Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Jan. 18, 2026, 5:53 p.m.
[PURPLE ELITE TEAMING] Holistic deterministic analysis of BlackEnergy3 Ukraine. Deconstruction of psychological vectors, C2 infrastructure, be3.dll modular loaders, and KillDisk wiper modules. 100% Factual Reconstruction by Sastra_Adi_Wiguna.
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 5:29 a.m. This repo has been linked 1 different CVEs too. -
Jan. 21, 2026, 11:20 p.m.
WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair protocol. This vulnerability affects millions of Bluetooth audio devices worldwide, allowing unauthorized pairing and potential microphone access without user consent.
Kotlin
Updated: 1 month, 1 week ago408 stars 41 fork 41 watcherBorn at : Jan. 17, 2026, 5:28 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 5:12 a.m.
Scan, check the CVE
Python
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 5:11 a.m. This repo has been linked 1 different CVEs too. -
Jan. 18, 2026, 5:49 p.m.
SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 4:57 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 10:29 p.m.
This script can be used to check if a Bluetooth device is vulnerable to CVE-2025-36911.
Python
Updated: 1 month, 2 weeks ago3 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 3:48 a.m. This repo has been linked 1 different CVEs too. -
Jan. 19, 2026, 12:59 a.m.
CVE information in JSON format is loaded into an SQLite database with tables organized by metadata, affected software products/platforms/versions, references, and tags. SQL queries are performed and provided to summarize important information.
Python
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 3:47 a.m. This repo has been linked 2 different CVEs too. -
Jan. 17, 2026, 3:17 a.m.
None
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 3:09 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 3:07 a.m.
WP Scan helped identify common WordPress vulnerabilities attackers exploit daily.
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 2:59 a.m. This repo has been linked 2 different CVEs too. -
Jan. 17, 2026, 5:16 a.m.
None
Java
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 2:55 a.m. This repo has been linked 1 different CVEs too. -
Jan. 22, 2026, midnight
Auto-backup of threat-intel-aggregator project
Python Shell PowerShell JavaScript
Updated: 1 month, 1 week ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 2:49 a.m. This repo has been linked 1 different CVEs too.