Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Oct. 21, 2025, 2:48 p.m.
None
Updated: 1 day, 2 hours ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 1:27 p.m. This repo has been linked 2 different CVEs too. -
Oct. 22, 2025, 3:43 p.m.
Standalone Container Security Tests
Updated: 1 hour, 18 minutes ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 11:33 a.m. This repo has been linked 81 different CVEs too.CVE-2025-9232 CVE-2025-9230 CVE-2025-8058 CVE-2025-6965 CVE-2025-6395 CVE-2025-32990 CVE-2025-32989 CVE-2025-32988 CVE-2025-4598 CVE-2025-40909 CVE-2025-47273 CVE-2025-4802 CVE-2025-3576 CVE-2024-56406 CVE-2025-31115 CVE-2024-8176 CVE-2025-1390 CVE-2024-12243 CVE-2024-12133 CVE-2025-0395 CVE-2024-13176 CVE-2024-4741 CVE-2024-50602 CVE-2024-49767 CVE-2024-49766 CVE-2024-9143 CVE-2024-6119 CVE-2024-45492 CVE-2024-45491 CVE-2024-45490 CVE-2024-6345 CVE-2024-5569 CVE-2024-37371 CVE-2024-37370 CVE-2024-5535 CVE-2024-4603 CVE-2024-33602 CVE-2024-33601 CVE-2024-33600 CVE-2024-33599 CVE-2024-34069 CVE-2023-6237 CVE-2024-2961 CVE-2024-2511 CVE-2024-28085 CVE-2023-39804 CVE-2024-28834 CVE-2024-28835 CVE-2024-26462 CVE-2023-50868 CVE-2023-50387 CVE-2023-52425 CVE-2023-6780 CVE-2023-6779 CVE-2023-6246 CVE-2024-0727 CVE-2024-0567 CVE-2024-0553 CVE-2023-6129 CVE-2023-7104 CVE-2023-4641 CVE-2023-7008 CVE-2023-47038 CVE-2023-5981 CVE-2023-5678 CVE-2023-5752 CVE-2023-5363 CVE-2023-46136 CVE-2023-4911 CVE-2023-4806 CVE-2023-4527 CVE-2023-4039 CVE-2023-36054 CVE-2023-3817 CVE-2023-3446 CVE-2023-2975 CVE-2023-30861 CVE-2023-31484 CVE-2023-29383 CVE-2022-48303 CVE-2022-40897 -
Oct. 21, 2025, 11:53 p.m.
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework reg reg-downloader reg-exploit reg-fud reg-password reg-setup registry registry-exploit slient-exploit-builder
Visual Basic .NET
Updated: 17 hours, 8 minutes ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 10:27 a.m. This repo has been linked 1 different CVEs too. -
Oct. 21, 2025, 11:55 p.m.
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
cve cve-2025-44228 cve-scanning doc doc-builder doc-cve doc-exploit doc-malware doc-payloads exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework office office-365 slient-exploit-builder
Visual Basic .NET
Updated: 17 hours, 6 minutes ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 10:27 a.m. This repo has been linked 0 different CVEs too. -
Oct. 22, 2025, midnight
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
cve cve-2025-44228 cve-scanning exploit exploit-code exploit-database exploit-development exploit-exercises exploit-kit exploitation exploitation-framework lnk lnk-builder lnk-cve lnk-exploit lnk-payloads lnk-rce lnk-shortcut lnk-stomping slient-exploit-builder
Visual Basic .NET
Updated: 17 hours, 2 minutes ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 10:27 a.m. This repo has been linked 0 different CVEs too. -
Oct. 21, 2025, 11 a.m.
飞致云 DataEase Postgresql JDBC Bypass 远程代码执行漏洞 CVE-2025-49002 漏洞类型 RCE
Python
Updated: 1 day, 6 hours ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 10:11 a.m. This repo has been linked 1 different CVEs too. -
Oct. 21, 2025, 10:06 a.m.
None
Java
Updated: 1 day, 6 hours ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 10:04 a.m. This repo has been linked 1 different CVEs too. -
Oct. 22, 2025, 3:42 p.m.
Standalone OWASP Dependency Check Repository
Updated: 1 hour, 19 minutes ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 8:54 a.m. This repo has been linked 1 different CVEs too. -
Oct. 21, 2025, 8:13 a.m.
None
Shell Java
Updated: 1 day, 8 hours ago0 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 7:45 a.m. This repo has been linked 1 different CVEs too. -
Oct. 21, 2025, 7:20 a.m.
Automatically disables your RGB camera when Windows locks, and enables it upon unlock—so you can use the infrared camera for faster facial recognition.
C#
Updated: 1 day, 9 hours ago1 stars 0 fork 0 watcherBorn at : Oct. 21, 2025, 6:41 a.m. This repo has been linked 1 different CVEs too.