Extension giúp ta tự động điền form Quy chế + Pháp Luật - HUST
☆22Apr 19, 2026Updated last month
Alternatives and similar repositories for auto-fill-hust
Users that are interested in auto-fill-hust are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tập hợp các bài giảng, ví dụ mã nguồn, và bài tập liên quan đến việc học và thực hành cấu trúc dữ liệu và thuật toán sử dụng ngôn ngữ lập…☆48Jul 15, 2025Updated 10 months ago
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated 3 months ago
- Nguồn tài nguyên toàn diện để khám phá và học hỏi lập trình hướng đối tượng qua ngôn ngữ Java.☆28May 6, 2024Updated 2 years ago
- Driver library for the NXP SGTL5000 I2S audio codec IC. IoTBits AudioBit is the officially supported codec board for this driver.☆44Feb 4, 2020Updated 6 years ago
- A Model Context Protocol server that provides access to Shodan API functionality☆41Jun 29, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Offensive Security Using Python, published by Packt☆34Apr 22, 2026Updated last month
- Exploits for the TryHackMe room hackerNote☆33Feb 20, 2020Updated 6 years ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆57Apr 18, 2026Updated last month
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆98Feb 14, 2026Updated 3 months ago
- Here are some of the most important cyber security tools.☆46May 6, 2023Updated 3 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆161Mar 10, 2026Updated 2 months ago
- OSINT Tools for the Dark Web☆251Mar 26, 2025Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆268Aug 22, 2018Updated 7 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆536Apr 17, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆818Apr 16, 2026Updated last month
- A lightweight, stable, and performance-focused customized version of Windows that enhances privacy and compatibility☆1,855May 6, 2026Updated 2 weeks ago
- 754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF…☆6,313May 13, 2026Updated last week
- OSINT Tools for the Dark Web☆2,102May 22, 2025Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,747Dec 1, 2024Updated last year
- Chromium fork for Windows named after radioactive element No. 90; Windows builds of https://github.com/Alex313031/Thorium☆2,389Feb 18, 2026Updated 3 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆3,312Updated this week
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,985Apr 14, 2026Updated last month
- The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.☆2,378Dec 22, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,660Jan 4, 2024Updated 2 years ago
- A Complete Osint Tool☆3,460Feb 21, 2026Updated 3 months ago
- Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and…☆3,338Nov 16, 2025Updated 6 months ago
- Application Security Verification Standard☆3,430Mar 17, 2026Updated 2 months ago
- Translate your page in real time using Google, Bing or Yandex☆5,772May 9, 2026Updated 2 weeks ago
- Chromium fork named after radioactive element No. 90. Source code and Linux releases. Windows/MacOS/ARM builds served in different repos,…☆7,146May 8, 2026Updated 2 weeks ago
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,928Oct 12, 2024Updated last year
- Official OWASP Top 10 Document Repository☆5,656Apr 6, 2026Updated last month
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,945Oct 20, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,513Sep 22, 2024Updated last year
- Literature references for “Designing Data-Intensive Applications”☆7,072Feb 7, 2026Updated 3 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,885May 2, 2026Updated 3 weeks ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆11,036Sep 10, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,929Aug 2, 2024Updated last year
- hydra☆11,801May 14, 2026Updated last week
- The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse enginee…☆12,894Updated this week