There are 18 repositories under methodology topic.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
🍰 Architectural methodology for frontend projects
Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
These patterns document how to apply open source principles and practices for software development within the confines of an organization - aka InnerSource.
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
Notes for taking the OSCP in 2097. Read in book form on GitBook
Aiming to be a fully transparent company. All information about source{d} and what it's like to work here.
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Some great resources to gather OSINT on Email Addresses & Usernames. Alternatively check the exposure of your Email & Username.
Test, build, and deploy your apps from anywhere, the same way!
My personal bug bounty toolkit.
极客时间《手把手教你落地DDD》配套代码
Building classifiers using cancer transcriptomes across 33 different cancer-types
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Integration projects today follow a time-consuming waterfall model, ill-suited to solving complex integration challenges. In response, WSO2 has developed organizational, project management, and technical expertise to help IT organizations transform integration projects to a more efficient and scalable continuous agile approach.
Computational reproducibility using Continuous Integration to produce verifiable end-to-end runs of scientific analysis.
Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite
A list of threat sinks used in the manual security source code review for application security
A list of websites using BEM methodology for naming CSS classes.
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Extracting biomedical relationships from literature with Snorkel 🏊
Basic setup to use the Coderockr Way methodology
Home of Repeatable Software Development Process
Подход к организации файловой структуры проектов
An unsupervised transfer learning approach for rare disease transcriptomics