348 results for “topic:methodology”
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A minimalist command line knowledge base manager
The Art of Debugging Open Book
Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
These patterns document how to apply open source principles and practices for software development within the confines of an organization - aka InnerSource.
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
Prompt Driven Development Command Line Interface
This methodology provides a structured approach for collaborating with AI systems on software development projects. It addresses common issues like code bloat, architectural drift, and context dilution through systematic constraints and validation checkpoints.
An Obsidian plugin to view and manage your tasks from whole vault using much efficient boards using various methodologies.
Some great resources to gather OSINT on Email Addresses & Usernames. Alternatively check the exposure of your Email & Username.
Aiming to be a fully transparent company. All information about source{d} and what it's like to work here.
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Cyber Security Notes, Methodology, Resources and Tips
Test, build, and deploy your apps from anywhere, the same way!
My personal bug bounty toolkit.
极客时间《手把手教你落地DDD》配套代码
Building classifiers using cancer transcriptomes across 33 different cancer-types
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Integration projects today follow a time-consuming waterfall model, ill-suited to solving complex integration challenges. In response, WSO2 has developed organizational, project management, and technical expertise to help IT organizations transform integration projects to a more efficient and scalable continuous agile approach.
如何做好科研写好科研文章?发顶刊顶会总结
Computational reproducibility using Continuous Integration to produce verifiable end-to-end runs of scientific analysis.
Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite
A list of threat sinks used in the manual security source code review for application security
Stop "vibe coding" and start Stream Coding, the 10-20x velocity methodology for AI-accelerated development. Includes the official SKILL.md for Claude/Cursor/Windsurf and the complete Manifesto.
A list of websites using BEM methodology for naming CSS classes.
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
✅ G-Code Driven Development ✅