Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Jan. 2, 2025, 11:57 a.m.
2024 夏网络空间安全综合实践-实验报告
Python Dockerfile
Updated: 5 months, 2 weeks ago1 stars 0 fork 0 watcherBorn at : July 8, 2024, 6:54 a.m. This repo has been linked 1 different CVEs too. -
July 8, 2024, 3:38 a.m.
None
Updated: 11 months, 1 week ago0 stars 0 fork 0 watcherBorn at : July 8, 2024, 3:38 a.m. This repo has been linked 1 different CVEs too. -
July 8, 2024, 3:30 a.m.
None
Updated: 11 months, 1 week ago0 stars 0 fork 0 watcherBorn at : July 8, 2024, 3:30 a.m. This repo has been linked 1 different CVEs too. -
July 8, 2024, 2:41 a.m.
CVE-2024-36401-POC
Python
Updated: 11 months, 1 week ago1 stars 0 fork 0 watcherBorn at : July 8, 2024, 1:53 a.m. This repo has been linked 1 different CVEs too. -
July 8, 2024, 1:32 a.m.
None
Java
Updated: 11 months, 1 week ago0 stars 0 fork 0 watcherBorn at : July 8, 2024, 1:15 a.m. This repo has been linked 1 different CVEs too. -
Feb. 14, 2025, 5:37 p.m.
CosmicSting (CVE-2024-34102) POC / Patch Validator
devsecops magento magento-security-patches poc proof-of-concept security cosmicsting cve-2024-34102
Shell Python
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : July 7, 2024, 11:35 p.m. This repo has been linked 1 different CVEs too. -
July 14, 2024, 8:59 a.m.
Exploitation Scanner Cross Site Scripting vulnerability in Keycloak.
cve-2021-20323 keycloak-vulnerability cross-site-scripting-xss
Python
Updated: 11 months ago0 stars 0 fork 0 watcherBorn at : July 7, 2024, 11:02 p.m. This repo has been linked 1 different CVEs too. -
Oct. 12, 2024, 3:18 p.m.
This repository contains an exploit for CVE-2024-34361, a critical Pi-hole vulnerability (CVSS 8.6). It uses SSRF to achieve RCE by exploiting improper URL validation, allowing attackers to send arbitrary requests and execute commands on the system. Disclaimer: For educational and ethical security testing only. Unauthorized use is illegal.
Python
Updated: 8 months ago2 stars 0 fork 0 watcherBorn at : July 7, 2024, 9:22 p.m. This repo has been linked 1 different CVEs too. -
Aug. 9, 2024, 1:34 p.m.
None
Updated: 10 months, 1 week ago0 stars 0 fork 0 watcherBorn at : July 7, 2024, 8:26 p.m. This repo has been linked 1 different CVEs too. -
Aug. 16, 2024, 8:18 p.m.
RCE Chamilo 1.11.24
2023 chamilo chamilo-lms cve cve-2023-4220 exploit lms poc beersel bigupload rce
Updated: 10 months ago1 stars 0 fork 0 watcherBorn at : July 7, 2024, 4:57 p.m. This repo has been linked 1 different CVEs too.