A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. This tool is designed to help developers and security researchers identify and exploit vulnerabilities in Java applications. ysoserial is a command-line tool that generates payloads for various Java deserialization vulnerabilities, including those in Apache Commons Collections, Apache Commons BeanUtils, and others. ysoserial is a powerful tool for identifying and exploiting Java deserialization vulnerabilities, and can be used by developers, security researchers, and penetration testers to improve the security of their applications. ysoserial is available for download on GitHub.
FEATURES
ALTERNATIVES
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.
A powerful tool for detecting and identifying malware using a rule-based system.
A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
FLARE-VM is a collection of software installation scripts for Windows systems designed for setting up and maintaining a reverse engineering environment on a virtual machine.
A simple framework for extracting actionable data from Android malware
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.