Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
May 8, 2021, 7:33 a.m.
Repository of Python scripts used in the development of an online course named Python for Penetration Testers.
Python Assembly
Updated: 4 years, 9 months ago1 stars 0 fork 0 watcherBorn at : June 23, 2020, 8:25 p.m. This repo has been linked 1 different CVEs too. -
Aug. 12, 2024, 8:03 p.m.
POC exploit code for CVE-2020-1048(PrintDemon)
C
Updated: 1 year, 5 months ago14 stars 6 fork 6 watcherBorn at : June 23, 2020, 6:45 p.m. This repo has been linked 1 different CVEs too. -
Jan. 6, 2021, 11:16 a.m.
None
Python
Updated: 5 years, 1 month ago0 stars 0 fork 0 watcherBorn at : June 23, 2020, 4:15 p.m. This repo has been linked 0 different CVEs too. -
May 12, 2025, 3:37 p.m.
"Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' lab from pentesteracademy.
pentest training-materials activedirectory powershell powerview powerupsql pentesteracademy
PowerShell
Updated: 8 months, 4 weeks ago81 stars 18 fork 18 watcherBorn at : June 23, 2020, 4:07 p.m. This repo has been linked 2 different CVEs too. -
Jan. 9, 2026, 11:39 p.m.
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
cve cve-2025 cve-2025-31258 cyber-security exploit network-security poc poc-example proof-of-concept risk-assessment security software-vulnerability system-exploit threat-analysis vulnerability
Jupyter Notebook
Updated: 1 month ago0 stars 0 fork 0 watcherBorn at : June 23, 2020, 3:20 p.m. This repo has been linked 1 different CVEs too. -
July 12, 2025, 5:37 p.m.
Compilation of Resources for TCM's Linux Privilege Escalation course
Updated: 6 months, 4 weeks ago560 stars 185 fork 185 watcherBorn at : June 23, 2020, 3 p.m. This repo has been linked 3 different CVEs too. -
Oct. 23, 2022, 9:55 a.m.
Vuls検証環境
vuls security docker docker-compose vulnerable
Dockerfile Shell
Updated: 3 years, 3 months ago2 stars 0 fork 0 watcherBorn at : June 23, 2020, 12:54 p.m. This repo has been linked 4 different CVEs too. -
Jan. 10, 2026, 2:35 p.m.
🔥 Professional Penetration Testing Framework v4.0 - Automated subdomain enumeration, vulnerability scanning with Nuclei, port scanning, and comprehensive HTML reports. Features parallel scanning, resume capability, and real-time progress tracking.
automation bash-script bug-bounty cybersecurity ethical-hacking nuclei osint penetration-testing recon-tool red-team security-scanner security-tools subdomain-enumeration vulnerability-scanner web-security
Shell
Updated: 4 weeks, 2 days ago517 stars 86 fork 86 watcherBorn at : June 23, 2020, 12:03 p.m. This repo has been linked 1 different CVEs too. -
June 26, 2020, 8:49 a.m.
This contains the commands crash course of Linux OS.
Updated: 5 years, 7 months ago0 stars 0 fork 0 watcherBorn at : June 23, 2020, 11:34 a.m. This repo has been linked 2 different CVEs too. -
Jan. 29, 2025, 3:43 p.m.
None
Assembly Python
Updated: 1 year ago48 stars 5 fork 5 watcherBorn at : June 23, 2020, 11:03 a.m. This repo has been linked 2 different CVEs too.