Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • March 4, 2026, 9:08 p.m.

    MCP implementation of George Orwell's essay "Politics and the English Language"

    Python

    Updated: 4 weeks, 2 days ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 8:40 p.m. This repo has been linked 1 different CVEs too.
  • March 8, 2026, 10:12 p.m.

    High-speed modular vulnerability assessment CLI tool for reconnaissance, port scanning, directory enumeration, and security testing.

    Python

    Updated: 3 weeks, 5 days ago
    1 stars 0 fork 0 watcher
    Born at : March 4, 2026, 8:16 p.m. This repo has been linked 1 different CVEs too.
  • March 7, 2026, 6:33 p.m.

    A portfolio of practical hands-on projects completed in the Cyber Range.

    PowerShell

    Updated: 4 weeks ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 8:14 p.m. This repo has been linked 1 different CVEs too.
  • March 7, 2026, 3:15 p.m.

    None

    HTML JavaScript

    Updated: 4 weeks ago
    2 stars 0 fork 0 watcher
    Born at : March 4, 2026, 8:13 p.m. This repo has been linked 1 different CVEs too.
  • March 7, 2026, 6 a.m.

    Advanced Network Port Scanner, Vulnerability Detector & Security Assessment Tool built with Node.js

    HTML JavaScript CSS

    Updated: 4 weeks ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 8:04 p.m. This repo has been linked 13 different CVEs too.
  • March 19, 2026, 12:58 p.m.

    🐺 Arctic Wolf's Last Stand: Official Season 2 Writeups for the Tundra Realm Cyber Defense Gauntlet. Log analysis, digital forensics, and threat hunting in a frozen cybersecurity battleground.

    adversary-emulation ctf-solutions incident-response log-forensics malware-analysis offsec security-research threat-hunting arctic-howl tundra-realm

    Updated: 2 weeks, 2 days ago
    6 stars 0 fork 0 watcher
    Born at : March 4, 2026, 7:49 p.m. This repo has been linked 1 different CVEs too.
  • March 11, 2026, 11:13 p.m.

    None

    Shell PowerShell

    Updated: 3 weeks, 2 days ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 7:42 p.m. This repo has been linked 2 different CVEs too.
  • March 4, 2026, 7:58 p.m.

    None

    Python

    Updated: 1 month ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 7:40 p.m. This repo has been linked 1 different CVEs too.
  • March 4, 2026, 7:53 p.m.

    Improper Authentication (CWE-287)

    Updated: 1 month ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 7:35 p.m. This repo has been linked 1 different CVEs too.
  • March 5, 2026, 10:52 p.m.

    How to use Hackerdogs MCP Servers and API

    Updated: 4 weeks, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 4, 2026, 7:23 p.m. This repo has been linked 0 different CVEs too.
Showing 10 of 67462 Results

Filters