NicolasPerezUNLaSMN / PROG_II_UADE_JAVALinks
Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆32Updated last month
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below
Sorting:
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,502Updated last month
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆485Updated last week
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- ☆23Updated 4 months ago
- recon for bug hunters☆857Updated last month
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,801Updated 4 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆878Updated last week
- ☆18Updated 5 months ago
- ☆532Updated 2 months ago
- A simple tool for bypassing file upload restrictions.☆888Updated last year
- An advanced JavaScript reconnaissance tool for endpoints, secrets, and more☆13Updated 9 months ago
- how to look for Leaked Credentials !☆1,017Updated last year
- A Modern Framework for Bug Bounty Hunting☆640Updated 10 months ago
- HTB Certified Penetration Testing Specialist CPTS Study☆262Updated 2 years ago
- Automatic SSTI detection tool with interactive interface☆1,313Updated 3 weeks ago
- An insane list of all dorks taken from everywhere from various different sources.☆759Updated last week
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆14Updated 3 months ago
- A OWASP Based Checklist With 500+ Test Cases☆840Updated 3 years ago
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆69Updated last year
- Here you can find mostly all disclosed h1 reports☆28Updated 3 years ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆633Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,406Updated 11 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,392Updated 5 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆721Updated last month
- ☆464Updated 4 months ago
- A simple script just made for self use for bypassing 403☆2,005Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,456Updated last week
- A modern tool written in Python that automates your xss findings.☆468Updated 2 years ago
- My Notes about Penetration Testing☆720Updated last month
- Kali for Penetration Testers, by EC-Council☆13Updated 3 years ago