Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆33Nov 28, 2025Updated 3 months ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below
Sorting:
- Instrumentos recomendados y buenas prácticas para el desarrollo del arte digital☆14Mar 20, 2023Updated 2 years ago
- El material de la cátedra edición 2023☆62Aug 6, 2024Updated last year
- ☆43Jul 30, 2024Updated last year
- Repositorio de ejercitación en clase☆13Jun 22, 2023Updated 2 years ago
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆203Updated this week
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆302Dec 16, 2025Updated 2 months ago
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆378Updated this week
- ☆375Jun 25, 2025Updated 8 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆404Dec 22, 2025Updated 2 months ago
- NoDPI is a utility for bypassing the DPI (Deep Packet Inspection)☆1,412Feb 27, 2026Updated last week
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆886Dec 28, 2025Updated 2 months ago
- A comprehensive list of tools that can be used for finding information related to a specific vehicle.☆954Nov 20, 2024Updated last year
- A simple tool for bypassing file upload restrictions.☆893Jul 22, 2024Updated last year
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,617Updated this week
- Automatic SSTI detection tool with interactive interface☆1,406Jan 17, 2026Updated last month
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,716Dec 1, 2024Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,427Jan 19, 2025Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,925Jan 28, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,667Oct 6, 2025Updated 5 months ago
- A next-generation crawling and spidering framework.☆15,799Updated this week
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,614Jan 4, 2026Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Mar 2, 2026Updated last week
- Curated coding interview preparation materials for busy software engineers☆138,045Jan 26, 2026Updated last month
- A complete computer science study plan to become a software engineer.☆337,528Aug 28, 2025Updated 6 months ago