A simple system for hosting competitive programming contests.
☆23Nov 20, 2025Updated 5 months ago
Alternatives and similar repositories for kjudge
Users that are interested in kjudge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Dec 4, 2018Updated 7 years ago
- Package evdev provides input and uinput handling on Linux.☆15Mar 25, 2019Updated 7 years ago
- Multi-Agent LLM System for Digital Scam Protection☆15Dec 19, 2024Updated last year
- ☆10Oct 22, 2017Updated 8 years ago
- A Caddy plugin to add gopkg-like functionality to your own web sites☆12Feb 10, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Another Groonga binding for Go language.☆11Mar 7, 2016Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Packege MoonPhase for calculate the phase of Moon☆13Apr 21, 2023Updated 3 years ago
- 🛠️ xqtR (executoR) is a command line tool to execute sync or async jobs defined by yaml files on your machine. 🛠️☆11Feb 25, 2023Updated 3 years ago
- Collection of RISC-V exploits☆33Nov 10, 2019Updated 6 years ago
- Rust Intiface CLI (based on buttplug-rs)☆10Jan 16, 2023Updated 3 years ago
- superlight 1kb code editor with syntax highlight☆12Nov 7, 2018Updated 7 years ago
- A headless terminal emulator written in Golang. Choose your own frontend.☆12Mar 14, 2026Updated last month
- ☆16Oct 13, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- A tool to bechmark soilidity smart contracts and snippets☆16Mar 1, 2020Updated 6 years ago
- ☆12Nov 22, 2024Updated last year
- Boyer-Moore search algorithm in Go☆15Apr 6, 2022Updated 4 years ago
- Now you can close X by clicking on the X icon!☆10Jul 25, 2023Updated 2 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- A golang CTF competition platform with high-performance, security and low hardware requirements.☆14Nov 30, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Go library for the Hacker News API☆19Apr 7, 2020Updated 6 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆13Jul 12, 2021Updated 4 years ago
- The Hypnospiral Visualizer source code.☆18Apr 20, 2026Updated 2 weeks ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 8 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- libsoundio bindings for Go.☆12Mar 30, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆13Mar 28, 2022Updated 4 years ago
- Print Go values as Go source.☆16Dec 14, 2021Updated 4 years ago
- Backend for the OpenShock solution, that enables controlling shock collars over the internet.☆23Apr 28, 2026Updated last week
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago