sondt99 / Quan-Ly-Thu-Phi-Dong-GopView external linksLinks
Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố
☆12Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Quan-Ly-Thu-Phi-Dong-Gop
Users that are interested in Quan-Ly-Thu-Phi-Dong-Gop are comparing it to the libraries listed below
Sorting:
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Mar 12, 2024Updated last year
- Awesome Blog Template For Tech-er☆13Jan 28, 2026Updated 3 weeks ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Oct 28, 2024Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Jun 29, 2025Updated 7 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Nov 30, 2025Updated 2 months ago
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 3 months ago
- Đồ án Nhập môn công nghệ phần mềm, đề tài: Quản lý nhà sách.☆11Aug 12, 2021Updated 4 years ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- ☆10Sep 24, 2023Updated 2 years ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆14Mar 21, 2025Updated 10 months ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 9 months ago
- Things help you get started with Java Vulnerability☆75Feb 26, 2023Updated 2 years ago
- poqeth: Efficient, post-quantum signature verification on Ethereum☆29Aug 18, 2025Updated 6 months ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 2 months ago
- Official PyTorch implementation of PyramidTabNet: Transformer-based Table Recognition in Image-based Documents☆28Oct 5, 2024Updated last year
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- Powerful terminal made in C++☆26Jun 19, 2025Updated 7 months ago
- gRPC service that leverages a remote or local HSM/TPM to encrypt Kubernetes data at-rest with KMS v2.☆41Nov 21, 2025Updated 2 months ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- Sanboxes for AI agents and humans☆68Jan 13, 2026Updated last month
- A Sage interface for FGb (Gröbner basis computations)☆39Feb 1, 2026Updated 2 weeks ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Dataset of reverse engineering tasks done using LLMs.☆65Apr 14, 2025Updated 10 months ago
- some of the commands I usually use when doing HTB machines☆51Jan 1, 2024Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆56Jan 6, 2026Updated last month
- TCC (Tiny C Compiler) for 64-bit RISC-V, compiled to WebAssembly with Zig Compiler☆54Feb 11, 2024Updated 2 years ago
- C/C++ API Headers for Ultralight☆68Oct 23, 2024Updated last year
- Drawing images with a deterministic bouncing ball physics simulation.☆74May 2, 2025Updated 9 months ago
- ☆65Aug 26, 2025Updated 5 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆120Jan 25, 2026Updated 3 weeks ago
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- hot, just like your mother☆67Nov 28, 2024Updated last year
- ATSS-EfficientDet implemented in PyTorch, outperforming the original EfficientDet. Weights are released.☆67Apr 30, 2020Updated 5 years ago
- This is a simple implementation of a video streaming server in Node.js☆78Oct 30, 2023Updated 2 years ago
- Run iOS on Android! (QEMU-s5l89xx-port)☆90Nov 5, 2013Updated 12 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago