UNMigration / HTCDSLinks
Human Trafficking Case Data Standard
☆22Updated last year
Alternatives and similar repositories for HTCDS
Users that are interested in HTCDS are comparing it to the libraries listed below
Sorting:
- Detects potential human trafficking through analysis of online forum posts. Built at Girl Develop It 2011 Hackathon for Humanity.☆14Updated 14 years ago
- 1xbet, 1xbet crash , 1xbet crash hack game, 1xbet hack, linebet crash hack, linebet hack, melbet crash hack, crash hack هكر الطيارة, لعبة…☆15Updated last year
- Able to hack 1xbet apple of fortune☆38Updated 2 years ago
- This program is a simple Medical Diagnosis System implemented using a user interface developed in C++ with the Qt framework, alongside HT…☆11Updated last year
- This is a Java GUI based Hospital Management System project, created for the Object Oriented Programming-1 (Java) course by the students …☆19Updated last year
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆19Updated 3 years ago
- Includes B.Sc. CSE coursework from AIUB, CVPR projects, tasks, and assignments. Documenting CVPR notes in Jupyter Notebooks for better un…☆12Updated last year
- Zone-H Cybercrime Archive Telegram Monitoring Bot☆14Updated 7 months ago
- Military Tools for ArcGIS is a collection of mission-focused enhancements to simplify defense and intelligence workflows in ArcGIS.☆29Updated last year
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12Updated 8 months ago
- The Advanced Automated Pentesting And Forensics Tool☆27Updated 2 years ago
- A Python wrapper around the FBI API☆16Updated 2 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15Updated 9 years ago
- A SOCMINT tool with an interactive GUI to assist criminal investigations☆16Updated 5 years ago
- A python tool for generating strong password☆11Updated 3 years ago
- bruteforcing the promo codes from the pepechicken store bc what else is there to do on a saturday night ?☆10Updated last year
- Manage the metasploit framework database☆16Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 7 years ago
- This project has all the components which you can use to clone yourself over digital channel☆55Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
-  # Ukraine-Cyber-Operations Cura…☆27Updated 3 years ago
- 1xBet twenty one game telegram bot☆33Updated 2 years ago
- Proof of Concept OSINT visualization☆12Updated 8 years ago
- Algorithmic Impact Assessment - Évaluation de l'incidence algorithmique (TS/JS)☆67Updated 4 months ago
- Automatically identify and highlight targets (Russian soldiers, right-wing extremists etc) in visualized social networks☆23Updated 3 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Updated 3 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Updated 10 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago