PwnFunction
Insecure Deserialization Attack Explained
4 years ago - 8:52
Vickie Li Dev
Understanding Insecure Deserialization Vulnerabilities: Security Simplified
4 years ago - 7:35
TutorialsPoint
Java - Serialization & Deserialization
7 years ago - 16:10
AppSecEngineer
What is Insecure Deserialization? | Security Engineering Interview Questions
4 years ago - 21:05
John Hammond
CUSTOM Java Deserialization Exploit - Serial Snyker
2 years ago - 29:13
Swaroop P
What is JSON Serialization and Deserialization? | Python
4 years ago - 3:52
hexdump
Insecure Deserialization
1 day ago - 38:50
IppSec
Intro to PHP Deserialization / Object Injection
5 years ago - 29:46
Bro Code
Java serialization 🥣
4 years ago - 21:13
Black Hat
Pwning Your Java Messaging With Deserialization Vulnerabilities
8 years ago - 48:36
NeetCode
Serialize and Deserialize Binary Tree - Preorder Traversal - Leetcode 297 - Python
4 years ago - 13:48
scrt.insomnihack
Attacking .NET deserialization - Alvaro Muñoz
7 years ago - 38:47
OWASP Foundation
Deserialization: what, how and why [not] - Alexei Kojenov - AppSecUSA 2018
6 years ago - 34:28
CyberSecurityTV
Insecure Deserialization | OWASPT Top 10
4 years ago - 9:04
Bug Bounty Reports Explained
RCE via deserialization with a class allowlist bypass and DNS exfiltration with Arthur Aires
1 month ago - 14:06
datmt
Effortless JSON Deserialization to Generic Types in Java with Gson
1 year ago - 4:37
Bug Bounty España
Using application functionality to exploit insecure deserialization
4 years ago - 1:34
Secure Code Warrior
Insecure Deserialization | Owasp Top 10 Explainer Video | Secure Code Warrior
6 years ago - 3:06
Black Hat
Automated Discovery of Deserialization Gadget Chains
5 years ago - 39:14
Devoxx
Deserialization exploits in Java: why should I care? by Brian Vermeer
2 years ago - 47:33
Oleg Šelajev
Deserialization is so cool! #java #security #devsecops
1 year ago - 0:58
Confluent
Serialization & Deserialization | Apache Kafka for .NET Developers
2 years ago - 4:00
BSidesROC
BSides Rochester 2019 - Jackson Deserialization Vulnerabilities
6 years ago - 53:02
Marlon Brandon
Pentest | 8. Ways to Attack a Web Application | 11. Insecure Deserialization Vulnerabilities
4 years ago - 0:42
CyberHacks
Learn about deserialization attacks
2 years ago - 0:38
Vooki Infosec
How to prevent Insecure Deserialization #HowtoPreventInsecureDeserialization #shorts
1 year ago - 0:57
tutorialsEU - C#
Using JSON IN C#! Serialization & Deserialization made easy!
2 years ago - 14:47
Aniket Shubham
#Deserialization #CoreJava #what is Deserialization in java?
8 months ago - 0:55
OWASP Foundation
Deserialization Vulnerability Remediation with Automated Gadget Chain Discovery - Ian Haken
6 years ago - 32:20
RedTimmy
Java Deserialization under the hood
4 years ago - 6:02
Netsec Explained
Exploit Java Deserialization | Discovering Insecure Deserialization
3 years ago - 11:17