Cyber Security Notes, Methodology, Resources and Tips
-
Updated
Jun 8, 2024
Cyber Security Notes, Methodology, Resources and Tips
🍰 Architectural design methodology for Frontend projects
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
IBM Data Science Professional Certificate
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
Ein Praktikum in empirischer (quantitativer) Forschung in Psychologie
Sharing knowledge, tutorials and feelings
OSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
This software package accompanies the paper "A Methodology for Comparing Auto-Tuning Optimization Algorithms" (https://doi.org/10.1016/j.future.2024.05.021), making the guidelines in the methodology easy to apply.
this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)
My personal bug bounty toolkit.
A lightweight agile process designed for startups with smaller teams.
Some great resources to gather OSINT on Email Addresses & Usernames. Alternatively check the exposure of your Email & Username.
Programming Methodology Framework - PMF methodology
Running next generation
Test, build, and deploy your apps from anywhere, the same way!
Proven approaches that can guide you through applying open source best practices within your organization
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."