Lists (2)
Sort Name ascending (A-Z)
Starred repositories
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
A github of all CS related resources!
Daminik is a simple & scalable Digital Asset Manager with a built-in Content Delivery Network. The single source of truth for all your assets.
From the Transistor to the Web Browser, a rough outline for a 12 week course
Quill is a modern WYSIWYG editor built for compatibility and extensibility
FaceChain is a deep-learning toolchain for generating your Digital-Twin.
A curated list of awesome places to learn and/or practice algorithms.
🏢 A collection of links to various job listings websites and helpful resources
A guide on how to build AWS S3 from scratch on bare-metal using an exclusively open-source technology stack.
🌇 A collection of links for free stock photography, video and Illustration websites
Interact with your SQL database, Natural Language to SQL using LLMs
2025 SWE internship & new graduate job list updated daily
Building a modern alternative to Salesforce, powered by the community.
Take color-accurate timelapses of your screens and cameras on MacOS
Collection of Summer 2025 tech internships!
🎓 Path to a free self-taught education in Computer Science!
A complete computer science study plan to become a software engineer.
High performance self-hosted photo and video management solution.
Gather, curate, and feature stories of public servants and civic hackers using GitHub as part of their open government innovations
"The mother of all demo apps" — Exemplary fullstack Medium.com clone powered by React, Angular, Node, Django, and many more
Kotlin implementation of Trustchain and IPv8 with rich networking: multihoming of local Bluetooth+4G, decentral social networking, UDP hole punching, etc.
beaujeant / PwnAdventure3
Forked from Foxmole/PwnAdventure3Resources for the Pwn Adventure 3 challenges from GITS'15 (https://ghostintheshellcode.com/2015-final/)
We developed a malware for educational purposes. In particular, our goal is to provide a PoC of what is known as a Repacking attack, a known technique widely used by malware cybercrooks to trojaniz…