GOTT Labs

GOTT Labs is an independent cybersecurity research project focused on studying how threats operate in practice, how defensive systems respond under real conditions, and where theory quietly diverges from reality.

This site exists to publish research. Any resemblance to marketing is coincidental.

Research/Write-ups

Filter by Research Area:

Dell RecoverPoint for VMs (CVE-2026-22769)

When your backup appliance is also a pre-installed APT welcome mat

CVE-2026-22769

CVE-2026-1281: The Art of Arithmetic Expansion

Forensic analysis of pre-auth RCE exploitation in Ivanti EPMM through esoteric shell evaluation mechanics

CVE-2025-1281

Internet Traffic Brokers: TDS and the VexTrio Criminal Enterprise

How a Billion-Dollar Cybercrime Operation Hides Behind Legitimate AdTech (Part 1)

vextrio_tds_part1

MongoBleed Forensics (CVE-2025-14847)

MongoBleed, a discussion of forensics and considerations

MongoBleed

Trust But Don't Verify (Forti CVE-2025-59718)

CVE-2025-59718 & CVE-2025-59719 - Who Needs Signature Verification Anyway?

forti_vuln2

CVE-2025-59287 and the WSUS Deserialization Nightmare

A critical unauthenticated RCE vulnerability that turned Microsoft's patch delivery system into an attacker's dream"

wsus_windows

Oracle EBS (CVE-2025-61882)

The Zero-Day That Reminded Everyone Why ERP Means "Everyone's Really Pwned"

oracle_ebs

SAP NetWeaver VC (CVE-2025-31324)

How an obscure endpoint turned SAP NetWeaver into a webshell wonderland

sap_netweaver

The FortiGate Backdoor That Wasn't A Backdoor (CVE-2024-55591)

When authentication is just a really aggressive suggestion

forti_cve1

PAN-OS (CVE-2024-0012 and CVE-2024-9474)

When Your Security Appliance Becomes the Vulnerability

panos_cve

FortiJump Diving board (CVE-2024-47575)

How Missing Auth in FortiManager Let UNC5820 Play Musical Chairs with Enterprise Networks

fortijump

Luna Moth: When Social Engineering Beats Malware

How ex-Conti operators are extorting millions without writing a single line of malicious code

luna_moth

CVE-2024-53704: SonicWall Session Hijack

When 32 Null Bytes Break Authentication and SIEM Logs Miss Everything That Matters

sonicwall

Research Disclaimer

Research published is provided for educational purposes. Findings reflect observed behavior in specific environments and should not be interpreted as universal truth, vendor endorsement, or operational guidance. Techniques discussed may be incomplete, ineffective, or rendered obsolete without notice. Readers are expected to apply judgment, skepticism, and basic security hygiene.