Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
March 11, 2026, 3:59 a.m.
Scripts en Python para la explotación de CVE-2024-51482 (SQLi en ZoneMinder) — HTB CCTV
Python
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 3:05 a.m. This repo has been linked 1 different CVEs too. -
March 17, 2026, 9:01 p.m.
NetLogic is an advanced network analysis and cybersecurity toolkit for traffic inspection, packet analysis, and threat detection
cve-scanning cybersecurity cybersecurity-tools network-reconnaissance network-tool networking packet-analysis python security-tools traffic-analysis
Batchfile Python HTML JavaScript NSIS
Updated: 2 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 3:03 a.m. This repo has been linked 7 different CVEs too. -
March 11, 2026, 6:06 a.m.
Enterprise cybersecurity threat intelligence — log analysis, IOC detection, CVE correlation, SIEM integration
Dockerfile Python
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 3:02 a.m. This repo has been linked 1 different CVEs too. -
March 16, 2026, 1:07 p.m.
A repository full of malicious ML model file generators for security scanner testing and red-team exercises.
Python
Updated: 2 weeks, 4 days ago1 stars 1 fork 1 watcherBorn at : March 11, 2026, 2:32 a.m. This repo has been linked 4 different CVEs too. -
March 11, 2026, 11 p.m.
Proof of concept exploit for CVE-2019-10068.
Python
Updated: 3 weeks, 1 day ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 2:09 a.m. This repo has been linked 1 different CVEs too. -
March 12, 2026, 3:31 a.m.
End-to-end vulnerability management program simulation — policy creation, stakeholder buy-in, credentialed Tenable scans, prioritized remediation, and full validation cycle. Reduced 34 vulnerabilities to 5 across 4 remediation rounds using PowerShell automation on Azure VMs.
PowerShell
Updated: 3 weeks, 1 day ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 1:51 a.m. This repo has been linked 1 different CVEs too. -
March 11, 2026, 1:47 a.m.
None
Python
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 1:40 a.m. This repo has been linked 1 different CVEs too. -
March 11, 2026, 2:17 a.m.
None
Python
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 1:30 a.m. This repo has been linked 1 different CVEs too. -
March 11, 2026, 2:53 a.m.
None
JavaScript TypeScript CSS
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 1:25 a.m. This repo has been linked 1 different CVEs too. -
March 11, 2026, 1:55 a.m.
Demo of the algorithm confusion attack on various JWT libraries
Python JavaScript HTML CSS
Updated: 3 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : March 11, 2026, 1:05 a.m. This repo has been linked 1 different CVEs too.