Software Laboratory, 2023/2024, Spring semester
☆13May 7, 2024Updated last year
Alternatives and similar repositories for 2324-2-common
Users that are interested in 2324-2-common are comparing it to the libraries listed below
Sorting:
- Concurrent Programming - 2024 - Spring☆13May 28, 2024Updated last year
- Some notes from the courses of my Bachelor's Degree in Computer Science and Engineering, at ISEL.☆84Feb 2, 2026Updated last month
- ☆732Sep 24, 2024Updated last year
- Cybersecurity Career Path☆2,002Aug 10, 2025Updated 6 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,820Jun 9, 2024Updated last year
- ☆2,442Feb 2, 2026Updated last month
- Rockyou for web fuzzing☆3,028Feb 11, 2026Updated 3 weeks ago
- The Bug Hunters Methodology☆4,260Aug 1, 2023Updated 2 years ago
- List of Awesome Red Teaming Resources☆7,809Dec 28, 2023Updated 2 years ago
- A list of resources for those interested in getting started in bug bounties☆11,867Jul 23, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,066Jan 11, 2026Updated last month
- 🕵️♂️ Offensive Google framework.☆18,493Feb 5, 2026Updated last month
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,297Feb 27, 2026Updated last week
- 🎓 Path to a free self-taught education in Computer Science!☆202,136Updated this week
- 🚀✨ Help beginners to contribute to open source projects☆52,836Updated this week
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,764Updated this week
- The Patterns of Scalable, Reliable, and Performant Large-Scale Systems☆68,878Jan 4, 2026Updated 2 months ago
- Run your GitHub Actions locally 🚀☆69,166Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Updated this week
- Papers from the computer science community to read and discuss.☆103,705Feb 22, 2026Updated last week
- Vim-fork focused on extensibility and usability☆96,915Updated this week
- A collection of (mostly) technical things every software developer should know about☆98,185Dec 29, 2025Updated 2 months ago
- Master the command line, in one page☆159,976Jun 25, 2024Updated last year
- 😎 Awesome lists about all kinds of interesting topics☆441,457Updated this week
- Kubernetes node clone factory☆14Sep 21, 2022Updated 3 years ago
- Trading signals processing solution that supports signals filtering and posting to broker or exchanges that are not integrated into your …☆10May 9, 2021Updated 4 years ago
- The Reactive Extensions for JavaScript☆19,397Apr 18, 2018Updated 7 years ago
- A series of basic principles to follow in order to excel at working remotely☆14Mar 31, 2020Updated 5 years ago
- Erlang TCP/IP Stack☆16Nov 17, 2019Updated 6 years ago
- Retroid Pocket 5 Wiki/FAQ☆21Jul 5, 2025Updated 8 months ago
- ECE 4551: Computer Architecture☆11Nov 25, 2019Updated 6 years ago
- Get an available TCP port in Clojure with options☆21Sep 27, 2024Updated last year
- RFS filters (GLMB and GM-PHD)☆17Mar 1, 2024Updated 2 years ago
- Zig peer type resolution at comptime, ported from the compiler source code☆15Jan 6, 2021Updated 5 years ago
- Community-driven tools for Path of Exile 2 players. Build planning, DPS calculations, and more.☆13Dec 15, 2025Updated 2 months ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- ☆52Aug 2, 2024Updated last year
- For unmanned missions into GPT returning structured data☆12May 16, 2023Updated 2 years ago