sondt99 / Quan-Ly-Thu-Phi-Dong-GopLinks
Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố
☆13Updated last year
Alternatives and similar repositories for Quan-Ly-Thu-Phi-Dong-Gop
Users that are interested in Quan-Ly-Thu-Phi-Dong-Gop are comparing it to the libraries listed below
Sorting:
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 5 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 7 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆11Updated 8 months ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆18Updated 7 months ago
- CTF Archives: Collection of CTF Challenges.☆1,278Updated this week
- Codebase for challenges in VHC_CTF_2023☆18Updated last year
- Bounty Boys: OWASP Top 10 Series☆29Updated last year
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆139Updated 9 months ago
- Challenges I created for CTF competitions.☆233Updated 3 months ago
- Files + Solutions for DownUnderCTF 2025 Challenges☆107Updated 4 months ago
- ☆12Updated 3 months ago
- Python implementations of cryptographic attacks and utilities.☆1,202Updated 10 months ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆21Updated last year
- ☆34Updated last month
- Write-ups for various CTF☆206Updated 2 months ago
- Challenges for ImaginaryCTF 2025☆24Updated 2 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆119Updated 11 months ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆23Updated 9 months ago
- A pure python tool to implement/exploit the hash length extension attack☆36Updated 2 years ago
- TCP1P CTF 2024 Challenges Repo☆28Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2025☆33Updated 10 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆75Updated last year
- ☆21Updated last month
- Python sandbox escape wiki + payload generator☆132Updated last year
- Cracking psuedorandom stuffs.☆21Updated 6 months ago
- Network analysis tool for Attack Defence CTF☆400Updated last month
- Red Team Operator - Resource☆30Updated last year
- in preparation for the pyjail club☆57Updated 6 months ago