wiby  
Settings



C++ Applications

https://www.stroustrup.com/applications.html

developed exploiting Object-Oriented methodologies and tools. It consists of roughly 500K lines of code and includes the implementation of a rather wide set of state-of-the-art al

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

: Strongly typed, object-oriented, whitespace matters, interpreted. Wikipedia's "Python (programming language)" Snakify You may think you know these already, but there is more to
How to become a bug-bounty hunter and do penetration testing

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

Big Ball of Mud

https://www.laputan.org/mud/mud.html

in turn, by modern object-oriented languages and powerful refactoring tools. Proponents of extreme programming portray it as placing minimal emphasis on planning and up-front desi
While much attention has been focused on high-level software architectural patterns,what is, in effect, the de-facto standard software architecture is seldom discussed. Thispaper e


Find more...