Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Dec. 28, 2021, 11:39 a.m.
A vulnerability scanner that detects CVE-2021-45232 vulnerabilities.
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2021, 11:36 a.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2021, 4:01 p.m.
Simple Java Payload to exploit Log4j vulnerability
Java
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2021, 11:13 a.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2021, 6:33 a.m.
None
Python Dockerfile Shell
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2021, 6:33 a.m. This repo has been linked 3 different CVEs too. -
Feb. 10, 2025, 1:28 p.m.
Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
Python Batchfile HTML JavaScript VBScript
Updated: 2 months, 3 weeks ago2 stars 1 fork 1 watcherBorn at : Dec. 28, 2021, 6:33 a.m. This repo has been linked 1 different CVEs too. -
Aug. 12, 2024, 8:19 p.m.
Auerswald COMpact 8.0B Backdoors exploit
Python
Updated: 8 months, 3 weeks ago6 stars 2 fork 2 watcherBorn at : Dec. 28, 2021, 6:05 a.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2021, 5:02 a.m.
None
Java
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2021, 4:54 a.m. This repo has been linked 1 different CVEs too. -
Aug. 12, 2024, 8:19 p.m.
Auerswald COMpact 8.0B Backdoors exploit
Python
Updated: 8 months, 3 weeks ago0 stars 1 fork 1 watcherBorn at : Dec. 28, 2021, 4:51 a.m. This repo has been linked 1 different CVEs too. -
April 5, 2023, 3:03 a.m.
"Lavel Exploit CVE-2018-15133 is a powerful exploit that allows attackers to gain unauthorized access to vulnerable systems. This exploit was originally developed as part of a Capture The Flag (CTF) challenge and has since been used by security researchers and ethical hackers to identify and address vulnerabilities in web applications.
Shell C++
Updated: 2 years ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2021, 2:33 a.m. This repo has been linked 1 different CVEs too. -
Jan. 2, 2022, 10:48 p.m.
Scans the file system to find Log4Shell vulnerabilities.
log4j2 log4shell rust log4j cve-2021-44832 cve-2021-45105 cve-2021-45046 cve-2021-44228
Rust
Updated: 3 years, 4 months ago0 stars 1 fork 1 watcherBorn at : Dec. 28, 2021, 2:03 a.m. This repo has been linked 4 different CVEs too. -
March 12, 2025, 2:46 p.m.
A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations Manager
cve-2021-44228 vmsa-2021-0028 log4shell log4j2-exp
C#
Updated: 1 month, 3 weeks ago204 stars 38 fork 38 watcherBorn at : Dec. 28, 2021, 1:37 a.m. This repo has been linked 1 different CVEs too.