Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Jan. 20, 2026, 8:28 p.m.
SSP H3
Python
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 7:20 p.m. This repo has been linked 1 different CVEs too. -
Feb. 16, 2026, 9:55 p.m.
None
Python JavaScript
Updated: 2 weeks, 1 day ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 7:17 p.m. This repo has been linked 1 different CVEs too. -
Feb. 5, 2026, 8:54 p.m.
iPhone batteries were shipped with their security locks left open. This creates an unfixable backdoor that allows attackers to hide inside the battery hardware, control the device, and survive all software updates or factory resets.
cve-2026-25251 cwe-1272
Updated: 3 weeks, 5 days ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 7:13 p.m. This repo has been linked 0 different CVEs too. -
Jan. 25, 2026, 8:02 p.m.
Slab allocator theory + basic implementation and code integration of the previous project FAT32 implementation
Rust
Updated: 1 month ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 6:55 p.m. This repo has been linked 1 different CVEs too. -
Jan. 20, 2026, 9:46 p.m.
None
JavaScript TypeScript CSS
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 6:52 p.m. This repo has been linked 1 different CVEs too. -
Jan. 20, 2026, 7:42 p.m.
No Windows environment required to generate the payload, NTLM hashes are cracked automatically.
Python C C++ Batchfile Shell Perl
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 6:45 p.m. This repo has been linked 1 different CVEs too. -
Jan. 25, 2026, 5:21 p.m.
PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calendar, call log and voicemail, make outgoing calls or answer incoming calls, manipulate call settings, access & control notifications sent by other apps, control nearby devices, record audio, access device identifiers, and bypass background restriction
Java
Updated: 1 month ago42 stars 6 fork 6 watcherBorn at : Jan. 20, 2026, 6:44 p.m. This repo has been linked 0 different CVEs too. -
Jan. 20, 2026, 6:38 p.m.
None
JavaScript TypeScript CSS
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 6:35 p.m. This repo has been linked 1 different CVEs too. -
Jan. 22, 2026, 6:22 p.m.
Academic research on critical RUCKUS wireless vulnerabilities (RCE & Auth Bypass) in university networks. Features a strategic mitigation roadmap and a data-driven CISO Dashboard for risk management.
Updated: 1 month, 1 week ago1 stars 0 fork 0 watcherBorn at : Jan. 20, 2026, 5:50 p.m. This repo has been linked 2 different CVEs too. -
Feb. 28, 2026, 1:37 p.m.
AI Security Scanner - Test your AI systems for prompt injection and extraction vulnerabilities
TypeScript JavaScript
Updated: 3 days, 9 hours ago474 stars 70 fork 70 watcherBorn at : Jan. 20, 2026, 5:39 p.m. This repo has been linked 1 different CVEs too.