-
Vulnerability Database 🛡
Number one vulnerability management and threat intelligence platform documenting and explaining vulnerabilities since 1970.
-
VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY - Best Independent Bug Bounty Programs, Responsible Disclosure & Vulnerability Coordination Platform - INDEX
VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY - Best Independent Bug Bounty Programs, Responsible Disclosure & Vulnerability Coordination Platform
-
mavlevin | I write about reverse engineering, vulnerability research, binary exploitation and operating system internals
I write about reverse engineering, vulnerability research, binary exploitation and operating system internals
-
Sechack
Theori Vulnerability Researcher (2024.07.22 ~ 2025.02.28) Sunrin Internet High School InfoSec 117th KITRI BoB 12th Vulnerability Analysis · 000, vulnerability, 2025, university, enjoy
-
vuln (Jeffery) · GitHub
Threat Research - I enjoy browsing the internet from another person's computer.
- vuln
-
Cloud Vulnerabilities and Security Issues Database
Cloud vulnerabilities database - an open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
-
Martin Vigo - Personal hacking projects, writeups and tools
Personal infosec research projects. My writeups, tools, PoCs and public talks material
-
Inbits Blog
Around a year ago, I decided to orient myself more keenly towards vulnerability research. It had become apparent to me that it was the area of offensive security, and the process, that I had enjoyed dipping my toes into… · had, modules, year, vulnerability, blog
-
Bad Sector Labs Blog
Weekly Cybersecurity news, techniques, exploits, and tools every Monday
-
I Want a CVE: Cybersecurity Research and Vulnerability Insights
Explore expert cybersecurity research, vulnerability disclosures, and insights on CVE identification and mitigation strategies for enhanced digital security.
-
Home - Vulnmachines
A place to learn and improve penetration testing/ethical hacking skills for FREE. The labs consist of 100+ real world scenarios to practice the latest exploits and cutting edge hacking techniques. Learn penetration… · learn, penetration, testing, hacking, skills
-
Blog — Purdue Hackers
Made with 💛 and ⚡️ • Open source • Powered by ▲Vercel · made, open, source, powered, vercel
-
BITSADMIN Blog - Mystery guest in your IT infrastructure
Security Researcher - Red TeamerOSCP • OSCE • OSEE Website GitHub Twitter Mastodon · security, researcher, red, teameroscp, osce
-
InfoSanity Blog – Offensive and Defensive IT Security
As is painfully obvious when looking at the date of the “recent” posts here, my personal lab time has taken a backseat to other projects, requirements and responsibilities (all for good reasons; fascinating work… · lab, backseat, projects, requirements, little
-
Index | LukeGix
My name is Luca, I’m a Vulnerability Researcher. · name, luca, vulnerability, researcher
-
Lycois
I'm a hobbyist software engineer with a passion for hardware. 基于 Rust 实现的静态网站生成引擎,支持将 Markdown 内容高效构建为结构化、可部署的静态网站。 基于树莓派与 STM32F1 构建的智能小车系统,使用 OpenCV 框架进行视觉任务处理,并提供基于 Web 的可视化控制面板,实现摄像头远程图传与控制小车移动。系统采用前馈与模糊 PID… · hobbyist, software, engineer, passion, hardware
-
IT Security blog
Welcome to my blog where I describe found in free time vulnerabilities, and other worth writing IT security things.
-
Vulnerabilities.in - Security Blogging with Ciph3r00t
Ciph3r00t is an ethical hacker, pentester, security researcher, trainer, and a public speaker!
-
Caution When [Reversing]
Malware Analysis, Reverse Engineering, Digital Forensics & Other Security Bytes ...
-
VulnCheck Docs
Explore our guides and examples to learn about and integrate VulnCheck
-
vaga.io
I write code and I take care about my privacy // Co-founder @ Owaka // Golang lover // Open source enthusiast
-
Evan Ricafort | Blog
During my random testing for my personal project toolkit for web application assessment, I found a very simple and very interesting vulnerability that allows me to easily pwn my target due to a HTTP method… · vulnerability, method, allows, http, plugin
-
The Recurity Lablog
Editor’s note: Jennifer is a former Recurity Labs employee who now works as a freelancer, continuing to contribute to many of our projects. We are grateful to still have... We’re proud to announce that Recurity Labs has… · recurity, labs, system, editor, note
-
Vulnerable Security
All about application security, read about the latest vulnerabilities and learn how to become a better pentester and improve your bug bounty skills.
-
Tainted Bits
These are my personel diary on Reverse Engineering and Malware analysis related stuff.
