Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Sept. 13, 2024, 11 a.m.

    An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.

    Python

    Updated: 1 year, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 15, 2022, 12:24 a.m. This repo has been linked 1 different CVEs too.
  • May 14, 2022, 8:45 p.m.

    None

    Dockerfile Java

    Updated: 3 years, 10 months ago
    0 stars 0 fork 0 watcher
    Born at : May 14, 2022, 8:45 p.m. This repo has been linked 1 different CVEs too.
  • May 14, 2022, 2:07 p.m.

    None

    Ruby Shell HTML Procfile SCSS

    Updated: 3 years, 10 months ago
    0 stars 0 fork 0 watcher
    Born at : May 14, 2022, 1:29 p.m. This repo has been linked 0 different CVEs too.
  • Oct. 7, 2022, 7:03 a.m.

    None

    Updated: 3 years, 6 months ago
    0 stars 0 fork 0 watcher
    Born at : May 14, 2022, 1:10 p.m. This repo has been linked 0 different CVEs too.
  • June 28, 2025, 11:38 a.m.

    SAP penetration testing Web and network cheatsheet

    cve nfs penetration-testing redirection sap web-application

    Updated: 9 months, 1 week ago
    16 stars 3 fork 3 watcher
    Born at : May 14, 2022, 1:09 p.m. This repo has been linked 4 different CVEs too.
  • March 12, 2025, 8:55 p.m.

    An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Bug Bounty in Cybersecurity.

    bounty bug bug-bounty-automation bug-bounty-tools bugbounty

    Shell

    Updated: 1 year ago
    40 stars 11 fork 11 watcher
    Born at : May 14, 2022, 12:13 p.m. This repo has been linked 1 different CVEs too.
  • June 20, 2025, 4:01 p.m.

    An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Honey Pots in Cybersecurity.

    cyber cybersecurity honeypot honeypots

    Python

    Updated: 9 months, 3 weeks ago
    14 stars 4 fork 4 watcher
    Born at : May 14, 2022, 12:12 p.m. This repo has been linked 5 different CVEs too.
  • July 6, 2025, 12:01 a.m.

    An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and practical resources

    penetration-automation penetration-challenges penetration-depth penetration-test-framework penetration-testing penetration-testing-framework pentesting

    Makefile CSS Batchfile PowerShell Python

    Updated: 9 months ago
    19 stars 7 fork 7 watcher
    Born at : May 14, 2022, 11:59 a.m. This repo has been linked 2 different CVEs too.
  • April 9, 2025, 4:58 p.m.

    Artifact for ICSE 2023

    java

    Java

    Updated: 1 year ago
    49 stars 4 fork 4 watcher
    Born at : May 14, 2022, 11:35 a.m. This repo has been linked 2 different CVEs too.
  • Jan. 11, 2025, 8:49 a.m.

    The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.

    Updated: 1 year, 2 months ago
    44 stars 14 fork 14 watcher
    Born at : May 14, 2022, 9:27 a.m. This repo has been linked 1 different CVEs too.
Showing 10 of 68392 Results

Filters