Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Oct. 15, 2024, 4:58 p.m.

    我的全部CVE引用归档

    cve cve-report

    Updated: 1 year, 5 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 6:27 p.m. This repo has been linked 2 different CVEs too.
  • Aug. 9, 2024, 8:29 a.m.

    This project focuses on building and enriching a vulnerability database by analyzing NIST vulnerability feeds for 2023 and 2024. The goal is to filter and store Java-related vulnerabilities, ensuring that our database provides accurate and timely information to security engineers.

    Python

    Updated: 1 year, 7 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 6:26 p.m. This repo has been linked 1 different CVEs too.
  • July 6, 2025, 1:03 a.m.

    This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets

    C++

    Updated: 9 months ago
    24 stars 7 fork 7 watcher
    Born at : Aug. 5, 2024, 4:55 p.m. This repo has been linked 1 different CVEs too.
  • June 4, 2025, 5:49 a.m.

    An Vulnerability detection and Exploitation tool for CVE-2024-7339

    Python

    Updated: 10 months ago
    17 stars 5 fork 5 watcher
    Born at : Aug. 5, 2024, 4:26 p.m. This repo has been linked 1 different CVEs too.
  • April 6, 2026, 8:24 a.m.

    A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deployment, quantum-resistant polymorphic encryption, reverse DoH tunneling with multi-hop proxy chains, and integrated post-exploit modules with SMS/email spoofing capabilities.

    project-red-sword

    Shell Python HTML JavaScript CSS Dockerfile Objective-C C Java Batchfile

    Updated: 2 days, 11 hours ago
    95 stars 34 fork 34 watcher
    Born at : Aug. 5, 2024, 3:55 p.m. This repo has been linked 6 different CVEs too.
  • Aug. 5, 2024, 3:42 p.m.

    Senior Design Product for Cybersecurity Engineering Curriculum

    Shell Python CSS PHP HTML

    Updated: 1 year, 8 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 3:42 p.m. This repo has been linked 7 different CVEs too.
  • Aug. 5, 2024, 4:39 p.m.

    Checks to see if vulnerable components are in the project's BOM and if so, do they match the TOP 25 CWEs or OWAPSP TOP 10 lists.

    Python

    Updated: 1 year, 8 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 3:03 p.m. This repo has been linked 1 different CVEs too.
  • Nov. 18, 2024, 6:01 p.m.

    None

    Java

    Updated: 1 year, 4 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 11 a.m. This repo has been linked 1 different CVEs too.
  • Dec. 28, 2024, 5:18 p.m.

    It's not CounterStrike development

    Updated: 1 year, 3 months ago
    3 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 10:13 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 5, 2024, 10:56 p.m.

    Some test files to make a good nuclei template for a JQuery UI XSS vuln

    HTML

    Updated: 1 year, 8 months ago
    0 stars 0 fork 0 watcher
    Born at : Aug. 5, 2024, 9:31 a.m. This repo has been linked 1 different CVEs too.
Showing 10 of 68052 Results

Filters