$ offensive security research & tooling

trace37 labs

original vulnerability research, proprietary offensive tooling, and technical writeups from active bug bounty engagements. DOM XSS, OAuth bypass, cache poisoning, postMessage exploitation, WAF evasion — tested against real-world defences.

mastermind-ai - the engine behind the research

KNOWLEDGEknowledge graphaccumulated intel from every engagementwhat worked · what didn't · what to try nextbypasses · techniques · WAF profilesresearch feedsalways current — not point-in-time knowledgelatest CVEs · disclosed vulnerabilitiesnew techniques · published exploitsoriginal researchwe discover new vulnerability classesnot just running known tools — original discoveryzero-click account takeover · auth bypass chainsENFORCEmastermind-aimaps your attack surface · coordinates specialists · chains findings into real impactinstant resumeno lost progressfocus controlno rabbit holesquality gatereal impact onlylearning capturegets smartercontext transfernothing lostpersistencenever gives upeach agent receives full context + proven attack methodologyAGENTS70+ specialist agents · each carries a complete attack methodologyinjectionxss · sqli · cmdi · ssrfxxe · rce · ssti · xpathauth / accessoauth · jwt · idor · csrfcors · race · bfla · cookieclient-sidecsp · cspt · dom-clobberprototype · spa · redirectinfrastructuredesync · cache · websocketupload · deser · path · cryptodata / logicemail · graphql · secretsbiz-logic · parser · nosqlframeworknextjs · fastapi · firebasesupabase · salesforceeach agent: deep methodology · learns from prior engagements · exhaustive testing · validates real impactENGINESenigma XSSadapts when your WAF blocks it — finds the gapcontext → blockers → encoding → structureautonomous bypass · stateful adaptationblocked? mutates. blocked again? tries another way.enigma SSRFreaches internal services scanners can't seediscovery → target → bypass → confirmcloud credential theft · internal network accessthe vulns that only show up in manual testingparallax cachea vulnerability class most testers skip entirelyprobe → discover → diff → poison → weaponizeBigQuery-sourced headers · real-world CDN datayour CDN weaponized against your usersTOOLStool orchestration310+ tools orchestrated as onescan · fuzz · exploit · validateintercept proxyprofessional intercepting proxyevery request captured + replayablebrowser enginereal browser automationtests what your users actually seeJS analysisJavaScript deep analysisfinds hidden endpoints + client risksreconattacksurfacePERSISThunt historyevery finding, dead end, and chain recordednothing forgotten between sessionsagent continuitycontext survives across sessions + agentspicks up exactly where it left offlearning loopsuccess + failure patterns capturedevery hunt sharpens the next onefindings → knowledgepatterns → strategyfailures → avoidancebehavioral guardrails · 70+ specialist agents · 3 proprietary engines · 310+ tools · continuous learningevery engagement feeds the knowledge graph. every hunt sharpens the next.

// recent posts

// vulnerability research

view all →

// tools

view all →

Parallax

A purpose-built cache exploitation toolkit that finds the gap between what the cache thinks a request is and what the origin server actually processes. 13,000+ lines of Python and Bash across twelve tools and three shared libraries. # Pipeline Probe – CDN fingerprint, cache behaviour detection, TTL measurement Discover – Find cached endpoints via wordlists, katana crawling, GAU historical URLs, and BigQuery traffic data Diff – Byte-level path delimiter fuzzing, response diffing across cache/origin Poison – Binary search 10,000+ headers in ~560 requests, unkeyed query strings, parameter cloaking, fat GET, cookie testing Weaponize – Auto-classify exploits (XSS, redirect, CP-DoS, session fixation, CSP bypass) and generate proof-of-concept chains # Key Capabilities CDN-aware scanning: Akamai, Cloudflare, Fastly, Varnish, CloudFront detection with CDN-specific oracles Multi-signal response diffing: status changes, body size deltas, new headers, security header modifications Integrated WCP + WCD in a single pipeline Path normalization detection and exploitation Internal/application-level cache detection via multi-request priming # Read More For the full technical exploration of every component, research foundations, and design decisions: Parallax: A Research-Based Cache Exploitation Toolkit

DOMPurify Evolutionary Fuzzer

A large-scale evolutionary fuzzing system targeting DOMPurify, the industry-standard XSS sanitization library (24M+ weekly npm downloads). Instead of random fuzzing, it treats vulnerability discovery as an optimization problem – evolving payloads through fitness functions, mutation operators, and crossover to systematically explore the sanitizer’s attack surface. # Approach Evolutionary algorithms over wordlists – payloads evolve based on what survives sanitization, not random generation Fitness functions – measure partial success (what survives even if it doesn’t execute) and evolve from there 5-Rotor mutation operators – context-aware mutations drawn from the Enigma XSS methodology Population management – crossover, selection pressure, diversity maintenance across generations # Why DOMPurify Core DOMPurify bypasses continue to be discovered (CVE-2025-26791, CVE-2024-45801), demonstrating that even battle-tested sanitizers have undiscovered attack surfaces.