Skip to main content

Intelligence Sources

Exploit Intelligence

Weaponized

A vulnerability has working exploit code available that attackers can use. Sources include Metasploit, ExploitDB, and public proof-of-concept repositories.

PoC (Proof of Concept)

Code demonstrating a vulnerability can be exploited. May not be fully weaponized but shows the attack is practical.

CISA KEV (Known Exploited Vulnerabilities)

U.S. government catalog of vulnerabilities being actively exploited in the wild. Maintained by CISA (Cybersecurity and Infrastructure Security Agency).

Detection Sources

Security tools that can detect exploitation attempts:

SourceDescription
OSV.devOpen Source Vulnerabilities database (Google)
NucleiFast vulnerability scanner with community templates
SigmaGeneric signature format for SIEM detection rules
Snort/SuricataNetwork intrusion detection signatures
YARAPattern matching for malware/exploit detection
SemgrepStatic analysis rules for code scanning

Exploit Sources

Sources tracking weaponized exploits:

SourceDescription
MetasploitPopular penetration testing framework with exploit modules
ExploitDBPublic archive of exploits and vulnerable software
GitHub PoCsProof-of-concept code repositories on GitHub
TrickestAggregated CVE exploit intelligence
CISA KEVConfirmed active exploitation in the wild