Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆33Nov 28, 2025Updated 5 months ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Instrumentos recomendados y buenas prácticas para el desarrollo del arte digital☆14Mar 20, 2023Updated 3 years ago
- Repositorio de ejercitación en clase☆13Jun 22, 2023Updated 2 years ago
- El material de la cátedra edición 2023☆62Aug 6, 2024Updated last year
- ☆43Jul 30, 2024Updated last year
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆487Apr 26, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆309Dec 16, 2025Updated 5 months ago
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆551May 12, 2026Updated last week
- ☆448Jun 25, 2025Updated 10 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆415Apr 27, 2026Updated 3 weeks ago
- A simple tool for bypassing file upload restrictions.☆899Jul 22, 2024Updated last year
- NoDPI is a utility for bypassing the DPI (Deep Packet Inspection)☆1,460Mar 23, 2026Updated last month
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆899Dec 28, 2025Updated 4 months ago
- A comprehensive list of tools that can be used for finding information related to a specific vehicle.