NicolasPerezUNLaSMN / PROG_II_UADE_JAVALinks
Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆31Updated 3 weeks ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below
Sorting:
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,458Updated last week
- recon for bug hunters☆854Updated last month
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,764Updated 4 months ago
- ☆524Updated 2 months ago
- A Modern Framework for Bug Bounty Hunting☆637Updated 10 months ago
- ☆23Updated 3 months ago
- A simple tool for bypassing file upload restrictions.☆888Updated last year
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆614Updated 3 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- An advanced JavaScript reconnaissance tool for endpoints, secrets, and more☆13Updated 8 months ago
- ☆18Updated 5 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,388Updated 5 months ago
- how to look for Leaked Credentials !☆1,011Updated last year
- Automatic SSTI detection tool with interactive interface☆1,289Updated 4 months ago
- A simple script just made for self use for bypassing 403☆2,002Updated last year
- A modern tool written in Python that automates your xss findings.☆468Updated 2 years ago
- ☆458Updated 3 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆874Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆419Updated last week
- ☆27Updated last month
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,552Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,404Updated 11 months ago
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,686Updated 2 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,371Updated last week
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆68Updated last year
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,394Updated 5 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆313Updated 6 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,823Updated 2 months ago
- Burp Suite Certified Practitioner Exam Study☆1,257Updated last month
- A OWASP Based Checklist With 500+ Test Cases☆829Updated 3 years ago