This repository provides you with all DSA (Data Structures and Algorithm) codes and ALP NASM (Assembly Language Programming) 80386 MICROPROCESSOR for Second year SPPU Computer Engineering 2019 Pattern
β13Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for SEM4-SE-CSE-SPPU-CODES-2019-Pattern-second-year
Users that are interested in SEM4-SE-CSE-SPPU-CODES-2019-Pattern-second-year are comparing it to the libraries listed below
Sorting:
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. πβ¦β15Apr 15, 2025Updated 10 months ago
- A Decentralised Encrypted File Storing and Sharing App which is back-boned by Ethereum Smart Contracts and is preparing its launch to theβ¦β29Mar 10, 2023Updated 2 years ago
- β40Aug 31, 2025Updated 6 months ago
- β61Nov 30, 2024Updated last year
- A Powerful Recon Engineβ68Nov 20, 2024Updated last year
- GeoServer Remote Code Executionβ86Apr 6, 2025Updated 11 months ago
- Content for OWASP Summit 2017 siteβ129Nov 12, 2020Updated 5 years ago
- β140Nov 2, 2024Updated last year
- OWASP Foundation Web Respositoryβ165Mar 2, 2026Updated last week
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. Iβ¦β163Nov 28, 2024Updated last year
- OWASP ASVS checklist for auditsβ214Jan 5, 2024Updated 2 years ago
- β1,050Feb 1, 2025Updated last year
- Solution of the problems listed in DSA cracker sheet made by Love Babbar, with resources and some notes.β364Aug 19, 2025Updated 6 months ago
- Bugcrowdβs baseline priority ratings for common security vulnerabilitiesβ524Updated this week
- An open source, online threat modelling tool from OWASPβ484Jul 18, 2025Updated 7 months ago
- OWASP Honeypot, Automated Deception Framework.β478Sep 15, 2024Updated last year
- This a adaption of tomnomnom's kxss tool with a different output formatβ517Sep 27, 2023Updated 2 years ago
- A fast WordPress plugin enumeration toolβ786Mar 3, 2026Updated last week
- Starting from Zero in Coding - DSA is a critical Problem-Solving Skill, it's important to build a strong foundation before diving into itβ¦β1,020Oct 14, 2024Updated last year
- 1337 Wordlists for Bug Bounty Huntingβ931Updated this week
- Collection of LeetCode questions to ace the coding interview!β936Nov 3, 2022Updated 3 years ago
- An open source threat modeling tool from OWASPβ1,337Updated this week
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/β1,173Sep 11, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Reβ¦β1,823Aug 20, 2025Updated 6 months ago
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pβ¦β1,742Feb 9, 2023Updated 3 years ago
- Top ideas for a particular compmay to build some crazy projects.β2,152Jan 1, 2025Updated last year
- The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Nodβ¦β2,015Jun 15, 2024Updated last year
- OWASP API Security Projectβ2,252Jan 1, 2026Updated 2 months ago
- The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.β2,339Dec 22, 2025Updated 2 months ago
- Application Security Verification Standardβ3,359Mar 2, 2026Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.β3,542Feb 11, 2023Updated 3 years ago
- Red Teaming Tactics and Techniquesβ4,501Aug 22, 2024Updated last year
- HTTP parameter discovery suite.β6,109Feb 20, 2025Updated last year
- All about bug bounty (bypasses, payloads, and etc)β6,658Sep 8, 2023Updated 2 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web applicationβ12,634Updated this week
- A list of resources for those interested in getting started in bug bountiesβ11,884Jul 23, 2024Updated last year
- In-depth attack surface mapping and asset discoveryβ14,222Updated this week
- Find, verify, and analyze leaked credentialsβ24,933Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,300Mar 2, 2026Updated last week