Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆33Nov 28, 2025Updated 4 months ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Instrumentos recomendados y buenas prácticas para el desarrollo del arte digital☆14Mar 20, 2023Updated 3 years ago
- Repositorio de ejercitación en clase☆13Jun 22, 2023Updated 2 years ago
- El material de la cátedra edición 2023☆62Aug 6, 2024Updated last year
- ☆43Jul 30, 2024Updated last year
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆454Mar 17, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆306Dec 16, 2025Updated 3 months ago
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆492Apr 4, 2026Updated last week
- ☆389Jun 25, 2025Updated 9 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆410Dec 22, 2025Updated 3 months ago
- A simple tool for bypassing file upload restrictions.☆899Jul 22, 2024Updated last year
- NoDPI is a utility for bypassing the DPI (Deep Packet Inspection)☆1,429Mar 23, 2026Updated 2 weeks ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆888Dec 28, 2025Updated 3 months ago
- A comprehensive list of tools that can be used for finding information related to a specific vehicle.☆967Nov 20, 2024Updated last year
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,997Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automatic SSTI detection tool with interactive interface☆1,459Mar 22, 2026Updated 2 weeks ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,443Jan 19, 2025Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,964Jan 28, 2026Updated 2 months ago
- A next-generation crawling and spidering framework.☆16,417Apr 3, 2026Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,720Mar 26, 2026Updated 2 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- Curated coding interview preparation materials for busy software engineers☆138,556Mar 20, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A complete computer science study plan to become a software engineer.☆340,348Aug 28, 2025Updated 7 months ago