18F / tts-buy-bug-bountyView external linksLinks
Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organizations.
☆19Aug 17, 2018Updated 7 years ago
Alternatives and similar repositories for tts-buy-bug-bounty
Users that are interested in tts-buy-bug-bounty are comparing it to the libraries listed below
Sorting:
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- This repository collects proposals to enhance Schematron beyond the ISO specification☆10Feb 8, 2022Updated 4 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- Basic Jupyter Notebook Tech Series☆14Apr 22, 2023Updated 2 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls☆35Jun 1, 2015Updated 10 years ago
- This plugin is a helper for sending DITA files to translation.☆10May 14, 2025Updated 9 months ago
- DEPRECATED eXist code for Syriaca.org: The Syriac Reference Portal☆10Jun 1, 2024Updated last year
- ☆10Jun 12, 2020Updated 5 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- TEI-encoded contents of the Egyptian Gazette☆15Jun 11, 2024Updated last year
- Text Analysis of the China Quarterly Censorship Scandal☆11Oct 6, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- DITA-OT plugin for transforming DITA to reveal.js based web presentations☆13Jan 27, 2026Updated 3 weeks ago
- Project to digitize avant-garde periodicals☆12May 13, 2022Updated 3 years ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 7 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Material for the XSLT 3.0 Interoperability workshop at XML Prague 2016☆10Jun 5, 2016Updated 9 years ago
- Fork of Apache XML-RPC☆13Oct 26, 2025Updated 3 months ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- A node.js client library for the eXist-db Native XML Database.☆15Feb 19, 2019Updated 6 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Publishes the Service Manual on GOV.UK☆12Updated this week
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Main site of information of XPath Next☆12Apr 5, 2023Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- ☆12Jul 15, 2024Updated last year
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- A Federalist template that uses the U.S. Web Design Standards Jekyll theme☆11Jul 15, 2019Updated 6 years ago