Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Dec. 9, 2018, 8:08 a.m.

    None

    Updated: 5 years, 9 months ago
    0 stars 0 fork 0 watcher
    Born at : Dec. 9, 2018, 8:03 a.m. This repo has been linked 1 different CVEs too.
  • March 17, 2023, 2:39 a.m.

    Collection of USB device(slave) related vulnerabilties

    Updated: 1 year, 6 months ago
    8 stars 2 fork 2 watcher
    Born at : Dec. 9, 2018, 3:14 a.m. This repo has been linked 5 different CVEs too.
  • June 13, 2024, 9:01 a.m.

    Proof of consept for CVE-2018-17431

    rce cve cve-2018-17431 proof-of-concept comodo remote-code-execution exploit poc

    Python

    Updated: 3 months, 2 weeks ago
    2 stars 1 fork 1 watcher
    Born at : Dec. 8, 2018, 7:47 a.m. This repo has been linked 1 different CVEs too.
  • March 7, 2022, 8:30 a.m.

    This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer

    cve cve-2018-11759 security security-testing protection safe apache2 module load-balancer

    Shell

    Updated: 2 years, 6 months ago
    5 stars 2 fork 2 watcher
    Born at : Dec. 8, 2018, 2:32 a.m. This repo has been linked 1 different CVEs too.
  • Dec. 21, 2018, 6:43 a.m.

    None

    Updated: 5 years, 9 months ago
    1 stars 0 fork 0 watcher
    Born at : Dec. 8, 2018, 12:13 a.m. This repo has been linked 1 different CVEs too.
  • Oct. 31, 2021, 6:11 a.m.

    None

    PowerShell

    Updated: 2 years, 10 months ago
    0 stars 0 fork 0 watcher
    Born at : Dec. 7, 2018, 11 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 8, 2024, 8:44 a.m.

    A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

    sudo-exploitation abuse-sudo ctf exploits cve pentest pentest-tool privilege-escalation sudo linux-exploits misconfiguration oscp oscp-tools oscp-journey oscp-prep

    Shell Perl C Makefile Python SaltStack

    Updated: 3 weeks ago
    2184 stars 241 fork 241 watcher
    Born at : Dec. 7, 2018, 9:08 p.m. This repo has been linked 1 different CVEs too.
  • Dec. 22, 2023, 9:39 a.m.

    Test if your system is vulernable for cve_2018_19788.

    cve201819788 cve ansible molecule tox playbook security

    Updated: 9 months, 1 week ago
    4 stars 1 fork 1 watcher
    Born at : Dec. 7, 2018, 8:53 p.m. This repo has been linked 0 different CVEs too.
  • Sept. 17, 2022, 2:08 a.m.

    This is the best paper awards in computer science conference.

    Updated: 2 years ago
    3 stars 1 fork 1 watcher
    Born at : Dec. 7, 2018, 8:33 p.m. This repo has been linked 0 different CVEs too.
  • Dec. 17, 2019, 8:34 p.m.

    Ansible role to check the vulnerability tracked as CVE-2018-19788, impacts PolicyKit version 0.115 which comes pre-installed on a wide range of Linux distributions

    cve-2018-19788 security security-audit poc exploit ansible ansible-role

    Shell

    Updated: 4 years, 9 months ago
    3 stars 0 fork 0 watcher
    Born at : Dec. 7, 2018, 8:27 p.m. This repo has been linked 1 different CVEs too.
Showing 10 of 37414 Results

Filters