Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
June 2, 2025, 3:09 p.m.
None
Dockerfile PHP CSS JavaScript Python Hack
Updated: 8 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 3:07 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 2:55 p.m.
None
Python
Updated: 8 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 2:42 p.m. This repo has been linked 1 different CVEs too. -
Aug. 5, 2025, 12:19 a.m.
for moh
JavaScript TypeScript CSS
Updated: 6 months, 1 week ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 2:24 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 3:16 p.m.
Telstra Cybersecurity Simulation featuring Spring4Shell Zero-Day Vulnerability and SOC playbook to investigation and attack mitigation.
Python
Updated: 8 months, 2 weeks ago1 stars 0 fork 0 watcherBorn at : June 2, 2025, 2:11 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 7:02 p.m.
Zadanie 2. Łańcuch (pipeline) w usłudzie GitHub Actions.
Dockerfile HTML JavaScript CSS
Updated: 8 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 2:09 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 5:30 p.m.
None
Python
Updated: 8 months, 2 weeks ago1 stars 0 fork 0 watcherBorn at : June 2, 2025, 1:30 p.m. This repo has been linked 1 different CVEs too. -
Aug. 20, 2025, 11:37 a.m.
fully lawful to open source under US and MA law
Python
Updated: 5 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 1:17 p.m. This repo has been linked 2 different CVEs too. -
June 2, 2025, 12:53 p.m.
My first full pentesting report against Metasploitable 2, showing enumeration, exploitation and post-exploitation techniques.
Updated: 8 months, 2 weeks ago1 stars 0 fork 0 watcherBorn at : June 2, 2025, 12:46 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 12:23 p.m.
Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025-5280)
Updated: 8 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 12:12 p.m. This repo has been linked 1 different CVEs too. -
June 2, 2025, 12:29 p.m.
Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224)
Updated: 8 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : June 2, 2025, 12:02 p.m. This repo has been linked 1 different CVEs too.