vladko312 / Research_Successful_ErrorsView external linksLinks
Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
☆58Jan 3, 2026Updated last month
Alternatives and similar repositories for Research_Successful_Errors
Users that are interested in Research_Successful_Errors are comparing it to the libraries listed below
Sorting:
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆41Feb 6, 2026Updated last week
- ☆19Jun 26, 2017Updated 8 years ago
- Integer overflow in FreeType software, which also affects Chrome☆23Aug 27, 2025Updated 5 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- 🚀 Professional multi-wallet trading platform for Solana blockchain. Execute coordinated bundle trades, create volume spikes, and maximiz…☆28Jan 3, 2026Updated last month
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 3 months ago
- A PlayStation 4 Kernel Debugger [WIP]☆36Jul 15, 2025Updated 7 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆96Feb 4, 2026Updated last week
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Feb 10, 2024Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- TikTok mass sharing bot! Fast and easy to use! Based on [TMB]☆11Apr 28, 2022Updated 3 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Jan 12, 2026Updated last month
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 4 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Dec 28, 2025Updated last month
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Code for How to Add Product Reviews to Your Medusa Server and Next.js Storefront☆11Mar 8, 2023Updated 2 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 3 months ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆18May 29, 2024Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- setTimeout and setInterval that work with delays longer than 24.8 days☆26Nov 5, 2025Updated 3 months ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- A Proof of Concept for demonstrating Task hijacking in Android using an attacker and a victim app.☆41Apr 21, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆12Jun 24, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- advance web crawler to crawl urls from website using python.☆10Apr 24, 2023Updated 2 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆26Nov 14, 2025Updated 3 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- A VPN written in Rust☆13Apr 17, 2025Updated 9 months ago
- A lightweight JavaScript/TypeScript library for working with binary data using C-like structs☆11Feb 1, 2026Updated 2 weeks ago
- axseem's Linux Workstation Configuration | Mirror of https://codeberg.org/axseem/dots☆15Feb 4, 2026Updated last week
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Jan 8, 2026Updated last month