NicolasPerezUNLaSMN / PROG_II_UADE_JAVALinks
Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆31Updated 2 weeks ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below
Sorting:
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,431Updated 2 weeks ago
- recon for bug hunters☆834Updated last week
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,752Updated 3 months ago
- ☆506Updated last month
- Automatic SSTI detection tool with interactive interface☆1,274Updated 3 months ago
- A simple tool for bypassing file upload restrictions.☆884Updated last year
- A Modern Framework for Bug Bounty Hunting☆633Updated 9 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,364Updated 4 months ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,543Updated 3 years ago
- ☆444Updated 3 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆871Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,329Updated 2 weeks ago
- A modern tool written in Python that automates your xss findings.☆464Updated 2 years ago
- A simple script just made for self use for bypassing 403☆1,990Updated last year
- ☆27Updated last week
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated 2 months ago
- An advanced JavaScript reconnaissance tool for endpoints, secrets, and more☆13Updated 7 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆396Updated last week
- how to look for Leaked Credentials !☆1,000Updated last year
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,119Updated last year
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆547Updated 2 months ago
- ☆18Updated 4 months ago
- A OWASP Based Checklist With 500+ Test Cases☆818Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,400Updated 10 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,789Updated last month
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆699Updated last week
- ☆218Updated last month
- HTB Certified Penetration Testing Specialist CPTS Study☆255Updated 2 years ago
- Rockyou for web fuzzing☆2,958Updated 3 months ago