Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
☆96Feb 22, 2026Updated last month
Alternatives and similar repositories for Research_Successful_Errors
Users that are interested in Research_Successful_Errors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- ☆19Jun 26, 2017Updated 8 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated last month
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 3 weeks ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- ☆50Aug 2, 2025Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆25Nov 16, 2023Updated 2 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- 🚀 Professional multi-wallet trading platform for Solana blockchain. Execute coordinated bundle trades, create volume spikes, and maximiz…☆28Jan 3, 2026Updated 2 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Aug 6, 2019Updated 6 years ago
- ☆29Jan 19, 2026Updated 2 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- Use claude code anywhere.☆55Feb 12, 2026Updated last month
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated 3 weeks ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 5 months ago
- A Proof of Concept for demonstrating Task hijacking in Android using an attacker and a victim app.☆40Apr 21, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- A PlayStation 4 Kernel Debugger [WIP]☆36Jul 15, 2025Updated 8 months ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆110Feb 4, 2026Updated last month
- ☆23Jan 18, 2021Updated 5 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Binary Ninja plugin for automating VMProtect analysis☆62Dec 2, 2022Updated 3 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Android application📱 to help archer 🏹 in their daily training ✅ and preparing for competition🥇 💯.☆10Nov 28, 2021Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- The main goal of this repo is to learn about the gRPC communication patterns and hunt for vulnerabilities in the gRPC-Web app to improve …☆10Jul 10, 2024Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆103Feb 9, 2024Updated 2 years ago
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week