Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
June 25, 2025, 3:04 a.m.
None
Java
Updated: 9 months, 1 week ago3 stars 0 fork 0 watcherBorn at : June 17, 2024, 8:44 p.m. This repo has been linked 1 different CVEs too. -
Aug. 23, 2024, 2:59 a.m.
CVE-2024-4577 POC
Updated: 1 year, 7 months ago2 stars 0 fork 0 watcherBorn at : June 17, 2024, 5:53 p.m. This repo has been linked 1 different CVEs too. -
June 28, 2024, 8:38 a.m.
None
Python
Updated: 1 year, 9 months ago8 stars 6 fork 6 watcherBorn at : June 17, 2024, 5:48 p.m. This repo has been linked 1 different CVEs too. -
June 17, 2024, 9:04 p.m.
Expolit for CVE-2024-23334 (aiohttp >= 1.0.5> && <=3.9.1)
Dockerfile Python
Updated: 1 year, 9 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 4:28 p.m. This repo has been linked 1 different CVEs too. -
June 17, 2024, 11 p.m.
None
Dockerfile PHP CSS JavaScript Python
Updated: 1 year, 9 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 3:12 p.m. This repo has been linked 1 different CVEs too. -
June 17, 2024, 3:07 p.m.
None
Shell Python
Updated: 1 year, 9 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 3:05 p.m. This repo has been linked 20 different CVEs too. -
June 17, 2024, 2:50 p.m.
None
Python
Updated: 1 year, 9 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 2:49 p.m. This repo has been linked 1 different CVEs too. -
June 18, 2024, 11:02 p.m.
Remote denial of service exploit
Python
Updated: 1 year, 9 months ago2 stars 0 fork 0 watcherBorn at : June 17, 2024, 2:37 p.m. This repo has been linked 1 different CVEs too. -
July 8, 2024, 3:32 p.m.
Each container also gets its own network stack, meaning that a container doesn't get privileged access to the sockets or interfaces of another container. Of course, if the host system is setup accordingly, containers can interact with each other through their respective network interfaces just like they can interact with external hosts.
docker security
Updated: 1 year, 8 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 1:58 p.m. This repo has been linked 2 different CVEs too. -
June 17, 2024, 1:19 p.m.
Roadmap for Tryhackme
Updated: 1 year, 9 months ago0 stars 0 fork 0 watcherBorn at : June 17, 2024, 1:18 p.m. This repo has been linked 5 different CVEs too.