Resources to learn about Insecure Deserialization
☆17Jul 12, 2024Updated last year
Alternatives and similar repositories for Insecure-Deserialization
Users that are interested in Insecure-Deserialization are comparing it to the libraries listed below
Sorting:
- New exploitation tricks for hardened .NET Remoting servers☆31Aug 5, 2025Updated 7 months ago
- ☆90Updated this week
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- Challenge source code and author write-ups for KalmarCTF☆70Jan 7, 2026Updated 2 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆89Feb 21, 2026Updated last month
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆13Dec 30, 2024Updated last year
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- ☆13Sep 15, 2024Updated last year
- esoteric☆57Sep 9, 2020Updated 5 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- polymorphic webshells☆30Oct 20, 2017Updated 8 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆11Dec 22, 2023Updated 2 years ago
- Finding Java gadget chains with CodeQL☆185Jan 14, 2025Updated last year
- ☆21Feb 10, 2026Updated last month
- ☆21Sep 12, 2025Updated 6 months ago
- HTML Universal Identifier☆65Dec 15, 2024Updated last year
- 基于多种策略, 对已有 JAR 包中的全限定类名进行变换, 无限生成高度相似的虚假类名☆18Jul 30, 2025Updated 7 months ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- have u ever thought about why there is not a task manager in Linux which can display the usage of per CPU just like Windows☆10Dec 25, 2023Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Strace: history, usage examples, example syscall tracer implementation☆10Mar 24, 2020Updated 5 years ago
- A Online PHP FilterChain Generator.☆17Aug 3, 2024Updated last year
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- ysoserial for su18☆11Jun 19, 2022Updated 3 years ago
- ☆18Jun 10, 2025Updated 9 months ago
- phpfuck: using only 5 different characters to write and execute php // (^.9)☆20Nov 26, 2021Updated 4 years ago
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- ☆31Jan 28, 2020Updated 6 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- An Automated udemy coupons scraper which scrapes coupons and autopost the result in blogspot post☆23Nov 2, 2021Updated 4 years ago
- a antibot waf bypasser based on pydoll framework good at Cloudflare, 基于 pydoll 编写 cf 或其他家验证 waf 绕过人机 检查的 skills☆47Mar 14, 2026Updated last week