Human Trafficking Case Data Standard
☆23Apr 7, 2024Updated 2 years ago
Alternatives and similar repositories for HTCDS
Users that are interested in HTCDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detects potential human trafficking through analysis of online forum posts. Built at Girl Develop It 2011 Hackathon for Humanity.☆15Jul 18, 2011Updated 14 years ago
- Human Trafficking dataset & analysis☆11May 9, 2019Updated 7 years ago
- ☆24Oct 15, 2019Updated 6 years ago
- 1xbet, 1xbet crash , 1xbet crash hack game, 1xbet hack, linebet crash hack, linebet hack, melbet crash hack, crash hack هكر الطيارة, لعبة…☆18Jan 13, 2025Updated last year
- A list of organizations accepting job applications to make your hiring practices more diverse and inclusive.☆13Jan 26, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Able to hack 1xbet apple of fortune☆44Oct 29, 2023Updated 2 years ago
- Discover a curated directory of free learning resources and badges offered in various domains. This repository compiles information on co…☆25Jan 26, 2026Updated 3 months ago
- Dockerized version of Uwazi (“openness" in Swahili). HURIDOCS designed Uwazi to make human rights information more open and accessible to…☆13Jul 30, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Funel is a fully responsive digital agency landing page, Responsive for all devices, built using HTML, CSS, and JavaScript.☆22Sep 19, 2023Updated 2 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- 脚本自动获取搬瓦工最新优惠码☆10Mar 3, 2020Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows 2000 Source Code☆12Aug 3, 2024Updated last year
- ☆12May 13, 2026Updated last week
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- Silverlight.FX - A lightweight framework for building well structured Rich Internet Applications using Silverlight.☆48Mar 23, 2010Updated 16 years ago
- A documentation automation system for SaMD and medical device software. Documentation-as-code for ISO62304 compliant development processe…☆14Feb 8, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Ansible AWX code promotion solution using Ansible playbooks and the tower modules. This can be consumed via Jenkins, GitHub Actions, GitL…☆11Dec 18, 2019Updated 6 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 8 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆16May 17, 2020Updated 6 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- How to build your own predictive market☆10Feb 13, 2018Updated 8 years ago
- لینک بدون فیلتر سایت وان ایکس بت☆10Jun 17, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Use clash without DNS leak on Windows x64☆10Oct 28, 2023Updated 2 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Utility enabling easy capture and monitoring of Zigbee frames in Wireshark. This simple utility program implements a named pipe between …☆11Aug 8, 2015Updated 10 years ago
- jpleph: Go Library for JPL DE Ephemerides☆12Feb 2, 2025Updated last year
- DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky☆12Sep 29, 2018Updated 7 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 10 months ago