Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
☆104Feb 22, 2026Updated 2 months ago
Alternatives and similar repositories for Research_Successful_Errors
Users that are interested in Research_Successful_Errors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 4 months ago
- ☆19Jun 26, 2017Updated 8 years ago
- A collection of js analysis tools & scripts.☆18Updated this week
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 3 months ago
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some V8 n-day exploits that I've written☆55Mar 1, 2026Updated 2 months ago
- ☆51Aug 2, 2025Updated 9 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated 2 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 11 months ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 3 months ago
- A comprehensive collection of resources designed to help you enhance the security of your APIs. In this repository, you'll find a wide ra…☆32Nov 6, 2024Updated last year
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Utility to manage LCT21001 / LCT21002 laptop water coolers☆22Jul 2, 2025Updated 10 months ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 7 months ago
- ☆20Jun 20, 2025Updated 10 months ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Claude Skills for Swedish Accounting Compliance☆50Apr 15, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Dec 2, 2020Updated 5 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆28Mar 17, 2024Updated 2 years ago
- ☆30Jan 19, 2026Updated 3 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 7 months ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Use claude code anywhere.☆62Apr 19, 2026Updated 2 weeks ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆114Feb 4, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆57Apr 3, 2025Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Apr 12, 2026Updated 3 weeks ago
- The main goal of this repo is to learn about the gRPC communication patterns and hunt for vulnerabilities in the gRPC-Web app to improve …☆10Jul 10, 2024Updated last year
- Android application📱 to help archer 🏹 in their daily training ✅ and preparing for competition🥇 💯.☆10Nov 28, 2021Updated 4 years ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆104Feb 9, 2024Updated 2 years ago