A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Apr 9, 2025 - Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A minimalist command line knowledge base manager
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Shared Latent Space VAE's
Using Machine Learning to Identify Glioblastoma patients with NF1 inactivation
Pipeline to implement a "TAD_Pathways" analysis. Discover candidate genes based on association signals in TADs
Vault mẫu cho phương pháp ghi chú FLOW trong Obsidian
This software package accompanies the paper "A Methodology for Comparing Auto-Tuning Optimization Algorithms" (https://doi.org/10.1016/j.future.2024.05.021), making the guidelines in the methodology easy to apply.
This repository contains the POC and the scanner to catch the Shortcut Hotkey Exploitation method.
Running next generation
This repository documents my path from cybersecurity enthusiast to a skilled bug bounty hunter. Here, I share the tools, resources, techniques, and real-world insights I've gathered along the way, aimed at uncovering vulnerabilities and improving application security.
Methods to build a network of pathway co-occurrence relationships out of expression signatures extracted from transcriptomic compendia.
This is the official repository of the paper Everyone's a Winner! On Hyperparameter Tuning of Recommendation Models
Public repository for the techniques and tools shown on redteamtechniques.de or rtt.secdude.de
DEPRECATED: Integrating topologically associating domains (TADs) to prioritize GWAS signal
A Risk Assessment and Management tool based on the ABC methodology, which facilitates the identification and analysis of risks, risk level measurement, and the determination of risk mitigation strategies, with the goal of comprehensive documentation, understanding, and management of data related to risk applied to cultural assets.
GRIDSAFE - Grid Security Assessment and Framework Evaluation
fast and easy development of simulation methods and teaching purposes
This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."