft, and remote control over infected Windows machines Learn more & collect #IOCs: https://any.run/malware-trends/quasar/?utm_source=twitter&utm_medium=pos -- anyrun_app
Discover how interactivity in #ANYRUN Sandbox helps #cybresecurity teams detect, analyze, and manipulate #malware behavior for faster and more effective investigations Don't miss out, watch our new video: https://youtube.com/watch?v=lyBmNALZO1wā€¦ -- anyrun_app
New #Stegocampaign abuses obfuscated registry to execute payload ā€“ #ExploreWithANYRUN The attack is carried out through users following instructions, such as downloading a #REG file that adds a #malicious script to #Autorun. While exploiting Autorun has -- anyrun_app
The Threat Hunting team reports that Earth Preta is using MAVInject and Setup Factory to mix legitimate and malicious components, enabling them to bypass ESET antivirus and maintain control over compromised systems. #CyberThreats -- Arkbird_SOLG
#Lazarus MacOS Malware + dropbox https://kandji.io/blog/drivereasy -- blackorbird
#Kimsuky utilized the PebbleDash backdoor and their custom-made RDP Wrapper. https://asec.ahnlab.com/en/86098/ -- blackorbird
BeaverTail & InvisibleFerret Analysis from Slovenia CERT #Lazarus https://cert.si/tz016/ -- blackorbird
#APT #APT37 #RicochetChollima #ScarCruft #RokRat #threat #malware #Phishing > RAR|ZIP > #LNK extract .bat/PS/DOCs > #PS > #BAT execution > #PS decrypt #RokRat SC > Load + RUN #RAT> #C2 360 Advanced Threat Research: https://mp.weixin.qq.com/s?__biz=M -- cyb3rops
-- cyb3rops
#Germany #Freespeech #CBS -- cyb3rops
Normally you can't auth to Entra ID connected webapps with bearer tokens. But if Teams can open SharePoint/OneDrive with an access token, I guess so can we. roadtx now supports opening SharePoint with access tokens in the embedded browser -- cyb3rward0g
#ICYMI, Ghidra 11.3 has new features to supercharge work on your cybersecurity challenges. We added the long-requested built-in Python3 support based on Pyhidra, a p-code accelerated emulator, and original source code to binary linking. Check it out: http -- DrunkBinary
How the diamond ticket attack works. #ThreatHunting #DFIR -- DrunkBinary
How the NSA (Equation Group) allegedly hacked into China's Polytechnical University I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. https://inversecos.com/2025/02/an-inside-lo -- hackerfantastic
Our children are not yours to send to war. -- hackerfantastic
An awesome "Cyber Threat Intelligence Engineer Lead" opening with a high-impact #synapse team just dropped! https://usaa.wd1.myworkdayjobs.com/USAAJOBSWD/job/San-Antonio-Home-Office-I/Cyber-Threat-Intelligence-Engineer-Lead_R0106995ā€¦ -- ItsReallyNick
meet andurilā€™s lead recruiter -- ItsReallyNick
dont work at anduril -- ItsReallyNick
Happy 25th birthday to Active Directory, the cause of... and solution to... all of life's problems -- ItsReallyNick
NSA allegedly used two front companies ā€œJackson Smith Consultantsā€ and ā€œMueller Diversified Systemsā€ to purchase IPs. Qihoo 360 and CVERC alleged an NSA employee with the pseudonym ā€œAmanda Ramirezā€ anonymously purchased these for the FoxAcid platform wh -- james_inthe_box
WsgiDAV opendir: https://festivals-enquiry-chick-bit.trycloudflare[.]com/ -- JAMESWT_MHT
#Kimsuky lnk+powershell IOCs Update https://securonix.com/blog/analyzing-deepdrive-north-korean-threat-actors-observed-exploiting-trusted-platforms-for-targeted-attacks/ā€¦ -- JAMESWT_MHT
A very generic crypto scam sent via SMS Linked email: usdt2792@gmail.com Account shows the 'funds' but to access them you need to pay for a 'VIP' account. There is no real crypto funds, this is a scam to collect payments with no real return -- JCyberSec_
This is a nice example of a real world OAuth phishing campaign OAuth campaigns are capable of bypassing all MFA security without compromising a users password OAuth is the next big phishing vector! -- JCyberSec_
In a world where 9.8's are given out like candy, mySCADA myPRO goes the extra mile to earn that 10.0 -- KorbenD_Intel
