Stars
An ultra-simplified explanation to design patterns
High performance self-hosted photo and video management solution.
ASP .NET Core, Entity Framework Core, PostgreSQL
A very compact representation of a placeholder for an image.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…
YARA signature and IOC database for my scanners and tools
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
The Python Code Tutorials
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threa…
Clean Architecture Solution Template for ASP.NET Core
A series of Jupyter notebooks that walk you through the fundamentals of Machine Learning and Deep Learning in Python using Scikit-Learn, Keras and TensorFlow 2.
The official gpt4free repository | various collection of powerful language models
A collection of various awesome lists for hackers, pentesters and security researchers
An automated price tracker that uses bright data, playwright, react and flask.
The ultimate resource for transitioning to freelancing for software developers 👩💻🇫🇮
A CLI that writes your git commit messages for you with AI
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
Breadth-first search (BFS) is an algorithm for traversing or searching a graph or tree data structure. It starts at the root node and explores all the nodes at the current level before moving on to…
A curated awesome list of tech folks, resources, communities and more by Ghanaians.
🎯 XML External Entity (XXE) Injection Payload List
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This project is aimed at freely providing technical guides on various hacking topics.