Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Oct. 15, 2024, 4:58 p.m.
我的全部CVE引用归档
cve cve-report
Updated: 1 year, 5 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 6:27 p.m. This repo has been linked 2 different CVEs too. -
Aug. 9, 2024, 8:29 a.m.
This project focuses on building and enriching a vulnerability database by analyzing NIST vulnerability feeds for 2023 and 2024. The goal is to filter and store Java-related vulnerabilities, ensuring that our database provides accurate and timely information to security engineers.
Python
Updated: 1 year, 7 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 6:26 p.m. This repo has been linked 1 different CVEs too. -
July 6, 2025, 1:03 a.m.
This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets
C++
Updated: 9 months ago24 stars 7 fork 7 watcherBorn at : Aug. 5, 2024, 4:55 p.m. This repo has been linked 1 different CVEs too. -
June 4, 2025, 5:49 a.m.
An Vulnerability detection and Exploitation tool for CVE-2024-7339
Python
Updated: 10 months ago17 stars 5 fork 5 watcherBorn at : Aug. 5, 2024, 4:26 p.m. This repo has been linked 1 different CVEs too. -
April 6, 2026, 8:24 a.m.
A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deployment, quantum-resistant polymorphic encryption, reverse DoH tunneling with multi-hop proxy chains, and integrated post-exploit modules with SMS/email spoofing capabilities.
project-red-sword
Shell Python HTML JavaScript CSS Dockerfile Objective-C C Java Batchfile
Updated: 2 days, 12 hours ago95 stars 34 fork 34 watcherBorn at : Aug. 5, 2024, 3:55 p.m. This repo has been linked 6 different CVEs too. -
Aug. 5, 2024, 3:42 p.m.
Senior Design Product for Cybersecurity Engineering Curriculum
Shell Python CSS PHP HTML
Updated: 1 year, 8 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 3:42 p.m. This repo has been linked 7 different CVEs too. -
Aug. 5, 2024, 4:39 p.m.
Checks to see if vulnerable components are in the project's BOM and if so, do they match the TOP 25 CWEs or OWAPSP TOP 10 lists.
Python
Updated: 1 year, 8 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 3:03 p.m. This repo has been linked 1 different CVEs too. -
Nov. 18, 2024, 6:01 p.m.
None
Java
Updated: 1 year, 4 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 11 a.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2024, 5:18 p.m.
It's not CounterStrike development
Updated: 1 year, 3 months ago3 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 10:13 a.m. This repo has been linked 1 different CVEs too. -
Aug. 5, 2024, 10:56 p.m.
Some test files to make a good nuclei template for a JQuery UI XSS vuln
HTML
Updated: 1 year, 8 months ago0 stars 0 fork 0 watcherBorn at : Aug. 5, 2024, 9:31 a.m. This repo has been linked 1 different CVEs too.