-
vollkorntomate
vollkorntomate – Security Researcher, Programmer, Open Source Advocate
-
SensCyberSecurity
If you’re on this website I’ll probably contacted you about a vulnerability found in one of your systems/websites. Don’t worry I’m one of the good guys. I work as an ethical hacker for an organization and I occasionally… · hackerone, vulnerability, please, cve, contacted
-
Home | Piotr Ryciak's blog
I'm a cybersecurity researcher eager to share my projects, vulnerabilities found in the wild and thoughts on different topics. · cybersecurity, researcher, eager, share, projects
-
fhlipzero.io · GitBook
Note: I'll do my best to cite where I can but there's a good chance notes here are from some other placeSocials: https://www.linkedin.com/in/philip-holbrook-526245101/ CVE-2020-28249… · https, com, www, blog, github
-
mavlevin | I write about reverse engineering, vulnerability research, binary exploitation and operating system internals
I write about reverse engineering, vulnerability research, binary exploitation and operating system internals
-
Known Vulnerabilities Test Lab
This page intentionally loads vulnerable JavaScript libraries. · intentionally, loads, vulnerable, javascript, libraries
-
Anecdotal Engineering
I am a technologist who became test infected in 2004 and I have been trying to spread it ever since. This blog was formally titled "XP in Anger"
-
Justin's Linklog – (Things I found interesting recently.)
On the Coming Industrialisation of Exploit Generation with LLMs Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in… · exploits, write, industrialisation, exploit, llms
-
voidsecurity
Yet another blog by a security enthusiast ! · yet, another, blog, security, enthusiast
-
Home - CyberFactory#1
Project page of CyberFactory#1 - international project adressing threats and opportunities & developing key capabilities of the Factory of the Future
-
Pentester Vulnerability Research - Vulnerability Research
124 City Road London EC1V 2NX, GB We are a group of enthusiasts who dedicate their free time and financial resources to establishing a more secure online environment · 124, city, road, london, ec1v
-
VULNCODE
The CyberSec Advisory - Exploits, Shellcode, Vulnerability Reports, Security Articles, Tutorials and more.
-
LRVT's Security Blog
IT Security Professional and Researcher Join me on this exciting journey as we explore the boundless world of web design together. Selfhosting, Homelabs, DevOps, Docker, K8s and more. · security, professional, researcher, join, exciting
-
exploits.club
An exclusive newsletter for exploit developers, vuln researchers, and hackers
-
CVE-Hunters
Vulnerability Research Group.
-
ClevCode – Vulnerability Research, Exploit Development, Reverse-Engineering
Some articles about me and/or my research, in English: Some articles about me and/or my research, in Swedish: For more information about Cicada 3301 and my solutions for the 2012 challenge, go… · challenge, gchq, cicada, 3301, some
-
TestWiki
For-Vandalism Wiki creator and system administrator Matttestzh (talk) 05:05, 14 August 2023 (UTC) · vandalism, wiki, creator, system, administrator
-
ハニーレポート
🔓 Vulnerability | [CRITICAL] | CVE: CVE-2025-20337, CVE-2025-5777 | 出典: Security Week Amazon has seen a threat actor exploiting CVE-2025-20337 and CVE-2025-5777, two critical Cisco and Citrix vulnerabilities, as… · cve, 2025, critical, vulnerability, security
-
The Making of Close
© 2025 Close • The Making of Close • API • Jobs · close, 2025, making, api, jobs
-
Finding Vulnerabilities
This my personal blog where I share my learnings and hope to contribute to the community.
-
Penser / exposer la vulnérabilité - Sciencesconf.org
Ce site vise à regrouper les informations relatives aux évènements organisés dans le cadre du programme émergent « Vulnérabilités, Santé et Société » de la MRSH (campus 1 université Caen Normandie) : le colloque Penser /… · les, vulnérabilités, des, programme, santé
-
pavel-odintsov.com
I’m in charge of technical aspects of development and maintenance for deep tech cyber security product which provides lightning fast DDoS detection for Telecoms and Cloud operators. We use Linux, Go, C++ and we run our… · dns, traffic, ddos, detection, fastnetmon
-
Hell Oh Entropy!
I’ve been around in the Free and Open Source world for over 20 years now, initially as a user but largely as a hacker. Since I started making money using (and growing) my technical skills, it never once occurred to me… · had, there, years, things, did
-
Vael Gates
Hello, I'm Vael! I'm interested in improving the safety of AI systems to reduce potential large-scale risks from advanced AI. My work focuses on "field-building": enabling and growing the technical (research and… · safety, field, systems, risks, advanced
-
Homepage Reskin | Bugcrowd
I am a security buyer interested in finding hidden vulnerabilities in my attack surface I am a hacker interested in being part of the Bugcrowd community I am a security buyer interested in finding hidden vulnerabilities… · interested, security, buyer, finding, hidden