Proof of Concepts for unsafe deserialization in Ruby
☆17Oct 17, 2024Updated last year
Alternatives and similar repositories for ruby-unsafe-deserialization
Users that are interested in ruby-unsafe-deserialization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 4 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 26, 2026Updated 3 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CodeQL model generation for Go.☆17Jun 11, 2021Updated 4 years ago
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 6 months ago
- ☆23May 9, 2026Updated last week
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆13May 12, 2026Updated last week
- burp解密插件☆10Jun 9, 2023Updated 2 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- ☆11Feb 14, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The best articles and videos related to computer science and programming I found.☆11Apr 27, 2020Updated 6 years ago
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- ☆13Oct 30, 2023Updated 2 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Regex out URI parameters from backend code, craft URIs to check for reflections or send to local burp proxy☆13Dec 8, 2022Updated 3 years ago
- Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into…☆12Jun 19, 2022Updated 3 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆48Apr 1, 2023Updated 3 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is the data that powers the PortSwigger URL validation bypass cheat sheet.☆58Feb 5, 2026Updated 3 months ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆111Jun 23, 2025Updated 10 months ago
- A nice and cobaltish neovim theme☆20Aug 24, 2023Updated 2 years ago
- GH CLI CodeQL Scan Extension☆20Sep 4, 2025Updated 8 months ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 7 years ago
- GitHub Action to configure npm/yarn/pnpm etc. with Takumi Guard registry☆111Apr 15, 2026Updated last month
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆146Feb 24, 2025Updated last year
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Content-Type Research☆664Jun 29, 2025Updated 10 months ago
- panicwatch is a Go library for panic handling/reporting in Go applications. Inspired by mitchellh/panicwrap☆21May 8, 2026Updated last week
- Our mission is to catalyze sustainable improvements to critical open source software projects and ecosystems.☆126May 12, 2026Updated last week
- This project only exists to help me learn about quantum computing☆15Jan 14, 2024Updated 2 years ago
- ☆24Jan 29, 2026Updated 3 months ago
- ☆10Mar 6, 2023Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year