Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Sept. 14, 2025, 11:11 p.m.

    None

    Java

    Updated: 4 days, 2 hours ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 11:08 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 17, 2025, 7:51 a.m.

    None

    Updated: 1 day, 17 hours ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 11:03 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 14, 2025, 10:59 p.m.

    None

    Java

    Updated: 4 days, 2 hours ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 10:56 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 16, 2025, 3:56 a.m.

    None

    Java

    Updated: 2 days, 21 hours ago
    2 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 9:42 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 14, 2025, 9:42 p.m.

    My SOC writeups of challenges from LetsDefend.io

    Updated: 4 days, 4 hours ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 9:32 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 14, 2025, 11:52 p.m.

    Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

    anydesk anydesk-download anydesk-exploit anydesk-password anydesk-port anydesk-setup cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework slient-exploit-builder

    Visual Basic .NET

    Updated: 4 days, 1 hour ago
    1 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 9:28 p.m. This repo has been linked 2 different CVEs too.
  • Sept. 15, 2025, 12:32 a.m.

    None

    Java

    Updated: 4 days, 1 hour ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 9:20 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 16, 2025, 7:10 a.m.

    Example PoC for CVE-2025-24813 (Tomcat RCE)

    Java

    Updated: 2 days, 18 hours ago
    3 stars 2 fork 2 watcher
    Born at : Sept. 14, 2025, 8:32 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 15, 2025, 6:28 p.m.

    None

    JavaScript TypeScript CSS

    Updated: 3 days, 7 hours ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 8:19 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 14, 2025, 11:50 p.m.

    Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.

    cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework lnk lnk-builder lnk-cve lnk-exploit lnk-payloads lnk-rce lnk-shortcut lnk-stomping slient-exploit-builder

    Visual Basic .NET

    Updated: 4 days, 1 hour ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 14, 2025, 8:01 p.m. This repo has been linked 0 different CVEs too.
Showing 10 of 51059 Results

Filters