Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
May 1, 2025, 6:14 p.m.
OSS - Spring Security Vulnerability Reachability Evaluation
Java Python JavaScript HTML CSS Dockerfile
Updated: 9 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : May 1, 2025, 6:06 p.m. This repo has been linked 26 different CVEs too.CVE-2023-34034 CVE-2023-34035 CVE-2023-20860 CVE-2022-31692 CVE-2022-22979 CVE-2022-22978 CVE-2022-22965 CVE-2022-22963 CVE-2022-22947 CVE-2021-22053 CVE-2021-21234 CVE-2020-5421 CVE-2020-5412 CVE-2020-5410 CVE-2020-5405 CVE-2020-5398 CVE-2019-3799 CVE-2018-1261 CVE-2018-1260 CVE-2018-1259 CVE-2018-1273 CVE-2018-1270 CVE-2017-8046 CVE-2016-4977 CVE-2015-5211 CVE-2013-4152 -
May 1, 2025, 5:33 p.m.
CVE-2023-40355 checker
axigen-mail-server xss-vulnerability
Python
Updated: 9 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : May 1, 2025, 5:16 p.m. This repo has been linked 1 different CVEs too. -
May 1, 2025, 5:15 p.m.
None
Updated: 9 months, 2 weeks ago0 stars 0 fork 0 watcherBorn at : May 1, 2025, 5:14 p.m. This repo has been linked 1 different CVEs too. -
Aug. 28, 2025, 11:56 p.m.
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework lnk lnk-builder lnk-cve lnk-exploit lnk-payloads lnk-rce lnk-shortcut lnk-stomping slient-exploit-builder
Visual Basic .NET
Updated: 5 months, 3 weeks ago12 stars 3 fork 3 watcherBorn at : May 1, 2025, 4:35 p.m. This repo has been linked 0 different CVEs too. -
Aug. 28, 2025, 11:59 p.m.
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework reg reg-downloader reg-exploit reg-fud reg-password reg-setup registry registry-exploit slient-exploit-builder
Visual Basic .NET
Updated: 5 months, 3 weeks ago4 stars 0 fork 0 watcherBorn at : May 1, 2025, 4:35 p.m. This repo has been linked 1 different CVEs too. -
Aug. 28, 2025, 11:59 p.m.
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
cve cve-2025-44228 cve-scanning doc doc-builder doc-cve doc-exploit doc-malware doc-payloads exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework office office-365 slient-exploit-builder
Visual Basic .NET
Updated: 5 months, 3 weeks ago4 stars 2 fork 2 watcherBorn at : May 1, 2025, 4:35 p.m. This repo has been linked 0 different CVEs too. -
July 7, 2025, 8:23 p.m.
None
C#
Updated: 7 months, 1 week ago0 stars 0 fork 0 watcherBorn at : May 1, 2025, 4:27 p.m. This repo has been linked 1 different CVEs too. -
July 1, 2025, 8:30 p.m.
An AI-powered tool to predict and prevent zero-day attacks on firewalls, like Palo Alto’s CVE-2024-3400. Uses Python, Wireshark, MITRE ATT&CK datasets, and Docker for real-time anomaly detection.
Updated: 7 months, 2 weeks ago1 stars 0 fork 0 watcherBorn at : May 1, 2025, 3:47 p.m. This repo has been linked 1 different CVEs too. -
Aug. 15, 2025, 2:40 p.m.
A simulation of a penetration test targeting a vulnerable Oracle Database (OracleDB) dockerized instance.
Updated: 6 months ago0 stars 0 fork 0 watcherBorn at : May 1, 2025, 3:44 p.m. This repo has been linked 5 different CVEs too. -
June 14, 2025, 11:22 p.m.
My write ups for CTF's on Try Hack Me
Updated: 8 months ago0 stars 1 fork 1 watcherBorn at : May 1, 2025, 3:05 p.m. This repo has been linked 1 different CVEs too.