Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Dec. 28, 2025, 11:25 p.m.
None
Makefile Python JavaScript HTML CSS
Updated: 2 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 11:25 p.m. This repo has been linked 1 different CVEs too. -
Dec. 31, 2025, 6:41 a.m.
Explot, Lab, Scanner - external and docker container, for SMongobleed-CVE-2025-14847 plus phoenix security uploader
Python Dockerfile Shell JavaScript
Updated: 2 months, 1 week ago1 stars 1 fork 1 watcherBorn at : Dec. 28, 2025, 11:07 p.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2025, 10:40 p.m.
None
JavaScript Python
Updated: 2 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 10:39 p.m. This repo has been linked 1 different CVEs too. -
Jan. 9, 2026, 11:17 p.m.
Langflow fork with EnGarde custom components (Walker Agents + EnGarde Agents)
Dockerfile Makefile Shell JavaScript TypeScript Python Batchfile PowerShell Mako HTML
Updated: 2 months ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 10:15 p.m. This repo has been linked 4 different CVEs too. -
Dec. 28, 2025, 10:07 p.m.
None
Java
Updated: 2 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 10:06 p.m. This repo has been linked 1 different CVEs too. -
Dec. 28, 2025, 10:01 p.m.
asd
Dockerfile Python Shell CSS HTML JavaScript
Updated: 2 months, 1 week ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 9:46 p.m. This repo has been linked 1 different CVEs too. -
Jan. 5, 2026, 12:11 a.m.
None
Java
Updated: 2 months ago0 stars 1 fork 1 watcherBorn at : Dec. 28, 2025, 9:36 p.m. This repo has been linked 1 different CVEs too. -
Jan. 3, 2026, 2:17 a.m.
Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
Updated: 2 months, 1 week ago1 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 8:55 p.m. This repo has been linked 2 different CVEs too. -
Feb. 20, 2026, 2:03 a.m.
None
Java
Updated: 2 weeks, 5 days ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 7:54 p.m. This repo has been linked 1 different CVEs too. -
Feb. 20, 2026, 11:04 a.m.
None
Java Puppet
Updated: 2 weeks, 4 days ago0 stars 0 fork 0 watcherBorn at : Dec. 28, 2025, 6:52 p.m. This repo has been linked 1 different CVEs too.