Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • May 13, 2020, 11:23 p.m.

    None

    Updated: 5 years, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 11:12 p.m. This repo has been linked 3 different CVEs too.
  • March 8, 2024, 1:09 a.m.

    All projects in the topic awesome scraped by See Urchin and post-processed by Firm.Watch AI/ML Filters

    awesome awesome-list archives

    Updated: 1 year, 8 months ago
    66 stars 13 fork 13 watcher
    Born at : May 13, 2020, 9:47 p.m. This repo has been linked 0 different CVEs too.
  • Aug. 11, 2022, 9:35 p.m.

    None

    C#

    Updated: 3 years, 3 months ago
    3 stars 1 fork 1 watcher
    Born at : May 13, 2020, 6:17 p.m. This repo has been linked 1 different CVEs too.
  • Oct. 19, 2020, 5:31 p.m.

    PCMan is win32 application that is vulnerable to buffer overflow attack

    Updated: 5 years ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 6:14 p.m. This repo has been linked 1 different CVEs too.
  • Oct. 29, 2024, 4 p.m.

    PoC for CVE-2020-1015

    C++

    Updated: 1 year ago
    40 stars 8 fork 8 watcher
    Born at : May 13, 2020, 4:42 p.m. This repo has been linked 1 different CVEs too.
  • July 14, 2025, 8:58 a.m.

    None

    Updated: 4 months ago
    1 stars 0 fork 0 watcher
    Born at : May 13, 2020, 3:43 p.m. This repo has been linked 1 different CVEs too.
  • March 30, 2025, 6:01 a.m.

    practice

    Dockerfile Shell Python Makefile C++ C

    Updated: 7 months, 2 weeks ago
    3 stars 2 fork 2 watcher
    Born at : May 13, 2020, 2:52 p.m. This repo has been linked 1 different CVEs too.
  • June 20, 2022, 9:35 a.m.

    Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id

    Updated: 3 years, 4 months ago
    1 stars 0 fork 0 watcher
    Born at : May 13, 2020, 2:37 p.m. This repo has been linked 1 different CVEs too.
  • May 13, 2020, 2:32 p.m.

    Even though user permissions in the sudoer file mentions that it explicitly prevents users running commands as root, the security bypass vulnerability allows the users with Linux systems to execute commands as root. A user which as ALL permissions in the Runas specifications can execute these commands on any or all the users of the system. This vulnerability allows the users to specify their user ID as -1 or the unsigned equivalent of -1: 4294967295 and this allows the users to run commands and tools as root. sudo -u#-1 /usr/bin/id or the unsigned equivalent of -1 sudo -u#4294967295 /usr/bin/id

    Updated: 5 years, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 2:31 p.m. This repo has been linked 1 different CVEs too.
  • Nov. 6, 2020, 1:57 p.m.

    None

    Jupyter Notebook

    Updated: 5 years ago
    0 stars 0 fork 0 watcher
    Born at : May 13, 2020, 9:59 a.m. This repo has been linked 1 different CVEs too.
Showing 10 of 54594 Results

Filters