Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • July 8, 2025, 5:04 p.m.

    Vault Exploit Defense

    Makefile Shell C

    Updated: 9 months ago
    127 stars 19 fork 19 watcher
    Born at : June 16, 2022, 11:15 a.m. This repo has been linked 12 different CVEs too.
  • June 16, 2022, 11:13 a.m.

    None

    Dockerfile

    Updated: 3 years, 9 months ago
    0 stars 0 fork 0 watcher
    Born at : June 16, 2022, 11:01 a.m. This repo has been linked 0 different CVEs too.
  • June 16, 2022, 10:09 a.m.

    None

    Updated: 3 years, 9 months ago
    0 stars 0 fork 0 watcher
    Born at : June 16, 2022, 10:09 a.m. This repo has been linked 0 different CVEs too.
  • Nov. 23, 2024, 10:24 p.m.

    Log4shell waveforms for ACARS, ADS-B, and AIS

    acars ads-b ais cve-2021-44228 hackrf log4shell

    Python

    Updated: 1 year, 4 months ago
    7 stars 1 fork 1 watcher
    Born at : June 16, 2022, 9:47 a.m. This repo has been linked 1 different CVEs too.
  • April 5, 2025, 8:51 a.m.

    A Insecure direct object references (IDOR) vulnerability in "Simple 2FA Plugin for Moodle" by LMS Doctor

    Updated: 1 year ago
    2 stars 0 fork 0 watcher
    Born at : June 16, 2022, 8:52 a.m. This repo has been linked 1 different CVEs too.
  • Feb. 16, 2023, 7:28 a.m.

    Practiced several system security exploits with C language in a specific Linux image, most of which aim to achieve root privileges or tamper with some data, breaking the integrity or/and the confidentiality of the system. Some general techniques applied to the vulnerable custom programs include stack overflow, integer overflow, format string tricks, double free, return-to-libc, rop. More than that, some vulnerabilities once existed in the real-world Linux versions are also exploited, including SUDO and GHTTPD.

    Shell C Makefile HTML GDB Roff Perl Yacc Lex Pascal

    Updated: 3 years, 1 month ago
    2 stars 1 fork 1 watcher
    Born at : June 16, 2022, 5:46 a.m. This repo has been linked 2 different CVEs too.
  • June 16, 2022, 4:51 a.m.

    Course Repository

    Python

    Updated: 3 years, 9 months ago
    0 stars 1 fork 1 watcher
    Born at : June 16, 2022, 4:51 a.m. This repo has been linked 0 different CVEs too.
  • April 28, 2025, 3:42 p.m.

    Synology NAS file management from command-line

    synology synology-nas quickconnect

    Makefile Python

    Updated: 11 months, 1 week ago
    24 stars 1 fork 1 watcher
    Born at : June 16, 2022, 4:28 a.m. This repo has been linked 2 different CVEs too.
  • Sept. 6, 2023, 2:59 a.m.

    some pythn tools

    Python

    Updated: 2 years, 7 months ago
    4 stars 10 fork 10 watcher
    Born at : June 16, 2022, 2:59 a.m. This repo has been linked 0 different CVEs too.
  • Sept. 27, 2024, 8:31 p.m.

    None

    Updated: 1 year, 6 months ago
    1 stars 0 fork 0 watcher
    Born at : June 16, 2022, 2:03 a.m. This repo has been linked 5 different CVEs too.
Showing 10 of 68052 Results

Filters