NicolasPerezUNLaSMN / PROG_II_UADE_JAVAView external linksLinks
Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE
☆33Nov 28, 2025Updated 2 months ago
Alternatives and similar repositories for PROG_II_UADE_JAVA
Users that are interested in PROG_II_UADE_JAVA are comparing it to the libraries listed below
Sorting:
- Instrumentos recomendados y buenas prácticas para el desarrollo del arte digital☆14Mar 20, 2023Updated 2 years ago
- El material de la cátedra edición 2023☆63Aug 6, 2024Updated last year
- ☆43Jul 30, 2024Updated last year
- Repositorio de ejercitación en clase☆13Jun 22, 2023Updated 2 years ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆297Dec 16, 2025Updated 2 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆402Dec 22, 2025Updated last month
- NoDPI is a utility for bypassing the DPI (Deep Packet Inspection)☆1,379Jan 8, 2026Updated last month
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆883Dec 28, 2025Updated last month
- A comprehensive list of tools that can be used for finding information related to a specific vehicle.☆943Nov 20, 2024Updated last year
- A simple tool for bypassing file upload restrictions.☆892Jul 22, 2024Updated last year
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,569Updated this week
- Automatic SSTI detection tool with interactive interface☆1,374Jan 17, 2026Updated 3 weeks ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,413Jan 19, 2025Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,898Jan 28, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- A next-generation crawling and spidering framework.☆15,544Feb 9, 2026Updated last week
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,504Jan 4, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,135Feb 2, 2026Updated 2 weeks ago
- Curated coding interview preparation materials for busy software engineers☆137,560Jan 26, 2026Updated 3 weeks ago
- A complete computer science study plan to become a software engineer.☆336,940Aug 28, 2025Updated 5 months ago