Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Jan. 17, 2026, 6:05 p.m.
None
JavaScript TypeScript CSS
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 10:24 a.m. This repo has been linked 1 different CVEs too. -
March 3, 2026, 3:22 p.m.
None
JavaScript TypeScript CSS
Updated: 1 day, 8 hours ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 9:51 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 9:44 a.m.
LCC Apps - BEM Cup 2026
JavaScript TypeScript CSS
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 9:42 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 3:14 p.m.
None
Python
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 9:07 a.m. This repo has been linked 1 different CVEs too. -
Jan. 19, 2026, 9:52 a.m.
None
Dockerfile Python
Updated: 1 month, 1 week ago1 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 8:23 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 9:05 a.m.
None
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 8:21 a.m. This repo has been linked 1 different CVEs too. -
Jan. 21, 2026, 7:14 p.m.
Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3).
arbitrary-file-overwrite cve node-tar path-traversal poc security-research vulnerability cve-2026-23745 symlink-poisoning
JavaScript
Updated: 1 month, 1 week ago19 stars 1 fork 1 watcherBorn at : Jan. 17, 2026, 7:45 a.m. This repo has been linked 1 different CVEs too. -
Jan. 19, 2026, 3:22 a.m.
[UNRESTRICTED] 100% Deterministic Technical Analysis of Remote Code Execution (RCE). Root Cause Breakdown, Gadget Chains, Memory-Level Evasion (Hell's Gate), and Absolute Mitigation Blueprints for Enterprise Hardening. Lead by SASTRA_ADI_WIGUNA. Topics / Tags: rce-exploitation purple-teaming cybersecurity-research vulnerability-analysis log4shell
Updated: 1 month, 1 week ago2 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 7:05 a.m. This repo has been linked 1 different CVEs too. -
Jan. 17, 2026, 10:46 p.m.
None
Java
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 5:42 a.m. This repo has been linked 1 different CVEs too. -
Jan. 18, 2026, 5:53 p.m.
[PURPLE ELITE TEAMING] Holistic deterministic analysis of BlackEnergy3 Ukraine. Deconstruction of psychological vectors, C2 infrastructure, be3.dll modular loaders, and KillDisk wiper modules. 100% Factual Reconstruction by Sastra_Adi_Wiguna.
Updated: 1 month, 2 weeks ago0 stars 0 fork 0 watcherBorn at : Jan. 17, 2026, 5:29 a.m. This repo has been linked 1 different CVEs too.