Collection of STEM articles and tidbits you can read over a lunch break.
☆36Nov 14, 2022Updated 3 years ago
Alternatives and similar repositories for Awesome-Reading-List
Users that are interested in Awesome-Reading-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- Mirror of the "Raid faster - recover better" (rfrb) tool by Sabine Seufert and Christian Zoubek, is a recovery tool for different RAID le…☆12May 15, 2015Updated 10 years ago
- python text steganography library☆11Nov 29, 2022Updated 3 years ago
- A simple blog template to quickly get started with writing. It has a clean design and provides a lot of flexibility.☆11Mar 15, 2022Updated 4 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 11 months ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- A curated list of resources, services, and apps for teaching and learning☆12Mar 29, 2021Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 4 months ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- A curated list of posts about web typography☆20Oct 13, 2014Updated 11 years ago
- ☆18May 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- Detects and extracts images from Goerli Testnet blockchain☆23Nov 25, 2021Updated 4 years ago
- A Secure-ish Crypto Execution Module☆16Jun 22, 2022Updated 3 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 8 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆26Dec 16, 2023Updated 2 years ago
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- Utilities for Pentesting with BloodHound☆23Apr 7, 2026Updated last week
- List of papers, datasets and other resources related to Machine Comprehension☆12Jul 22, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- 孜孜不断的技术分享。包含Java技术相关,实用工具分享,开源项目环境搭建等内容。每周持续更新哦!☆13Jan 9, 2021Updated 5 years ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- Open source library list, including swift and objective-c,and excellent blog.☆10Aug 29, 2017Updated 8 years ago
- (EDUCATIONAL PURPOSES ONLY) bypass discord blacklisted words.☆10Apr 27, 2023Updated 2 years ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆92Mar 23, 2026Updated 3 weeks ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago