Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Dec. 14, 2021, 9:35 a.m.

    On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it "Log4Shell" for short.

    Python

    Updated: 3 years, 4 months ago
    0 stars 2 fork 2 watcher
    Born at : Dec. 14, 2021, 9:33 a.m. This repo has been linked 1 different CVEs too.
  • Nov. 4, 2024, 7:02 p.m.

    Python script to tamper with pages to test for Log4J Shell vulnerability.

    Python Shell

    Updated: 5 months, 3 weeks ago
    13 stars 2 fork 2 watcher
    Born at : Dec. 14, 2021, 9:26 a.m. This repo has been linked 1 different CVEs too.
  • Dec. 14, 2021, 8:57 a.m.

    Endpoint to test CVE-2021-44228 – Log4j 2

    Java

    Updated: 3 years, 4 months ago
    0 stars 0 fork 0 watcher
    Born at : Dec. 14, 2021, 8:55 a.m. This repo has been linked 1 different CVEs too.
  • Feb. 20, 2024, 7:02 a.m.

    Log4j jndi injection fuzz tool

    fuzz-testing log4j2 injection jndi cve-2021-44228 log4shell cve-2021-45046

    Python

    Updated: 1 year, 2 months ago
    71 stars 16 fork 16 watcher
    Born at : Dec. 14, 2021, 8:41 a.m. This repo has been linked 0 different CVEs too.
  • Dec. 14, 2021, 10:06 a.m.

    Little recap of the log4j2 remote code execution (CVE-2021-44228)

    log4j2 rce security exploit java

    Java

    Updated: 3 years, 4 months ago
    0 stars 0 fork 0 watcher
    Born at : Dec. 14, 2021, 8:31 a.m. This repo has been linked 1 different CVEs too.
  • Dec. 14, 2021, 9:21 a.m.

    None

    Updated: 3 years, 4 months ago
    0 stars 0 fork 0 watcher
    Born at : Dec. 14, 2021, 8:26 a.m. This repo has been linked 1 different CVEs too.
  • Jan. 30, 2022, 4:35 p.m.

    Check CVE-2021-44228 vulnerability

    Shell

    Updated: 3 years, 2 months ago
    3 stars 1 fork 1 watcher
    Born at : Dec. 14, 2021, 7:59 a.m. This repo has been linked 1 different CVEs too.
  • March 17, 2025, 8:50 a.m.

    None

    Go Ruby

    Updated: 1 month, 1 week ago
    138 stars 21 fork 21 watcher
    Born at : Dec. 14, 2021, 7:24 a.m. This repo has been linked 10 different CVEs too.
  • Dec. 14, 2021, 7:16 a.m.

    None

    Java

    Updated: 3 years, 4 months ago
    0 stars 1 fork 1 watcher
    Born at : Dec. 14, 2021, 7:05 a.m. This repo has been linked 1 different CVEs too.
  • March 19, 2022, 3:06 p.m.

    The LPE technique does not need to work with remote RPC or SMB, as it is only working with the functions of Print Spooler. * This script embeds a Base64-encoded GZIPped payload for a custom DLL, that is patched according to your arguments, to easily add a new user to the local administrators group. * This script embeds methods from PowerSploit/[PowerUp](https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1) to reflectively access the Win32 APIs. * This method does not loop through all printer drivers to find the appropriate DLL path -- it simply grabs the first driver and determines the appropriate path.

    PowerShell C++ C

    Updated: 3 years, 1 month ago
    1 stars 1 fork 1 watcher
    Born at : Dec. 14, 2021, 7:03 a.m. This repo has been linked 2 different CVEs too.
Showing 10 of 44011 Results

Filters

© cvefeed.io
Latest DB Update: Apr. 30, 2025 16:17