Proof of Concepts for unsafe deserialization in Ruby
☆17Oct 17, 2024Updated last year
Alternatives and similar repositories for ruby-unsafe-deserialization
Users that are interested in ruby-unsafe-deserialization are comparing it to the libraries listed below
Sorting:
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- CodeQL model generation for Go.☆17Jun 11, 2021Updated 4 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 4 months ago
- ☆22Updated this week
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Mar 12, 2026Updated last week
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- ☆17Nov 28, 2021Updated 4 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Apr 16, 2025Updated 11 months ago
- bugbounty tools☆17Oct 26, 2023Updated 2 years ago
- The best articles and videos related to computer science and programming I found.☆11Apr 27, 2020Updated 5 years ago
- ☆13Oct 30, 2023Updated 2 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆21Jan 13, 2025Updated last year
- Regex out URI parameters from backend code, craft URIs to check for reflections or send to local burp proxy☆13Dec 8, 2022Updated 3 years ago
- Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into…☆12Jun 19, 2022Updated 3 years ago
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 2 weeks ago
- This is the data that powers the PortSwigger URL validation bypass cheat sheet.☆59Feb 5, 2026Updated last month
- ☆24Jan 26, 2021Updated 5 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆112Jun 23, 2025Updated 8 months ago
- A nice and cobaltish neovim theme☆20Aug 24, 2023Updated 2 years ago
- GH CLI CodeQL Scan Extension☆20Sep 4, 2025Updated 6 months ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 7 years ago
- New exploitation tricks for hardened .NET Remoting servers☆31Aug 5, 2025Updated 7 months ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆143Feb 24, 2025Updated last year
- CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scr…☆616Mar 12, 2026Updated last week
- Content-Type Research☆658Jun 29, 2025Updated 8 months ago
- ☆21Sep 12, 2025Updated 6 months ago
- ☆24Jan 29, 2026Updated last month
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 5 years ago
- ☆10Mar 6, 2023Updated 3 years ago