"irb_plugin.exe": 6b176f3d92d6d21227a0ac35189b72a53a5cb1cb8bba1dbc92b34c0b3cb4326b q2z4h2cx-60000.usw3.devtunnels[.]ms @1ZRR4H -- malwrhunterteam
There's this "DPRK DriverEasy & ChromeUpdate Deep Dive" article, talking about the above: -- malwrhunterteam
Compromised websites distribute #Lumma stealer via ClickFix technique but with the pretext "Suspicious IP Address" (I had not seen this template but it reminded me of the "IP restrictions" used by North Korean threat actors). cmd /c powershell -W Hidden -- Max_Mal_
MetaStealer Infra buisness[.]it[.]com ciscocovnlimited[.]com ciscoshop[.]me ciscoshopstore[.]com ciscoshopsusa[.]com ciscoshopsusa[.]info ciscoshopsusa[.]net ciscostores[.]com ciscostores[.]mom ciscovoipllc[.]com electciscolc[.]info electciscop[.]mom jum -- nullcookies
Hi famā€” Please donā€™t read my reply to this tweet, lest you get new Bad Domain tracks. You may even hear angry shoegaze on The Pyre and noise soundscapes on The Vespers. Worse, it could distract you from doom scrolling. SAVE YOURSELVES. NO HELL PORTALS H -- nullcookies
Oops, hereā€™s an album with angry shoegaze tracks. Howā€™d it get there? -- nullcookies
Oh no, hereā€™s another album. This one is ambient/experimental. -- nullcookies
Group: ransomhub Approx. Time: 10:32 20/02/25 Title: -- RansomwareNews
Group: incransom Approx. Time: 02:53 20/02/25 Title: -- RansomwareNews
Group: termite Approx. Time: 00:42 20/02/25 Title: Ligentia -- RansomwareNews
Group: ransomhub Approx. Time: 10:32 20/02/25 Title: -- RansomwareNews
Group: ransomhub Approx. Time: 10:32 20/02/25 Title: -- RansomwareNews
The #Kimsuky #APT group uses a Korean domain related to January tax filings for #phishing. #IOC: 1ģ›”ģ‹ ź³ ė‚©ė¶€ė³€ė™ģ „ģžė¬øģ„œ.ģ»¤ė®¤ė‹ˆķ‹°.ķ•œźµ­(january tax fillings) xn--1-wb6eh4hj4durmfjcnubk5pb9dezmj4b0xb[.]xn--9i1b01onwqqzd[.]xn--3e0b707e https://i.secai.ai/research/1%EC%9B%94% -- ShadowChasing1
Happening TOMORROW! Our Technical Recruiting Manager Steffany Velasquez is hosting our Hack the Hiring Process webinar, offering a view of our application process and sharing tips on standing out when applying for a #cybersecurity role. Register today! -- specterops
Our IDOT training course at #SOCON2025 is SOLD OUT! In-person & virtual seats are still available across our other courses. If a course you are interested in fills up, we encourage you to check back in the event a spot opens up. Reserve your seat http -- specterops
ICYMI: Our COO @jasonjfrank sat down w/ The Cyber Security Recruiter Podcast to chat about SpecterOps and our approach recruiting. He also shared his perspective on leadership and guiding a growing team. Listen now -- specterops
Last week we announced a partnership with @Carahsoft bringing #AttackPathManagement through BloodHound Enterprise to the public sector. Check out this article from @SecInfoWatch to learn how our partnership will benefit government orgs. -- specterops
Lately there's been some notable trends in the threat landscape, and a certain tool is appearing more often in threat actors' post compromise toolkits. Check out this discussion on what's been happening: http://cs.co/6018ILr8i -- talossecurity
ā€œHey, I noticed your Teams status is yellow. Just wanted to make sure youā€™re still online.ā€ -- threatable
2025-02-18 (Tuesday): Legitimate but compromised websites with an injected script for #SmartApeSG lead to a fake browser update page that distributes #NetSupportRAT malware. During an infection run, we saw follow-up malware for #StealC. More info at https -- virusbtn
Kandji's Christopher Lopez analyses a recent case attributed to the North Korea Contagious Interview campaign, in which malicious applications are presented to victims as part of a fake job interview process. https://kandji.io/blog/drivereasy -- virusbtn
Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russian intelligence services. https://cloud.google.com/blog -- virusbtn
New Blog Post: SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability ^TN -- virusbtn