Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
May 30, 2024, 3:08 p.m.
PoC exploit for GLPI - Command injection using a third-party library script
Python
Updated: 4 months ago1 stars 2 fork 2 watcherBorn at : April 24, 2024, 6:39 a.m. This repo has been linked 1 different CVEs too. -
May 27, 2024, 12:48 a.m.
None
Go CodeQL
Updated: 4 months ago2 stars 0 fork 0 watcherBorn at : April 24, 2024, 4:19 a.m. This repo has been linked 1 different CVEs too. -
April 24, 2024, 4:18 a.m.
None
Python
Updated: 5 months ago0 stars 0 fork 0 watcherBorn at : April 24, 2024, 4:16 a.m. This repo has been linked 1 different CVEs too. -
April 24, 2024, 4:08 a.m.
None
Updated: 5 months ago0 stars 0 fork 0 watcherBorn at : April 24, 2024, 3:55 a.m. This repo has been linked 6 different CVEs too. -
April 24, 2024, 4:04 a.m.
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Cre: NVD
Java
Updated: 5 months ago0 stars 0 fork 0 watcherBorn at : April 24, 2024, 3:54 a.m. This repo has been linked 1 different CVEs too. -
April 24, 2024, 1:37 a.m.
None
YARA C#
Updated: 5 months, 1 week ago0 stars 0 fork 0 watcherBorn at : April 24, 2024, 1:36 a.m. This repo has been linked 3 different CVEs too. -
June 7, 2024, 3:35 a.m.
None
Java
Updated: 3 months, 3 weeks ago0 stars 0 fork 0 watcherBorn at : April 24, 2024, 12:39 a.m. This repo has been linked 2 different CVEs too. -
May 25, 2024, 4:52 p.m.
Encontrarás varias fases del hacking ético como: Reconocimiento | Escanéo | Explotación | Persistencia | Escalada de Privelegios y Borrado de Huellas en temas como el Pivoting | Buffer-Overflow | Redes Wi-Fi | Forense y entre otros temás más..
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : April 23, 2024, 11:45 p.m. This repo has been linked 1 different CVEs too. -
April 28, 2024, 2:17 a.m.
CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)
Python
Updated: 5 months ago6 stars 2 fork 2 watcherBorn at : April 23, 2024, 11:16 p.m. This repo has been linked 1 different CVEs too. -
April 30, 2024, 3:14 p.m.
Scanner to identify devices vulnerable, with nmap.
Lua
Updated: 5 months ago0 stars 0 fork 0 watcherBorn at : April 23, 2024, 8:50 p.m. This repo has been linked 1 different CVEs too.