Java deserialization examples
☆13Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for serial
Users that are interested in serial are comparing it to the libraries listed below
Sorting:
- ☆11Nov 30, 2020Updated 5 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Dump elasticsearch instance☆15Jan 7, 2026Updated last month
- CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)☆40Dec 7, 2021Updated 4 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- This repo contains the published reports☆10Dec 12, 2025Updated 2 months ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Share secrets encrypted☆14Feb 24, 2026Updated last week
- A tweak to inspect any application (user or system application). Inspect views, network, local variables, NSUserDefault and even more.☆13Aug 20, 2019Updated 6 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆12Nov 25, 2024Updated last year
- https://Wh0ale.github.io☆10Dec 4, 2021Updated 4 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- This program is used to steal passwords on Google Chrome very easily with a message on a webhook discord.☆10Aug 11, 2021Updated 4 years ago
- Fast, accurate species tree estimation.☆12Aug 29, 2024Updated last year
- ☆11May 28, 2019Updated 6 years ago
- ☆15Dec 1, 2023Updated 2 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Dec 21, 2022Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Start with nothing. Build what you need. Minimal Obsidian template.☆13Feb 14, 2026Updated 2 weeks ago
- Convert any JSON File to Normalised tables☆16Oct 21, 2021Updated 4 years ago
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago