Home

Be excited Attendance Publicity ruby deserialization exploit Meal if you can An event

Identifying and Exploiting Unsafe Deserialization in Ruby | by Plenum |  InfoSec Write-ups
Identifying and Exploiting Unsafe Deserialization in Ruby | by Plenum | InfoSec Write-ups

Deserialization Attacks Explanation | PDF | Method (Computer Programming) |  Php
Deserialization Attacks Explanation | PDF | Method (Computer Programming) | Php

Discovering Deserialization Gadget Chains in Rubyland - Include Security  Research Blog
Discovering Deserialization Gadget Chains in Rubyland - Include Security Research Blog

writeups/Ruby-deserialization-gadget-on-rails.md at main ·  httpvoid/writeups · GitHub
writeups/Ruby-deserialization-gadget-on-rails.md at main · httpvoid/writeups · GitHub

18.4 Lab: Exploiting Ruby deserialization using a documented gadget chain |  2024 | by Karthikeyan Nagaraj | Apr, 2024 | Medium
18.4 Lab: Exploiting Ruby deserialization using a documented gadget chain | 2024 | by Karthikeyan Nagaraj | Apr, 2024 | Medium

18.4 Lab: Exploiting Ruby deserialization using documented gadget chain -  Karthikeyan Nagaraj | 2024 - YouTube
18.4 Lab: Exploiting Ruby deserialization using documented gadget chain - Karthikeyan Nagaraj | 2024 - YouTube

🔎Exploring de-serialization issues in Ruby projects.
🔎Exploring de-serialization issues in Ruby projects.

Insecure Deserialization: It's super hard! Or is it? | by Thexssrat |  InfoSec Write-ups
Insecure Deserialization: It's super hard! Or is it? | by Thexssrat | InfoSec Write-ups

Deserialization issues also affect Ruby, not just Java, PHP, and .NET |  ZDNET
Deserialization issues also affect Ruby, not just Java, PHP, and .NET | ZDNET

Exploring de-serialization issues in Ruby projects.
Exploring de-serialization issues in Ruby projects.

Zero Day Initiative — Remote Code Execution via Ruby on Rails Active  Storage Insecure Deserialization
Zero Day Initiative — Remote Code Execution via Ruby on Rails Active Storage Insecure Deserialization

Ruby serialization 'exploit' news is balderdash. Loading binary objects  from untrusted sources in any language has always been a Bad Idea™️ and a  warning was in RDoc since 2013. : r/programming
Ruby serialization 'exploit' news is balderdash. Loading binary objects from untrusted sources in any language has always been a Bad Idea™️ and a warning was in RDoc since 2013. : r/programming

Ruby – Insecure Deserialization – YAML (Privilege Escalation – Code  Execution) | VK9 Security
Ruby – Insecure Deserialization – YAML (Privilege Escalation – Code Execution) | VK9 Security

Exploiting Ruby deserialization using a documented gadget chain (Video  solution)
Exploiting Ruby deserialization using a documented gadget chain (Video solution)

Exploiting Node.js deserialization bug for Remote Code Execution | OpSecX
Exploiting Node.js deserialization bug for Remote Code Execution | OpSecX

Introduction to Deserialization Attacks Course | HTB Academy
Introduction to Deserialization Attacks Course | HTB Academy

Zero Day Initiative — Remote Code Execution via Ruby on Rails Active  Storage Insecure Deserialization
Zero Day Initiative — Remote Code Execution via Ruby on Rails Active Storage Insecure Deserialization

18.4 Lab: Exploiting Ruby deserialization using a documented gadget chain |  2024 | by Karthikeyan Nagaraj | Apr, 2024 | Medium
18.4 Lab: Exploiting Ruby deserialization using a documented gadget chain | 2024 | by Karthikeyan Nagaraj | Apr, 2024 | Medium

RubyGems Patches Remote Code Execution Vulnerability | Threatpost
RubyGems Patches Remote Code Execution Vulnerability | Threatpost

PortSwigger-Lab: Exploiting Ruby deserialization using a documented gadget  chain
PortSwigger-Lab: Exploiting Ruby deserialization using a documented gadget chain

Ruby Vulnerabilities: Exploiting Open, Send, and… | Bishop Fox
Ruby Vulnerabilities: Exploiting Open, Send, and… | Bishop Fox

Ruby – Insecure Deserialization – YAML (Privilege Escalation – Code  Execution) | VK9 Security
Ruby – Insecure Deserialization – YAML (Privilege Escalation – Code Execution) | VK9 Security