Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố
☆12Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Quan-Ly-Thu-Phi-Dong-Gop
Users that are interested in Quan-Ly-Thu-Phi-Dong-Gop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Mar 12, 2024Updated 2 years ago
- Awesome Blog Template For Tech-er☆13Mar 21, 2026Updated last month
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Oct 28, 2024Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Jun 29, 2025Updated 10 months ago
- Đồ án Nhập môn công nghệ phần mềm, đề tài: Quản lý nhà sách.☆11Aug 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Nov 30, 2025Updated 5 months ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- Official PyTorch implementation of PyramidTabNet: Transformer-based Table Recognition in Image-based Documents☆28Oct 5, 2024Updated last year
- Qiling Framework Documentation☆18Mar 9, 2025Updated last year
- Lecture: Practical SAT Solving (ST 2025)☆13Jan 13, 2026Updated 3 months ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 6 months ago
- Things help you get started with Java Vulnerability☆75Feb 26, 2023Updated 3 years ago
- Các ví dụ và tài liệu tham khảo☆10Mar 10, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Sep 24, 2023Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆68May 10, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 5 months ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆16Mar 21, 2025Updated last year
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- Dataset of reverse engineering tasks done using LLMs.☆71Apr 14, 2025Updated last year
- ATSS-EfficientDet implemented in PyTorch, outperforming the original EfficientDet. Weights are released.☆66Apr 30, 2020Updated 5 years ago
- Powerful terminal made in C++☆26Jun 19, 2025Updated 10 months ago
- poqeth: Efficient, post-quantum signature verification on Ethereum☆32Aug 18, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated last year
- gRPC service that leverages a remote or local HSM/TPM to encrypt Kubernetes data at-rest with KMS v2.☆43Apr 13, 2026Updated 2 weeks ago
- Sanboxes for AI agents and humans☆69Apr 23, 2026Updated last week
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated 2 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆137Mar 6, 2026Updated last month
- TCC (Tiny C Compiler) for 64-bit RISC-V, compiled to WebAssembly with Zig Compiler☆54Feb 11, 2024Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆41Nov 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- some of the commands I usually use when doing HTB machines☆56Jan 1, 2024Updated 2 years ago
- hot, just like your mother☆67Nov 28, 2024Updated last year
- ☆68Updated this week
- C/C++ API Headers for Ultralight☆68Oct 23, 2024Updated last year
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆58Jan 6, 2026Updated 3 months ago
- Json Wikipedia, contains code to convert the Wikipedia xml dump into a json/avro dump☆256Dec 5, 2023Updated 2 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆154Jun 30, 2022Updated 3 years ago