Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Sept. 13, 2024, 11 a.m.
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
Python
Updated: 1 year, 6 months ago0 stars 0 fork 0 watcherBorn at : May 15, 2022, 12:24 a.m. This repo has been linked 1 different CVEs too. -
May 14, 2022, 8:45 p.m.
None
Dockerfile Java
Updated: 3 years, 10 months ago0 stars 0 fork 0 watcherBorn at : May 14, 2022, 8:45 p.m. This repo has been linked 1 different CVEs too. -
May 14, 2022, 2:07 p.m.
None
Ruby Shell HTML Procfile SCSS
Updated: 3 years, 10 months ago0 stars 0 fork 0 watcherBorn at : May 14, 2022, 1:29 p.m. This repo has been linked 0 different CVEs too. -
Oct. 7, 2022, 7:03 a.m.
None
Updated: 3 years, 6 months ago0 stars 0 fork 0 watcherBorn at : May 14, 2022, 1:10 p.m. This repo has been linked 0 different CVEs too. -
June 28, 2025, 11:38 a.m.
SAP penetration testing Web and network cheatsheet
cve nfs penetration-testing redirection sap web-application
Updated: 9 months, 1 week ago16 stars 3 fork 3 watcherBorn at : May 14, 2022, 1:09 p.m. This repo has been linked 4 different CVEs too. -
March 12, 2025, 8:55 p.m.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Bug Bounty in Cybersecurity.
bounty bug bug-bounty-automation bug-bounty-tools bugbounty
Shell
Updated: 1 year ago40 stars 11 fork 11 watcherBorn at : May 14, 2022, 12:13 p.m. This repo has been linked 1 different CVEs too. -
June 20, 2025, 4:01 p.m.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Honey Pots in Cybersecurity.
cyber cybersecurity honeypot honeypots
Python
Updated: 9 months, 3 weeks ago14 stars 4 fork 4 watcherBorn at : May 14, 2022, 12:12 p.m. This repo has been linked 5 different CVEs too. -
July 6, 2025, 12:01 a.m.
An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and practical resources
penetration-automation penetration-challenges penetration-depth penetration-test-framework penetration-testing penetration-testing-framework pentesting
Makefile CSS Batchfile PowerShell Python
Updated: 9 months ago19 stars 7 fork 7 watcherBorn at : May 14, 2022, 11:59 a.m. This repo has been linked 2 different CVEs too. -
April 9, 2025, 4:58 p.m.
Artifact for ICSE 2023
java
Java
Updated: 1 year ago49 stars 4 fork 4 watcherBorn at : May 14, 2022, 11:35 a.m. This repo has been linked 2 different CVEs too. -
Jan. 11, 2025, 8:49 a.m.
The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.
Updated: 1 year, 2 months ago44 stars 14 fork 14 watcherBorn at : May 14, 2022, 9:27 a.m. This repo has been linked 1 different CVEs too.