Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Feb. 1, 2023, 3:44 p.m.
None
Shell Dockerfile Makefile Batchfile Python CSS Jupyter Notebook
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 5:56 p.m. This repo has been linked 0 different CVEs too. -
Jan. 31, 2023, 5:24 p.m.
None
C C++ Makefile Rust LLVM Shell
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 5:20 p.m. This repo has been linked 0 different CVEs too. -
Feb. 1, 2023, 5:25 p.m.
None
Java
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 5:13 p.m. This repo has been linked 1 different CVEs too. -
Jan. 31, 2023, 5:07 p.m.
Patches CVE-2022-41099
PowerShell
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 5:06 p.m. This repo has been linked 1 different CVEs too. -
Jan. 31, 2023, 11:48 p.m.
None
PowerShell
Updated: 3 years, 2 months ago1 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 4:55 p.m. This repo has been linked 0 different CVEs too. -
Jan. 31, 2023, 3:03 p.m.
CVE-2018-6574 go get
C Go
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 3:01 p.m. This repo has been linked 1 different CVEs too. -
April 3, 2023, 7:17 a.m.
None
Updated: 3 years ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 2:56 p.m. This repo has been linked 2 different CVEs too. -
Feb. 20, 2023, 12:06 p.m.
PowerShell Remote Code Execution Vulnerability. CVE project by @Sn0wAlice
Updated: 3 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 2:32 p.m. This repo has been linked 1 different CVEs too. -
Feb. 1, 2023, 11:03 a.m.
In this I will explain how to bypass Windows 10 ,make the attack persistence also UAC bypass on the target machine. We will be doing this with the help of payload created in kali linux.
Updated: 3 years, 2 months ago0 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 2:05 p.m. This repo has been linked 0 different CVEs too. -
Feb. 6, 2023, 12:05 p.m.
h2 Goat This is the homework 2 for information security lesson
Updated: 3 years, 1 month ago2 stars 0 fork 0 watcherBorn at : Jan. 31, 2023, 1:56 p.m. This repo has been linked 0 different CVEs too.