Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Feb. 23, 2025, 6:06 p.m.
THIS IS A FRAMEWORK
Python
Updated: 4 months, 1 week ago1 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 5:25 p.m. This repo has been linked 3 different CVEs too. -
Feb. 23, 2025, 5:26 p.m.
off season repository
Java
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 5:20 p.m. This repo has been linked 1 different CVEs too. -
March 22, 2025, 4:02 p.m.
None
Updated: 3 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 4:42 p.m. This repo has been linked 0 different CVEs too. -
Feb. 23, 2025, 4:15 p.m.
Network scanner
C#
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 2:03 p.m. This repo has been linked 0 different CVEs too. -
Feb. 23, 2025, 12:45 p.m.
None
Shell Makefile C
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 12:43 p.m. This repo has been linked 1 different CVEs too. -
May 2, 2025, 9:56 a.m.
None
Updated: 2 months ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 9:21 a.m. This repo has been linked 0 different CVEs too. -
April 5, 2025, 7:05 a.m.
from python 2 to 3
Python
Updated: 2 months, 3 weeks ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 9:17 a.m. This repo has been linked 1 different CVEs too. -
Feb. 23, 2025, 8:50 a.m.
WordPress CVE-2024-10924 Exploit for Really Simple Security plugin
Python
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 8:47 a.m. This repo has been linked 1 different CVEs too. -
Feb. 23, 2025, 7:29 a.m.
Ghost-CMS Exploit is python script. This script first performs brute-force authentication attempts using the provided wordlists. If valid credentials are found, it proceeds to check for CVE-2024-23724 vulnerability and generates an exploit payload if vulnerable.
Python
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 7:23 a.m. This repo has been linked 1 different CVEs too. -
Feb. 23, 2025, 9:53 a.m.
Base principles security of web app
Updated: 4 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Feb. 23, 2025, 6:58 a.m. This repo has been linked 0 different CVEs too.