sondt99 / Quan-Ly-Thu-Phi-Dong-GopLinks
Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố
☆13Updated last year
Alternatives and similar repositories for Quan-Ly-Thu-Phi-Dong-Gop
Users that are interested in Quan-Ly-Thu-Phi-Dong-Gop are comparing it to the libraries listed below
Sorting:
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated last year
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 6 months ago
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 4 months ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆18Updated 6 months ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆11Updated 7 months ago
- CTF Archives: Collection of CTF Challenges.☆1,257Updated last week
- Challenges I created for CTF competitions.☆229Updated 2 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆85Updated 3 months ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆139Updated 8 months ago
- Challenges for ImaginaryCTF 2025☆24Updated 2 months ago
- Codebase for challenges in VHC_CTF_2023☆18Updated last year
- A toolkit for cryptanalysis using lattices.☆132Updated last year
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆118Updated 10 months ago
- TCP1P CTF 2024 Challenges Repo☆28Updated last year
- A pure python tool to implement/exploit the hash length extension attack☆36Updated 2 years ago
- Files + Solutions for DownUnderCTF 2025 Challenges☆107Updated 3 months ago
- Cracking psuedorandom stuffs.☆20Updated 5 months ago
- AIS3 2025 課程教材 - 典範轉移:AI 時代的情資運用及防禦☆46Updated 3 months ago
- ☆12Updated 3 months ago
- ☆28Updated last year
- Python implementations of cryptographic attacks and utilities.☆1,189Updated 9 months ago
- Bounty Boys: OWASP Top 10 Series☆29Updated 11 months ago
- This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.☆22Updated last year
- ☆99Updated 6 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆74Updated last year
- Coppersmith's method for multivariate polynomials☆187Updated 2 years ago
- Python sandbox escape wiki + payload generator☆128Updated last year
- Solution of some challenges on Cryptohack☆13Updated last year
- Network analysis tool for Attack Defence CTF☆394Updated last month