COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20220821073140/https://github.com/topics/methodology
Here are
170 public repositories
matching this topic...
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Updated
Aug 19, 2022
Python
A minimalist command line knowledge base manager
Updated
Dec 4, 2021
Python
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
Proven approaches that can guide you through applying open source best practices within your organization
Updated
Aug 19, 2022
HTML
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Notes for taking the OSCP in 2097. Read in book form on GitBook
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
🍰 Architectural design methodology for Frontend projects
Updated
Aug 20, 2022
JavaScript
Aiming to be a fully transparent company. All information about source{d} and what it's like to work here.
Updated
Dec 11, 2019
JavaScript
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Updated
Aug 20, 2022
VHDL
My personal bug bounty toolkit.
Updated
Jun 14, 2020
JavaScript
Test, build, and deploy your apps from anywhere, the same way!
Updated
Aug 2, 2022
Makefile
Building classifiers using cancer transcriptomes across 33 different cancer-types
Updated
Apr 30, 2019
Jupyter Notebook
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Computational reproducibility using Continuous Integration to produce verifiable end-to-end runs of scientific analysis.
Updated
Dec 10, 2020
Jupyter Notebook
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Updated
May 26, 2016
Python
A list of websites using BEM methodology for naming CSS classes.
Improve this page
Add a description, image, and links to the
methodology
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
methodology
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.