Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Oct. 19, 2020, 5:31 p.m.

    PCMan is win32 application that is vulnerable to buffer overflow attack

    Updated: 5 years ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 6:14 p.m. This repo has been linked 1 different CVEs too.
  • Oct. 29, 2024, 4 p.m.

    PoC for CVE-2020-1015

    C++

    Updated: 1 year ago
    40 stars 8 fork 8 watcher
    Born at : May 13, 2020, 4:42 p.m. This repo has been linked 1 different CVEs too.
  • July 14, 2025, 8:58 a.m.

    None

    Updated: 4 months ago
    1 stars 0 fork 0 watcher
    Born at : May 13, 2020, 3:43 p.m. This repo has been linked 1 different CVEs too.
  • March 30, 2025, 6:01 a.m.

    practice

    Dockerfile Shell Python Makefile C++ C

    Updated: 7 months, 2 weeks ago
    3 stars 2 fork 2 watcher
    Born at : May 13, 2020, 2:52 p.m. This repo has been linked 1 different CVEs too.
  • June 20, 2022, 9:35 a.m.

    Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id

    Updated: 3 years, 4 months ago
    1 stars 0 fork 0 watcher
    Born at : May 13, 2020, 2:37 p.m. This repo has been linked 1 different CVEs too.
  • May 13, 2020, 2:32 p.m.

    Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id

    Updated: 5 years, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 2:31 p.m. This repo has been linked 1 different CVEs too.
  • Nov. 6, 2020, 1:57 p.m.

    None

    Jupyter Notebook

    Updated: 5 years ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 9:59 a.m. This repo has been linked 1 different CVEs too.
  • Feb. 17, 2025, 7:07 a.m.

    Proof of concept for Weblogic CVE-2020-2883

    Java

    Updated: 8 months, 4 weeks ago
    15 stars 1 fork 1 watcher
    Born at : May 13, 2020, 9:56 a.m. This repo has been linked 1 different CVEs too.
  • May 13, 2020, 9:51 a.m.

    None

    Python

    Updated: 5 years, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 9:51 a.m. This repo has been linked 1 different CVEs too.
  • Jan. 19, 2024, 5:33 p.m.

    Eternalblue Exploit Was Developed By The NSA Which Is The National Security Agency In United States. Essentially What Happened Or How It Was Released Is That There Were Few Testimonies From NSA Employees, And It Was Leaked By The Shadow Brokers Hacker Group On April 14th 2017.And Then It Was Utilized Worldwide For The WANNACRY Ransomware attack and it was used to share the ransomware all around the world. Eternalblue Exploit a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. And the exploit is denoted under the entry CVE 2017 0 144.The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.it is exist in different versions of windows and essentially what it does is it mishandles especially crafted packets that are been sent from the remote hackers and allowing this hackers to execute arbitrary code on the target computer. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption

    Updated: 1 year, 9 months ago
    2 stars 1 fork 1 watcher
    Born at : May 13, 2020, 8:46 a.m. This repo has been linked 0 different CVEs too.
Showing 10 of 54529 Results

Filters