☆19Jan 1, 2013Updated 13 years ago
Alternatives and similar repositories for iText
Users that are interested in iText are comparing it to the libraries listed below
Sorting:
- ☆13Sep 22, 2017Updated 8 years ago
- Command line tools for Qualcomm EFS file system☆11Jan 16, 2020Updated 6 years ago
- ☆11Dec 11, 2022Updated 3 years ago
- Gradle plugin that generate AssertJ assertion class.☆10Dec 10, 2017Updated 8 years ago
- Experimental JHipster application with Angular Universal. Enables SSR on Jhipster Angular projects.☆13Oct 10, 2023Updated 2 years ago
- AssertJ Joda Time is a library of assertions specific to Joda Time types like DateTime or LocalDateTime☆14Jul 18, 2022Updated 3 years ago
- Volumetric Development☆11Mar 19, 2024Updated last year
- ☆12Oct 25, 2023Updated 2 years ago
- This project demonstrates some features that were introduced in Java 9 and Java 10.☆13Dec 16, 2018Updated 7 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- ☆10Jun 15, 2020Updated 5 years ago
- linux driver workaround for Huion Inspiroy G10T☆11Jan 7, 2019Updated 7 years ago
- challenge software engineer aws-sp☆12Mar 28, 2020Updated 5 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- A flask template app for REST APIs with flask-smorest and flask-sqlalchemy.☆14Sep 4, 2025Updated 6 months ago
- An example of a Spring Boot application with hibernate / JPA and a many to many association with extra colums☆14Nov 16, 2017Updated 8 years ago
- RFC2821 Email Address parser (from Haraka)☆14Jan 19, 2026Updated last month
- Code samples demonstrating benefits of some Java 8 extensions and libraries☆12Nov 1, 2017Updated 8 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Feb 19, 2026Updated 2 weeks ago
- ☆13Jan 6, 2023Updated 3 years ago
- Tasty functional testing☆37Nov 2, 2011Updated 14 years ago
- Demos from Oktane18: API and Microservices Best Practices☆19Feb 27, 2023Updated 3 years ago
- ☆18Dec 4, 2020Updated 5 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 7 months ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- Complete sample project with spring cloud using cloud config, eureka, zuul, feign, hystrix and turbine☆15Aug 13, 2018Updated 7 years ago
- How to use Angular Elements in React☆14Oct 11, 2023Updated 2 years ago
- An example usage of the fusionauth-spring-security project☆13Jun 9, 2024Updated last year
- Deep spelling/grammar checker☆14Jun 19, 2018Updated 7 years ago
- ☆16Oct 19, 2020Updated 5 years ago
- ☆14Aug 24, 2018Updated 7 years ago
- XM^online 2 - Common Utils and Endpoints☆19Feb 17, 2026Updated 2 weeks ago
- ☆19May 25, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- A DKIM library for Jakarta Mail☆21Apr 18, 2025Updated 10 months ago
- Graph visualization and exploration software. Leverages cytoscape.js and provides rich and customized graph visualizations. Aims ultimate…☆16Feb 11, 2023Updated 3 years ago
- BOP Bitcoin Client Libraries☆19Apr 23, 2015Updated 10 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago