Java deserialization examples
☆13Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for serial
Users that are interested in serial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Nov 30, 2020Updated 5 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- ☆12Oct 14, 2025Updated 5 months ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆11Jul 8, 2024Updated last year
- ☆15Jan 17, 2024Updated 2 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated 2 months ago
- ☆18Aug 21, 2025Updated 7 months ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- ☆12Nov 25, 2024Updated last year
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- A Python implementation of a language-agnostic Code Property Graph☆19Jun 10, 2024Updated last year
- ☆20Aug 4, 2024Updated last year
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated 2 months ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- A python based blind SQL injection exploitation script☆144Jan 26, 2020Updated 6 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆16Nov 29, 2025Updated 3 months ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- ☆11May 28, 2019Updated 6 years ago