Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Aug. 26, 2025, 7:32 p.m.
None
Updated: 3 days, 3 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 7:31 p.m. This repo has been linked 1 different CVEs too. -
Aug. 28, 2025, 8:18 p.m.
None
Shell
Updated: 1 day, 3 hours ago2 stars 1 fork 1 watcherBorn at : Aug. 26, 2025, 7:31 p.m. This repo has been linked 1 different CVEs too. -
Aug. 26, 2025, 6:33 p.m.
The ALA Wyverns FTC programing Resorces and repositories Into the deep season
Java
Updated: 3 days, 4 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 6:32 p.m. This repo has been linked 1 different CVEs too. -
Aug. 26, 2025, 6:25 p.m.
A collection of my cybersecurity labs and projects.
Updated: 3 days, 4 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 5:53 p.m. This repo has been linked 2 different CVEs too. -
Aug. 28, 2025, 4:37 p.m.
Simulates a repository with multiple projects, CPM, and vulnerable direct and transitive dependencies
C#
Updated: 1 day, 6 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 5:25 p.m. This repo has been linked 4 different CVEs too. -
Aug. 28, 2025, 3:46 p.m.
None
HTML JavaScript CSS Jupyter Notebook
Updated: 1 day, 7 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 5:11 p.m. This repo has been linked 1 different CVEs too. -
Aug. 26, 2025, 5:26 p.m.
POWERSHEL script to check if your device is affected or no
PowerShell
Updated: 3 days, 5 hours ago1 stars 1 fork 1 watcherBorn at : Aug. 26, 2025, 4:32 p.m. This repo has been linked 1 different CVEs too. -
Aug. 27, 2025, 10:22 p.m.
None
Dockerfile PHP CSS Shell
Updated: 2 days ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 3:55 p.m. This repo has been linked 1 different CVEs too. -
Aug. 28, 2025, 7:04 p.m.
BlueDucky exploits a Bluetooth vulnerability, specifically CVE-2023-45866, which allows an attacker to inject keystrokes into a target device. The attacker's device impersonates a Bluetooth keyboard to establish an encrypted connection without user authorization. The BlueDucky tool automates this process
Python
Updated: 1 day, 4 hours ago1 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 2:26 p.m. This repo has been linked 1 different CVEs too. -
Aug. 26, 2025, 3:57 p.m.
My documentation and projects for all my internship roles
Updated: 3 days, 7 hours ago0 stars 0 fork 0 watcherBorn at : Aug. 26, 2025, 2:20 p.m. This repo has been linked 1 different CVEs too.