Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Feb. 23, 2026, 3:43 p.m.
This repository serves as a central index (“link tree”) to my research into known vulnerabilities (CVEs). The goal is to strengthen technical understanding of how these flaws arise, how they are safely reproduced in controlled environments, and what mitigations can be applied to defend against them.
Updated: 2 months ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 3:16 p.m. This repo has been linked 1 different CVEs too. -
April 16, 2026, 7:30 p.m.
Набор примеров pdql собранные из стандартных, показанных на презентациях, выкладываемых в чатах и разработанных лично
Updated: 1 week, 3 days ago2 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:46 p.m. This repo has been linked 1 different CVEs too. -
Sept. 13, 2025, 5:08 p.m.
EPSS client for python
cve epss security vulnerability
Python Makefile Shell
Updated: 7 months, 1 week ago7 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:09 p.m. This repo has been linked 5 different CVEs too. -
Aug. 18, 2025, 2:10 p.m.
PoCs for 2025 ImageMagick vulnerabilities – integer overflow, alpha channel bypass, colorspace overflow, and crash bugs."
cve-2025 imagemagick poc security vulnerability cve-2025-55004 cve-2025-55005 cve-2025-55154 cve-2025-55160 cve-2025-imagemagick-security-poc-vulnerability
Python
Updated: 8 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:02 p.m. This repo has been linked 4 different CVEs too. -
Aug. 18, 2025, 2:06 p.m.
None
Updated: 8 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:54 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 2:54 p.m.
Here’s how you can manually test suspicious findings step by step:
Shell
Updated: 8 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:42 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 1:41 p.m.
CVE-2015-6967 PoC Exploit
Python
Updated: 8 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:34 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 12:58 p.m.
None
Shell Java Mustache Ruby
Updated: 8 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 12:57 p.m. This repo has been linked 1 different CVEs too. -
April 20, 2026, 10:04 p.m.
An open directory war dialer
samba security-tools shodan-api dorking-tool opendirectories opendirectory smb
Python
Updated: 6 days, 6 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 12:55 p.m. This repo has been linked 3 different CVEs too. -
Aug. 24, 2025, 9:20 a.m.
[GRATIS] La Biblia Negrísima del Ethical Hacker: un viaje profundo al Red Team, con técnicas de hacking ético, OSINT, Nmap, Metasploit, evasión, ingeniería social y ataques avanzados. Pensar como atacante para defender como maestro.
ethical-hacking hacking
Updated: 8 months ago103 stars 17 fork 17 watcherBorn at : Aug. 18, 2025, 12:51 p.m. This repo has been linked 2 different CVEs too.