☆22Nov 24, 2015Updated 10 years ago
Alternatives and similar repositories for cuhk-csci3150
Users that are interested in cuhk-csci3150 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Abandoned] Automatic login to CUHK OnePass(unofficial)☆19Nov 6, 2017Updated 8 years ago
- ☆29Jan 7, 2020Updated 6 years ago
- A versatile agent for task automation.☆22Nov 14, 2015Updated 10 years ago
- An example of how you can use Azure API Management to implement a no token in the browser pattern for a JavaScript single-page applicatio…☆10Jul 8, 2025Updated 9 months ago
- U.S. Taiwan Watch website.☆18Jan 5, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Scripts to connect to the CUHK department VPN.☆10Oct 15, 2015Updated 10 years ago
- 踊るうんこのgif画像を生成します。☆17May 7, 2022Updated 3 years ago
- Integrating information about species distributions in an effort to support global understanding of the world's biodiversity.☆25Jun 9, 2014Updated 11 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- Dark theme for youtube.com☆13Mar 31, 2017Updated 9 years ago
- website for SYSUJWXT☆26Dec 5, 2012Updated 13 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- The Duplex trait: interactive streams☆19Sep 6, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Full featured Plurk API 2.0 (non-official) for Node.js☆16Dec 8, 2022Updated 3 years ago
- ☆11May 7, 2015Updated 10 years ago
- Cookbook of recipes for using OpenShift.☆36Oct 31, 2018Updated 7 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- The current state of Rust’s various stable/unstable features.☆16May 7, 2021Updated 4 years ago
- Just another meaningless work☆33Sep 18, 2025Updated 6 months ago
- ☆17Dec 20, 2014Updated 11 years ago
- Generic firmware for homebrew computer keyboard controllers.☆22May 30, 2010Updated 15 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Android implementation of whatanime.ga API☆17Jul 2, 2025Updated 9 months ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- MesaLock Linux packages.☆13Dec 19, 2018Updated 7 years ago
- BSidesVienna Homepage☆16Mar 30, 2026Updated last week
- Infra-as-Code examples with Ansible and Terraform for Dell Technologies storage platforms☆33Oct 15, 2025Updated 5 months ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆22Jan 9, 2019Updated 7 years ago
- ApkSecurityAnalysis☆66May 10, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An iproute2 utility written in Go.☆21May 27, 2024Updated last year
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- ☆32Feb 2, 2022Updated 4 years ago
- An init utility purely written in Rust.☆26Jan 14, 2018Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago