Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • March 31, 2026, 4:51 p.m.

    n8n workflow for SOC analysts — chat-based AI agent for IOC lookups (VirusTotal), Kibana ES|QL query generation & execution, internal knowledge RAG, and threat intelligence. Powered by OpenAI + PostgreSQL + Qdrant.

    HTML JavaScript CSS

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 4:07 p.m. This repo has been linked 1 different CVEs too.
  • April 4, 2026, 2:23 p.m.

    High-specialized Red Team ecosystem. Unlike smart C2 tools, this framework operates on Ghost Stealer methodology: silent identification, encrypted exfiltration, and surgical extraction of high-value targets with zero forensic trace.

    Rust PowerShell Python Dockerfile HTML

    Updated: 4 days, 18 hours ago
    2 stars 0 fork 0 watcher
    Born at : March 31, 2026, 3:50 p.m. This repo has been linked 2 different CVEs too.
  • April 2, 2026, 6:40 p.m.

    None

    Updated: 6 days, 14 hours ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 3:42 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 7:01 p.m.

    A curated GitHub navigation hub for Claude Code ecosystem research, including analyses, reverse-engineering notes, architecture breakdowns, tutorials, book-style writeups, and derivative learning projects — organized by category with machine-maintained JSON metadata.

    TypeScript

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 3:25 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 4:04 p.m.

    Herramienta de detección para CVE-2026-0848 que escanea sistemas locales y remotos en busca de instalaciones vulnerables de NLTK ≤ 3.9.2. Realiza escaneo por SSH, detección en red, genera reportes JSON/HTML/CSV y calcula nivel de riesgo basado en presencia de modelos StanfordSegmenter comprometidos.

    Python

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 3:12 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 3:56 p.m.

    This is the mock design for the CandleKeep Security Blog for Sentinel Blue

    HTML

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 3:10 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 3:04 p.m.

    Laboratório prático de pentest desenvolvido durante o Bootcamp de Cibersegurança da DIO em parceria com a Riachuelo, focado em técnicas de enumeração, brute force e password spraying em serviços FTP, SMB e aplicação web DVWA utilizando a máquina vulnerável Metasploitable.

    Python

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 2:59 p.m. This repo has been linked 3 different CVEs too.
  • April 4, 2026, 4:06 p.m.

    Multi-threaded Python Network Scanner with SYN scanning and OS detection

    cli-tools cybersecurity network-scanner networking port-scanner python scapy

    HTML Python

    Updated: 4 days, 16 hours ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 2:58 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 3:54 p.m.

    Linux Privilege Escalation Framework — comprehensive privilege escalation vector analysis. The **π** motif reflects the ratio *C/d* (circumference to diameter): mapping attack surface to effective privilege boundaries.

    linux privelage-escalation privileges shell-script

    Makefile Shell Go Template Python

    Updated: 1 week, 1 day ago
    1 stars 1 fork 1 watcher
    Born at : March 31, 2026, 2:51 p.m. This repo has been linked 1 different CVEs too.
  • March 31, 2026, 2:45 p.m.

    Este PoC compila código Java malicioso en un JAR con bloque estático, lo carga mediante StanfordSegmenter de NLTK, y al ser cargado por el JVM ejecuta automáticamente el payload, creando el archivo /tmp/pwned_cve_2026_0848 como prueba tangible de ejecución de código arbitrario.

    Python Java

    Updated: 1 week, 1 day ago
    0 stars 0 fork 0 watcher
    Born at : March 31, 2026, 2:34 p.m. This repo has been linked 1 different CVEs too.
Showing 10 of 68195 Results

Filters