A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Apr 3, 2023 - Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A minimalist command line knowledge base manager
Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Proven approaches that can guide you through applying open source best practices within your organization
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Notes for taking the OSCP in 2097. Read in book form on GitBook
Aiming to be a fully transparent company. All information about source{d} and what it's like to work here.
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Test, build, and deploy your apps from anywhere, the same way!
My personal bug bounty toolkit.
Building classifiers using cancer transcriptomes across 33 different cancer-types
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Computational reproducibility using Continuous Integration to produce verifiable end-to-end runs of scientific analysis.
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
A list of websites using BEM methodology for naming CSS classes.
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."