Human Trafficking Case Data Standard
☆23Apr 7, 2024Updated 2 years ago
Alternatives and similar repositories for HTCDS
Users that are interested in HTCDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detects potential human trafficking through analysis of online forum posts. Built at Girl Develop It 2011 Hackathon for Humanity.☆15Jul 18, 2011Updated 14 years ago
- Human Trafficking dataset & analysis☆11May 9, 2019Updated 6 years ago
- 1xbet, 1xbet crash , 1xbet crash hack game, 1xbet hack, linebet crash hack, linebet hack, melbet crash hack, crash hack هكر الطيارة, لعبة…☆16Jan 13, 2025Updated last year
- A project intended to fight human trafficking by using the web as a database☆74Jun 28, 2020Updated 5 years ago
- A list of organizations accepting job applications to make your hiring practices more diverse and inclusive.☆13Jan 26, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Able to hack 1xbet apple of fortune☆42Oct 29, 2023Updated 2 years ago
- Discover a curated directory of free learning resources and badges offered in various domains. This repository compiles information on co…☆25Jan 26, 2026Updated 3 months ago
- Dockerized version of Uwazi (“openness" in Swahili). HURIDOCS designed Uwazi to make human rights information more open and accessible to…☆13Jul 30, 2023Updated 2 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Funel is a fully responsive digital agency landing page, Responsive for all devices, built using HTML, CSS, and JavaScript.☆22Sep 19, 2023Updated 2 years ago
- 脚本自动获取搬瓦工最新优惠码☆10Mar 3, 2020Updated 6 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated last year
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A plain starter template that implements account management and community forum.☆19Oct 4, 2025Updated 6 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Windows 2000 Source Code☆12Aug 3, 2024Updated last year
- ☆12Apr 22, 2026Updated last week
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- Nginx module to write `strftime` formatted time to a nginx conf variable☆16Aug 8, 2017Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Arduino code to control the Walgreen Christmas Light set. See http://blog.hmpg.net/2014/01/walgreens-15-c9-multi-color-light-show.html f…☆17Dec 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- A documentation automation system for SaMD and medical device software. Documentation-as-code for ISO62304 compliant development processe…☆14Feb 8, 2026Updated 2 months ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Users parser for Fetlife website.☆13Jun 28, 2023Updated 2 years ago
- pathscanner☆14Jun 5, 2015Updated 10 years ago
- Ansible AWX code promotion solution using Ansible playbooks and the tower modules. This can be consumed via Jenkins, GitHub Actions, GitL…☆11Dec 18, 2019Updated 6 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- How to build your own predictive market☆10Feb 13, 2018Updated 8 years ago
- Use clash without DNS leak on Windows x64☆10Oct 28, 2023Updated 2 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- Utility enabling easy capture and monitoring of Zigbee frames in Wireshark. This simple utility program implements a named pipe between …☆11Aug 8, 2015Updated 10 years ago