Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • July 19, 2025, 6:53 p.m.

    None

    Updated: 1 month, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:50 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 2:44 p.m.

    A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]

    Python

    Updated: 1 month, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:41 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 6:53 p.m.

    None

    Updated: 1 month, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:35 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 6:53 p.m.

    None

    Updated: 1 month, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:34 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 6:53 p.m.

    None

    Updated: 1 month, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:27 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 2:24 p.m.

    None

    Updated: 1 month, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:23 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 2:15 p.m.

    None

    Updated: 1 month, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:15 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 2:15 p.m.

    Trust Wallet Vulnerability Brute Force Crack software. Wallet entropy is based on a weak PRNG with an initial state of 31 bits and seeded with an easy-to-guess time value. This makes all wallets generated with the vulnerable application version susceptible to remote brute force. It is commonly used in brainflayer, keyhunt, BitCrack, VanitySearch

    bitcoin brute-force crack crypto cryptocurrency dogecoin ethereum hacking litecoin trust-wallet

    C++

    Updated: 1 month, 3 weeks ago
    1 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:08 p.m. This repo has been linked 3 different CVEs too.
  • July 19, 2025, 2:08 p.m.

    None

    Updated: 1 month, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : July 19, 2025, 2:07 p.m. This repo has been linked 1 different CVEs too.
  • July 19, 2025, 3:18 p.m.

    Proof-of-Concept exploit for CVE-2025-7795 – A buffer overflow vulnerability affecting certain Tenda routers. The exploit sends crafted POST requests to trigger a crash and confirms the impact using ICMP (ping) checks.

    C

    Updated: 1 month, 3 weeks ago
    2 stars 0 fork 0 watcher
    Born at : July 19, 2025, 1:47 p.m. This repo has been linked 1 different CVEs too.
Showing 10 of 50618 Results

Filters