Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Aug. 18, 2025, 3:29 p.m.

    None

    Python

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 3:25 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 18, 2025, 3:48 p.m.

    This repository serves as a central index (“link tree”) to my research into known vulnerabilities (CVEs). The goal is to strengthen technical understanding of how these flaws arise, how they are safely reproduced in controlled environments, and what mitigations can be applied to defend against them.

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 3:16 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 19, 2025, 8:22 a.m.

    Набор примеров pdql собранные из стандартных, показанных на презентациях, выкладываемых в чатах и разработанных лично

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 2:46 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 13, 2025, 5:08 p.m.

    EPSS client for python

    cve epss security vulnerability

    Python Makefile Shell

    Updated: 3 weeks, 4 days ago
    7 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 2:09 p.m. This repo has been linked 5 different CVEs too.
  • Aug. 18, 2025, 2:10 p.m.

    PoCs for 2025 ImageMagick vulnerabilities – integer overflow, alpha channel bypass, colorspace overflow, and crash bugs."

    cve-2025 imagemagick poc security vulnerability cve-2025-55004 cve-2025-55005 cve-2025-55154 cve-2025-55160 cve-2025-imagemagick-security-poc-vulnerability

    Python

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 2:02 p.m. This repo has been linked 4 different CVEs too.
  • Aug. 18, 2025, 2:06 p.m.

    None

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 1:54 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 18, 2025, 2:54 p.m.

    Here’s how you can manually test suspicious findings step by step:

    Shell

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 1:42 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 18, 2025, 1:41 p.m.

    CVE-2015-6967 PoC Exploit

    Python

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 1:34 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 18, 2025, 12:58 p.m.

    None

    Shell Java Mustache Ruby

    Updated: 1 month, 2 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 18, 2025, 12:57 p.m. This repo has been linked 1 different CVEs too.
  • Aug. 24, 2025, 9:20 a.m.

    [GRATIS] La Biblia Negrísima del Ethical Hacker: un viaje profundo al Red Team, con técnicas de hacking ético, OSINT, Nmap, Metasploit, evasión, ingeniería social y ataques avanzados. Pensar como atacante para defender como maestro.

    ethical-hacking hacking

    Updated: 1 month, 2 weeks ago
    103 stars 17 fork 17 watcher
    Born at : Aug. 18, 2025, 12:51 p.m. This repo has been linked 2 different CVEs too.
Showing 10 of 52133 Results

Filters