Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Aug. 18, 2025, 3:29 p.m.
None
Python
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 3:25 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 3:48 p.m.
This repository serves as a central index (“link tree”) to my research into known vulnerabilities (CVEs). The goal is to strengthen technical understanding of how these flaws arise, how they are safely reproduced in controlled environments, and what mitigations can be applied to defend against them.
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 3:16 p.m. This repo has been linked 1 different CVEs too. -
Aug. 19, 2025, 8:22 a.m.
Набор примеров pdql собранные из стандартных, показанных на презентациях, выкладываемых в чатах и разработанных лично
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:46 p.m. This repo has been linked 1 different CVEs too. -
Sept. 13, 2025, 5:08 p.m.
EPSS client for python
cve epss security vulnerability
Python Makefile Shell
Updated: 3 weeks, 4 days ago7 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:09 p.m. This repo has been linked 5 different CVEs too. -
Aug. 18, 2025, 2:10 p.m.
PoCs for 2025 ImageMagick vulnerabilities – integer overflow, alpha channel bypass, colorspace overflow, and crash bugs."
cve-2025 imagemagick poc security vulnerability cve-2025-55004 cve-2025-55005 cve-2025-55154 cve-2025-55160 cve-2025-imagemagick-security-poc-vulnerability
Python
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 2:02 p.m. This repo has been linked 4 different CVEs too. -
Aug. 18, 2025, 2:06 p.m.
None
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:54 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 2:54 p.m.
Here’s how you can manually test suspicious findings step by step:
Shell
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:42 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 1:41 p.m.
CVE-2015-6967 PoC Exploit
Python
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 1:34 p.m. This repo has been linked 1 different CVEs too. -
Aug. 18, 2025, 12:58 p.m.
None
Shell Java Mustache Ruby
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Aug. 18, 2025, 12:57 p.m. This repo has been linked 1 different CVEs too. -
Aug. 24, 2025, 9:20 a.m.
[GRATIS] La Biblia Negrísima del Ethical Hacker: un viaje profundo al Red Team, con técnicas de hacking ético, OSINT, Nmap, Metasploit, evasión, ingeniería social y ataques avanzados. Pensar como atacante para defender como maestro.
ethical-hacking hacking
Updated: 1 month, 2 weeks ago103 stars 17 fork 17 watcherBorn at : Aug. 18, 2025, 12:51 p.m. This repo has been linked 2 different CVEs too.