A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Sep 19, 2025 - Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A minimalist command line knowledge base manager
This methodology provides a structured approach for collaborating with AI systems on software development projects. It addresses common issues like code bloat, architectural drift, and context dilution through systematic constraints and validation checkpoints.
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Shared Latent Space VAE's
Pipeline to implement a "TAD_Pathways" analysis. Discover candidate genes based on association signals in TADs
Using Machine Learning to Identify Glioblastoma patients with NF1 inactivation
Vault mẫu cho phương pháp ghi chú FLOW trong Obsidian
This software package accompanies the paper "A Methodology for Comparing Auto-Tuning Optimization Algorithms" (https://doi.org/10.1016/j.future.2024.05.021), making the guidelines in the methodology easy to apply.
This repository contains the POC and the scanner to catch the Shortcut Hotkey Exploitation method.
This repository documents my path from cybersecurity enthusiast to a skilled bug bounty hunter. Here, I share the tools, resources, techniques, and real-world insights I've gathered along the way, aimed at uncovering vulnerabilities and improving application security.
Running next generation
Methods to build a network of pathway co-occurrence relationships out of expression signatures extracted from transcriptomic compendia.
This is the official repository of the paper Everyone's a Winner! On Hyperparameter Tuning of Recommendation Models
Public repository for the techniques and tools shown on redteamtechniques.de or rtt.secdude.de
DEPRECATED: Integrating topologically associating domains (TADs) to prioritize GWAS signal
A Risk Assessment and Management tool based on the ABC methodology, which facilitates the identification and analysis of risks, risk level measurement, and the determination of risk mitigation strategies, with the goal of comprehensive documentation, understanding, and management of data related to risk applied to cultural assets.
Using Google ADK to search methods used in bioRxiv papers
GRIDSAFE - Grid Security Assessment and Framework Evaluation
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."