Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆33Nov 28, 2025Updated 5 months ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Instrumentos recomendados y buenas prácticas para el desarrollo del arte digital☆14Mar 20, 2023Updated 3 years ago
- Repositorio de ejercitación en clase☆13Jun 22, 2023Updated 2 years ago
- El material de la cátedra edición 2023☆62Aug 6, 2024Updated last year
- ☆43Jul 30, 2024Updated last year
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆474Mar 17, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆308Dec 16, 2025Updated 4 months ago
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆521Apr 24, 2026Updated last week
- ☆396Jun 25, 2025Updated 10 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆414Updated this week
- A simple tool for bypassing file upload restrictions.☆901Jul 22, 2024Updated last year
- NoDPI is a utility for bypassing the DPI (Deep Packet Inspection)☆1,445Mar 23, 2026Updated last month
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆894Dec 28, 2025Updated 4 months ago
- A comprehensive list of tools that can be used for finding information related to a specific vehicle.☆981Nov 20, 2024Updated last year
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆3,345Apr 19, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatic SSTI detection tool with interactive interface☆1,479Updated this week
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,739Dec 1, 2024Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,451Jan 19, 2025Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,982Jan 28, 2026Updated 3 months ago
- A next-generation crawling and spidering framework.☆16,579Apr 22, 2026Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,814Mar 26, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- Curated coding interview preparation materials for busy software engineers☆139,032Apr 5, 2026Updated 3 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A complete computer science study plan to become a software engineer.☆342,784Aug 28, 2025Updated 8 months ago