Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
July 14, 2024, 2 p.m.
None
Python
Updated: 11 months ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 1:56 p.m. This repo has been linked 1 different CVEs too. -
Aug. 1, 2024, 8:46 a.m.
A general-purpose roleplaying Discord bot featuring useful commands and character/alias creation commands.
dice discord discord-bot dnd roleplay
JavaScript
Updated: 10 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 1:30 p.m. This repo has been linked 1 different CVEs too. -
July 30, 2024, 10:53 p.m.
Bookea-tu-Mesa is vulnerable to SQL Injection
Updated: 10 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 1:01 p.m. This repo has been linked 0 different CVEs too. -
July 30, 2024, 10:51 p.m.
None
Updated: 10 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 12:51 p.m. This repo has been linked 0 different CVEs too. -
July 14, 2024, 12:13 p.m.
None
Java
Updated: 11 months ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 12:11 p.m. This repo has been linked 1 different CVEs too. -
July 14, 2024, 12:26 p.m.
None
Batchfile JavaScript TypeScript HTML SCSS
Updated: 11 months ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 12:03 p.m. This repo has been linked 4 different CVEs too. -
July 14, 2024, 11 a.m.
None
Updated: 11 months ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 10:51 a.m. This repo has been linked 1 different CVEs too. -
Oct. 8, 2024, 5:22 a.m.
None
Updated: 8 months, 1 week ago1 stars 0 fork 0 watcherBorn at : July 14, 2024, 8:40 a.m. This repo has been linked 1 different CVEs too. -
Oct. 10, 2024, 5:44 p.m.
Hands-on security training using Splunk, structured in a capture-the-flag format. This focuses on analyzing and investigating ransomware attacks, including investigating website defacements and tracing attacker activities, using threat detection, incident response, and Splunk for detailed analysis and defense strategies against cyber threats.
Updated: 8 months ago0 stars 0 fork 0 watcherBorn at : July 14, 2024, 6:42 a.m. This repo has been linked 1 different CVEs too. -
Sept. 5, 2024, 7:41 a.m.
Exploit para abusar de la vulnerabilidad Shellshock (CVE-2014-6271).
bash shellshock cve exploit linux
Python
Updated: 9 months, 1 week ago1 stars 0 fork 0 watcherBorn at : July 14, 2024, 6:19 a.m. This repo has been linked 1 different CVEs too.