☆22Nov 24, 2015Updated 10 years ago
Alternatives and similar repositories for cuhk-csci3150
Users that are interested in cuhk-csci3150 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Abandoned] Automatic login to CUHK OnePass(unofficial)☆19Nov 6, 2017Updated 8 years ago
- ☆23Nov 16, 2025Updated 5 months ago
- An example of how you can use Azure API Management to implement a no token in the browser pattern for a JavaScript single-page applicatio…☆10Jul 8, 2025Updated 9 months ago
- An opinionated way to deploy a Kubernetes cluster on top of an OpenStack cloud.☆13Aug 9, 2018Updated 7 years ago
- Scripts to connect to the CUHK department VPN.☆10Oct 15, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- QR Codes = Lambda + API Gateway + CloudFront☆16Nov 18, 2025Updated 5 months ago
- ☆17Sep 13, 2019Updated 6 years ago
- NGC VMI Example Scripts☆26Oct 15, 2018Updated 7 years ago
- Integrating information about species distributions in an effort to support global understanding of the world's biodiversity.☆25Jun 9, 2014Updated 11 years ago
- F5 Super NetOps container images that enable Automation and Orchestration with a DevOps methodology☆22Apr 16, 2018Updated 8 years ago
- POC in a Box☆17Jan 20, 2023Updated 3 years ago
- Dark theme for youtube.com☆13Mar 31, 2017Updated 9 years ago
- website for SYSUJWXT☆26Dec 5, 2012Updated 13 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Build worker safety app using AWS DeepLens and Amazon Rekognition.☆21Jul 10, 2020Updated 5 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- The Duplex trait: interactive streams☆19Sep 6, 2024Updated last year
- ☆11May 7, 2015Updated 10 years ago
- Cookbook of recipes for using OpenShift.☆36Oct 31, 2018Updated 7 years ago
- 招一个好的程序猿要多少钱☆32Nov 7, 2015Updated 10 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- Just another meaningless work☆33Sep 18, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Dec 20, 2014Updated 11 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Generic firmware for homebrew computer keyboard controllers.☆21May 30, 2010Updated 15 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- MesaLock Linux packages.☆13Dec 19, 2018Updated 7 years ago
- Hardware Isolation Layer, formerly Hardware as a Service☆24Nov 12, 2020Updated 5 years ago
- BSidesVienna Homepage☆16Apr 20, 2026Updated last week
- ☆19Dec 19, 2019Updated 6 years ago
- Katacoda scenarios for learning how to modernize existing apps using JBoss and OpenShift☆39Oct 9, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Jan 9, 2019Updated 7 years ago
- ApkSecurityAnalysis☆66May 10, 2019Updated 6 years ago
- An iproute2 utility written in Go.☆21May 27, 2024Updated last year
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- ☆32Feb 2, 2022Updated 4 years ago