Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
July 21, 2025, 4:51 p.m.
None
Updated: 6 months, 4 weeks ago3 stars 0 fork 0 watcherBorn at : May 20, 2025, 8:49 a.m. This repo has been linked 1 different CVEs too. -
July 20, 2025, 6 p.m.
CVE-2024-53677
Updated: 6 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : May 20, 2025, 8:37 a.m. This repo has been linked 1 different CVEs too. -
Oct. 9, 2025, 11:06 a.m.
Migros Security Advisories
advisory cve cvss msec security vulnerability
Updated: 4 months, 1 week ago11 stars 0 fork 0 watcherBorn at : May 20, 2025, 8:17 a.m. This repo has been linked 4 different CVEs too. -
May 20, 2025, 7:54 a.m.
None
Updated: 8 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : May 20, 2025, 7:51 a.m. This repo has been linked 2 different CVEs too. -
May 20, 2025, 6:15 a.m.
None
Updated: 8 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : May 20, 2025, 6:07 a.m. This repo has been linked 2 different CVEs too. -
July 7, 2025, 11:35 a.m.
None
JavaScript CSS TypeScript
Updated: 7 months, 1 week ago0 stars 1 fork 1 watcherBorn at : May 20, 2025, 6:05 a.m. This repo has been linked 1 different CVEs too. -
May 20, 2025, 6:14 a.m.
This project is based on performing penetration testing in a controlled lab environment to simulate attacks that hackers may use to exploit real systems. Using Kali Linux as the attack platform and Metasploitable as the vulnerable target system.
Updated: 8 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : May 20, 2025, 6:04 a.m. This repo has been linked 2 different CVEs too. -
June 28, 2025, 12:23 a.m.
None
Updated: 7 months, 3 weeks ago1 stars 1 fork 1 watcherBorn at : May 20, 2025, 4:42 a.m. This repo has been linked 20 different CVEs too. -
May 20, 2025, 4:46 a.m.
This project involves performing in-depth network penetration testing using real-world exploits to assess and enhance the security of a simulated enterprise network. Aligned with the objectives of the Certified Ethical Hacker (CEH) certification, the project aims to replicate the approach of malicious attackers in order to uncover vulnerability.
Updated: 8 months, 4 weeks ago0 stars 0 fork 0 watcherBorn at : May 20, 2025, 4:16 a.m. This repo has been linked 2 different CVEs too. -
July 8, 2025, 2:01 p.m.
None
Objective-C
Updated: 7 months, 1 week ago6 stars 0 fork 0 watcherBorn at : May 20, 2025, 3:01 a.m. This repo has been linked 1 different CVEs too.