Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
☆102Feb 22, 2026Updated last month
Alternatives and similar repositories for Research_Successful_Errors
Users that are interested in Research_Successful_Errors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- ☆19Jun 26, 2017Updated 8 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated last month
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 2 months ago
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆25Nov 16, 2023Updated 2 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated last month
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Utility to manage LCT21001 / LCT21002 laptop water coolers☆21Jul 2, 2025Updated 9 months ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 6 months ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆27Mar 17, 2024Updated 2 years ago
- Use claude code anywhere.☆61Mar 27, 2026Updated 3 weeks ago
- ☆30Jan 19, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆18Feb 20, 2026Updated last month
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Apr 12, 2026Updated last week
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆112Feb 4, 2026Updated 2 months ago
- A PlayStation 4 Kernel Debugger [WIP]☆39Jul 15, 2025Updated 9 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆58Apr 3, 2025Updated last year
- My collection of hacking books for learning information security☆31Dec 25, 2022Updated 3 years ago
- Android application📱 to help archer 🏹 in their daily training ✅ and preparing for competition🥇 💯.☆10Nov 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆104Feb 9, 2024Updated 2 years ago
- Deserialization payload generator for a variety of .NET formatters☆177Dec 2, 2025Updated 4 months ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆30Feb 10, 2024Updated 2 years ago
- Screen watermark application for security companies made as a personal project for alternatives to Rainmeter and XSecuritas.☆16Apr 30, 2022Updated 3 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago