Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố
☆12Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Quan-Ly-Thu-Phi-Dong-Gop
Users that are interested in Quan-Ly-Thu-Phi-Dong-Gop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Mar 12, 2024Updated 2 years ago
- Awesome Blog Template For Tech-er☆13Mar 21, 2026Updated 2 weeks ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Oct 28, 2024Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Jun 29, 2025Updated 9 months ago
- Đồ án Nhập môn công nghệ phần mềm, đề tài: Quản lý nhà sách.☆11Aug 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Nov 30, 2025Updated 4 months ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated last year
- Official PyTorch implementation of PyramidTabNet: Transformer-based Table Recognition in Image-based Documents☆28Oct 5, 2024Updated last year
- Lecture: Practical SAT Solving (ST 2025)☆13Jan 13, 2026Updated 2 months ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 5 months ago
- Things help you get started with Java Vulnerability☆75Feb 26, 2023Updated 3 years ago
- Các ví dụ và tài liệu tham khảo☆10Mar 10, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Sep 24, 2023Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 4 months ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆15Mar 21, 2025Updated last year
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- Dataset of reverse engineering tasks done using LLMs.☆68Apr 14, 2025Updated 11 months ago
- poqeth: Efficient, post-quantum signature verification on Ethereum☆30Aug 18, 2025Updated 7 months ago
- ATSS-EfficientDet implemented in PyTorch, outperforming the original EfficientDet. Weights are released.☆67Apr 30, 2020Updated 5 years ago
- Powerful terminal made in C++☆26Jun 19, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 11 months ago
- Sanboxes for AI agents and humans☆70Feb 24, 2026Updated last month
- gRPC service that leverages a remote or local HSM/TPM to encrypt Kubernetes data at-rest with KMS v2.☆42Mar 24, 2026Updated 2 weeks ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated 2 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆132Mar 6, 2026Updated last month
- TCC (Tiny C Compiler) for 64-bit RISC-V, compiled to WebAssembly with Zig Compiler☆54Feb 11, 2024Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- some of the commands I usually use when doing HTB machines☆54Jan 1, 2024Updated 2 years ago
- ☆67Aug 26, 2025Updated 7 months ago
- hot, just like your mother☆67Nov 28, 2024Updated last year
- C/C++ API Headers for Ultralight☆68Oct 23, 2024Updated last year
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆58Jan 6, 2026Updated 3 months ago
- Json Wikipedia, contains code to convert the Wikipedia xml dump into a json/avro dump☆256Dec 5, 2023Updated 2 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆154Jun 30, 2022Updated 3 years ago