Proof of Concepts for unsafe deserialization in Ruby
☆17Oct 17, 2024Updated last year
Alternatives and similar repositories for ruby-unsafe-deserialization
Users that are interested in ruby-unsafe-deserialization are comparing it to the libraries listed below
Sorting:
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated last month
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Apr 16, 2025Updated 10 months ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- CodeQL model generation for Go.☆17Jun 11, 2021Updated 4 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- ☆13Aug 5, 2025Updated 6 months ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆21Nov 7, 2025Updated 3 months ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Feb 18, 2026Updated last week
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆143Feb 24, 2025Updated last year
- ☆11Jan 3, 2023Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆111Feb 20, 2026Updated last week
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- An attempt to live code a working Retrieval Augmented Generation app with AI coding tools☆17Apr 24, 2025Updated 10 months ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆111Jun 23, 2025Updated 8 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scr…☆579Feb 20, 2026Updated last week
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 7 months ago
- ☆14Sep 1, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year