A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Jul 12, 2021 - Python
{{ message }}
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A minimalist command line knowledge base manager
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Notes for taking the OSCP in 2097. Read in book form on GitBook
Proven approaches that can guide you through applying open source best practices within your organization
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
Aiming to be a fully transparent company. All information about source{d} and what it's like to work here.
A list of payload and bypass lists for penetration testing and red team infrastructure build.
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Building classifiers using cancer transcriptomes across 33 different cancer-types
Test, build, and deploy your apps from anywhere, the same way!
My personal bug bounty toolkit.
Computational reproducibility using Continuous Integration to produce verifiable end-to-end runs of scientific analysis.
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Basic setup to use the Coderockr Way methodology
Extracting biomedical relationships from literature with Snorkel
A list of websites using BEM methodology for naming CSS classes.
Denoising Autoencoders for Phenotype Stratification
Home of Repeatable Software Development Process
Integration projects today follow a time-consuming waterfall model, ill-suited to solving complex integration challenges. In response, WSO2 has developed organizational, project management, and technical expertise to help IT organizations transform integration projects to a more efficient and scalable continuous agile approach.
An unsupervised transfer learning approach for rare disease transcriptomics
Utilitarian CSS Framework
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."