Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Aug. 13, 2020, 1:59 p.m.
CVE-2017-0199
Python
Updated: 4 years, 3 months ago16 stars 8 fork 8 watcherBorn at : April 19, 2017, 4:15 a.m. This repo has been linked 1 different CVEs too. -
April 19, 2017, 3:52 a.m.
Wordpress_vulnerability
Updated: 7 years, 7 months ago0 stars 0 fork 0 watcherBorn at : April 19, 2017, 3:52 a.m. This repo has been linked 3 different CVEs too. -
March 18, 2024, 10:27 p.m.
🥑 Language focused docker images, minus the operating system.
docker bazel
Python Shell Starlark Go Makefile
Updated: 8 months, 1 week ago17462 stars 1025 fork 1025 watcherBorn at : April 18, 2017, 10:02 p.m. This repo has been linked 0 different CVEs too. -
April 18, 2017, 8:48 p.m.
None
Updated: 7 years, 7 months ago0 stars 0 fork 0 watcherBorn at : April 18, 2017, 8:48 p.m. This repo has been linked 2 different CVEs too. -
Aug. 12, 2024, 7:29 p.m.
CVE-2011-3368 exploit code
cve-2011-3368
Python
Updated: 3 months, 2 weeks ago1 stars 9 fork 9 watcherBorn at : April 18, 2017, 8:34 p.m. This repo has been linked 1 different CVEs too. -
Aug. 27, 2024, 11:03 a.m.
Proof of concept exploit for CVE-2017-3599
cve-2017-3599
Python
Updated: 3 months ago23 stars 15 fork 15 watcherBorn at : April 18, 2017, 5:08 p.m. This repo has been linked 1 different CVEs too. -
May 3, 2024, 9:11 a.m.
Scripts aiding penetration testing of Splunk Enterprise systems
splunk security pentest exploit cve
Shell Python
Updated: 6 months, 3 weeks ago10 stars 3 fork 3 watcherBorn at : April 18, 2017, 10:39 a.m. This repo has been linked 1 different CVEs too. -
Nov. 13, 2024, 11:45 a.m.
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
cpe cve vulnerability-analysis vulnerability-scanners nvd cve-match iva software-inventory software-vulnerability
Python CSS JavaScript HTML
Updated: 2 weeks ago64 stars 24 fork 24 watcherBorn at : April 18, 2017, 9:21 a.m. This repo has been linked 5 different CVEs too. -
June 16, 2023, 4:11 p.m.
Quick and dirty fix to OLE2 executing code via .hta
windows registry cve-2017-0199 guide
Updated: 1 year, 5 months ago14 stars 0 fork 0 watcherBorn at : April 18, 2017, 6:33 a.m. This repo has been linked 1 different CVEs too. -
April 18, 2017, 3:49 a.m.
codepath assignment 07
Updated: 7 years, 7 months ago0 stars 0 fork 0 watcherBorn at : April 18, 2017, 3:49 a.m. This repo has been linked 2 different CVEs too.