Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
☆88Feb 22, 2026Updated 2 weeks ago
Alternatives and similar repositories for Research_Successful_Errors
Users that are interested in Research_Successful_Errors are comparing it to the libraries listed below
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆47Feb 6, 2026Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- ☆25Nov 16, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- ☆50Aug 2, 2025Updated 7 months ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆59Feb 4, 2026Updated last month
- A PlayStation 4 Kernel Debugger [WIP]☆36Jul 15, 2025Updated 7 months ago
- ☆11May 17, 2022Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Overview of MS Defender☆108Feb 20, 2026Updated 2 weeks ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 3 months ago
- ☆14Aug 20, 2023Updated 2 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- Deserialization payload generator for a variety of .NET formatters☆176Dec 2, 2025Updated 3 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆90Updated this week
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆124Feb 25, 2026Updated last week
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated last year
- ☆29Jan 19, 2026Updated last month
- ☆20Jan 4, 2026Updated 2 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆96Dec 28, 2025Updated 2 months ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- ☆11Dec 19, 2024Updated last year
- A Twitter bot that can read your DMs and tweet like twitter autobase. This project is a re-code of https://github.com/ydhnwb/autodm_base …☆14Mar 13, 2023Updated 2 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- ☆17May 22, 2024Updated last year
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆19May 29, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago