Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Oct. 19, 2020, 5:31 p.m.
PCMan is win32 application that is vulnerable to buffer overflow attack
Updated: 5 years ago0 stars 0 fork 0 watcherBorn at : May 13, 2020, 6:14 p.m. This repo has been linked 1 different CVEs too. -
Oct. 29, 2024, 4 p.m.
PoC for CVE-2020-1015
C++
Updated: 1 year ago40 stars 8 fork 8 watcherBorn at : May 13, 2020, 4:42 p.m. This repo has been linked 1 different CVEs too. -
July 14, 2025, 8:58 a.m.
None
Updated: 4 months ago1 stars 0 fork 0 watcherBorn at : May 13, 2020, 3:43 p.m. This repo has been linked 1 different CVEs too. -
March 30, 2025, 6:01 a.m.
practice
Dockerfile Shell Python Makefile C++ C
Updated: 7 months, 2 weeks ago3 stars 2 fork 2 watcherBorn at : May 13, 2020, 2:52 p.m. This repo has been linked 1 different CVEs too. -
June 20, 2022, 9:35 a.m.
Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id
Updated: 3 years, 4 months ago1 stars 0 fork 0 watcherBorn at : May 13, 2020, 2:37 p.m. This repo has been linked 1 different CVEs too. -
May 13, 2020, 2:32 p.m.
Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id
Updated: 5 years, 6 months ago0 stars 0 fork 0 watcherBorn at : May 13, 2020, 2:31 p.m. This repo has been linked 1 different CVEs too. -
Nov. 6, 2020, 1:57 p.m.
None
Jupyter Notebook
Updated: 5 years ago0 stars 0 fork 0 watcherBorn at : May 13, 2020, 9:59 a.m. This repo has been linked 1 different CVEs too. -
Feb. 17, 2025, 7:07 a.m.
Proof of concept for Weblogic CVE-2020-2883
Java
Updated: 8 months, 4 weeks ago15 stars 1 fork 1 watcherBorn at : May 13, 2020, 9:56 a.m. This repo has been linked 1 different CVEs too. -
May 13, 2020, 9:51 a.m.
None
Python
Updated: 5 years, 6 months ago0 stars 0 fork 0 watcherBorn at : May 13, 2020, 9:51 a.m. This repo has been linked 1 different CVEs too. -
Jan. 19, 2024, 5:33 p.m.
Eternalblue Exploit Was Developed By The NSA Which Is The National Security Agency In United States. Essentially What Happened Or How It Was Released Is That There Were Few Testimonies From NSA Employees, And It Was Leaked By The Shadow Brokers Hacker Group On April 14th 2017.And Then It Was Utilized Worldwide For The WANNACRY Ransomware attack and it was used to share the ransomware all around the world. Eternalblue Exploit a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. And the exploit is denoted under the entry CVE 2017 0 144.The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.it is exist in different versions of windows and essentially what it does is it mishandles especially crafted packets that are been sent from the remote hackers and allowing this hackers to execute arbitrary code on the target computer. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
Updated: 1 year, 9 months ago2 stars 1 fork 1 watcherBorn at : May 13, 2020, 8:46 a.m. This repo has been linked 0 different CVEs too.