Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Aug. 16, 2025, 1:51 a.m.

    None

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 1:51 a.m. This repo has been linked 1 different CVEs too.
  • Dec. 26, 2025, 3:23 a.m.

    Jailbreak exploit for iOS version 17.6 A17 device

    HTML JavaScript CSS

    Updated: 1 month, 1 week ago
    1 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 1:11 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 16, 2025, 12:47 a.m.

    None

    Java

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 12:45 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 16, 2025, 12:38 a.m.

    Research Objective: To conduct a comprehensive analysis and successful exploitation of a Remote Code Execution (RCE) vulnerability in Webmin version 1.890 (CVE-2019-15107), ultimately gaining full control over the target system.

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 12:35 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 16, 2025, 12:27 a.m.

    Exploit for CVE-2018-7422: Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [T1574.008]

    Ruby

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 12:13 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 16, 2025, 12:26 a.m.

    This project demonstrates real-world vulnerability management skills using Qualys Community Edition to identify, assess, and remediate security risks on a Microsoft Azure-hosted Windows 11 virtual machine (VM). The process follows the NIST Cybersecurity Framework (CSF) and NIST 800-53 controls, covering Identify, Protect, and Respond phases.

    Updated: 5 months, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : Aug. 16, 2025, 12:08 a.m. This repo has been linked 1 different CVEs too.
  • Jan. 19, 2026, 10:57 p.m.

    None

    Java

    Updated: 2 weeks, 4 days ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 15, 2025, 11:46 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 15, 2025, 9:37 p.m.

    Un libro muy completo sobre el ciberdelito y su prevención

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 15, 2025, 9:36 p.m. This repo has been linked 5 different CVEs too.
  • Sept. 3, 2025, 5:13 p.m.

    None

    Java

    Updated: 5 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 15, 2025, 9:23 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 15, 2025, 9:20 p.m.

    None

    JavaScript TypeScript CSS

    Updated: 5 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 15, 2025, 9:18 p.m. This repo has been linked 1 different CVEs too.
Showing 10 of 61212 Results

Filters