Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Aug. 27, 2025, 1:12 a.m.
None
C# CSS ASP.NET JavaScript HTML
Updated: 2 weeks, 1 day ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 4:08 a.m. This repo has been linked 2 different CVEs too. -
Aug. 30, 2025, 9:11 a.m.
None
Python
Updated: 1 week, 4 days ago17 stars 2 fork 2 watcherBorn at : Aug. 25, 2025, 3:07 a.m. This repo has been linked 1 different CVEs too. -
Aug. 25, 2025, 2:48 a.m.
None
C
Updated: 2 weeks, 3 days ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 2:46 a.m. This repo has been linked 1 different CVEs too. -
Aug. 25, 2025, 2:13 a.m.
his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices.
Updated: 2 weeks, 3 days ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 2:13 a.m. This repo has been linked 1 different CVEs too. -
Aug. 28, 2025, 3:48 a.m.
Import CVE data into a Vector Database for AI research
Dockerfile Python Shell
Updated: 1 week, 6 days ago1 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 2:01 a.m. This repo has been linked 2 different CVEs too. -
Aug. 26, 2025, 3:18 a.m.
All bacis FTC SDK Programming
Java
Updated: 2 weeks, 2 days ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 1 a.m. This repo has been linked 1 different CVEs too. -
Aug. 25, 2025, 1:43 a.m.
None
Python
Updated: 2 weeks, 3 days ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 12:55 a.m. This repo has been linked 1 different CVEs too. -
Aug. 25, 2025, 1:06 a.m.
None
Python
Updated: 2 weeks, 3 days ago0 stars 0 fork 0 watcherBorn at : Aug. 25, 2025, 12:38 a.m. This repo has been linked 1 different CVEs too. -
Sept. 7, 2025, 4:09 p.m.
None
Java
Updated: 3 days, 11 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 24, 2025, 10:26 p.m. This repo has been linked 1 different CVEs too. -
Aug. 24, 2025, 10:59 p.m.
Walkthrough of Metasploitable 2, a deliberately vulnerable Linux VM used for penetration testing practice. Covers enumeration, exploitation of services (FTP, SSH, Samba, NFS, web apps), privilege escalation to root, and persistence with SSH keys.
Updated: 2 weeks, 3 days ago0 stars 0 fork 0 watcherBorn at : Aug. 24, 2025, 10:16 p.m. This repo has been linked 1 different CVEs too.