Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
April 18, 2025, 3:44 p.m.
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
com office memory-corruption cve-2022-21971 oleload rtf
Rich Text Format
Updated: 1 year ago308 stars 61 fork 61 watcherBorn at : Feb. 26, 2022, 8:37 p.m. This repo has been linked 1 different CVEs too. -
April 17, 2025, 12:27 a.m.
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
cve-2022-21974 com oleload office wordpad memory-corruption rtf
Rich Text Format
Updated: 1 year ago60 stars 11 fork 11 watcherBorn at : Feb. 26, 2022, 6:53 p.m. This repo has been linked 1 different CVEs too. -
Feb. 26, 2022, 5:41 p.m.
Exploit PoC for CVE-2020-18326
HTML
Updated: 4 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 5:30 p.m. This repo has been linked 1 different CVEs too. -
Feb. 26, 2022, 5:21 p.m.
final project offensive report
Updated: 4 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 5:21 p.m. This repo has been linked 3 different CVEs too. -
Feb. 26, 2022, 5:41 p.m.
Exploit PoC for CVE-2020-18325
Updated: 4 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 5:06 p.m. This repo has been linked 1 different CVEs too. -
Feb. 26, 2022, 3:39 p.m.
None
Updated: 4 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 3:39 p.m. This repo has been linked 2 different CVEs too. -
Aug. 22, 2023, 1:40 p.m.
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Shell
Updated: 2 years, 8 months ago6 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 1:52 p.m. This repo has been linked 1 different CVEs too. -
Feb. 26, 2022, 11:12 a.m.
None
Updated: 4 years, 1 month ago0 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 11:12 a.m. This repo has been linked 17 different CVEs too. -
March 6, 2024, 12:03 p.m.
None
Dockerfile Python
Updated: 2 years, 1 month ago2 stars 0 fork 0 watcherBorn at : Feb. 26, 2022, 9:53 a.m. This repo has been linked 1 different CVEs too. -
March 8, 2022, 2:53 a.m.
This script exploits a remote command execution vulnerability in the TPLink WR840N router, using the configure function IPv6 protocol.
Python C
Updated: 4 years, 1 month ago0 stars 1 fork 1 watcherBorn at : Feb. 25, 2022, 10:34 p.m. This repo has been linked 1 different CVEs too.