# By Language

- [PHP](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/deserialization.md)
- [Regex](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/deserialization/regex.md): Regex to find unserialize function followed by anything being passed a variable.
- [Summary](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/deserialization/summary.md)
- [Practice](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/deserialization/practice.md)
- [JAVA](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/java.md)
- [Regex](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/java/regex.md): Regex to match a set of functions/classes potentially vulnerable to deserialization.
- [Summary](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/java/summary.md)
- [Practice](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/java/practice.md)
- [Resources](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/java/resources.md)
- [.NET](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/.net.md)
- [Regex](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/.net/regex.md)
- [Summary](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/.net/summary.md)
- [Resources](/awae-oswe-preparation-resources/by-vulnerability/deserialization/by-language/.net/resources.md)
