Daily Weekly Monthly

Monthly Shaarli

All links of one month in a single page.

April, 2025

ccbrown/cloud-snitch

Cloud Snitch provides a sleek and intuitive way of exploring your AWS account activity. It's a great addition to any toolbox, regardless of if you're a hobbyist that's just getting started with the cloud or a large enterprise with complex and mature cloud infrastructure.

Share links to IP address, CIDR network, and AWS principal activity within your team. Document AWS principals with Markdown notes for your teammates. Cloud Snitch provides summaries of activity by AWS region, principal, IP address, and CIDR network. Errors are highlighted, so you can quickly spot suspicious behavior or bugs in your code. Take the investigation further with quick links into to your CloudTrail event history.

uoaerg/wavemon

wavemon is a wireless device monitoring application that allows you to watch signal and noise levels, packet statistics, device configuration and network parameters of your wireless network hardware. It should work (though with varying features) with all devices supported by the Linux kernel.

Available in the OpenWRT package repo.

nsupdate-info/nsupdate.info

https://nsupdate.info is a free dynamic DNS service. nsupdate.info is also the name of the software used to implement it. If you like, you can use it to host the service on your own server.

Webapp-y front-end that supports the dyndns2 protocol. Uses RFC 2136 (Dynamic DNS UPDATE protocol) to interface with DNSes that support it (BIND, PowerDNS, etc).

GitHub - ShakataGaNai/awesome-meshtastic: A curated list of amazingly awesome Meshtastic resources

A curated list of amazingly awesome Meshtastic resources - ShakataGaNai/awesome-meshtastic

NearlyFreeSpeech.NET Web Hosting

NearlyFreeSpeech.NET web hosting provides powerful, low-cost hosting services for experienced webmasters with a do-it-yourself focus.

short-wave.info

Short-Wave.Info is a simple way in which to interrogate a database of all the short wave broadcasts being transmitted by the majority of the world's international radio stations. There are several ways in which this vast database of frequencies can be queried:

  • You can select a language and/or a particular broadcaster
  • You can select a specific frequency
  • You can select a specific short-wave band

In all cases, our sophisticated search software will return a series of results (unless, that is, there were no results matching your query). This software is designed to allow short-wave listeners to quickly find the frequencies to which to tune as well as permitting stations being received to be easily identified. Note: You can click on any frequency, language, transmitter site or broadcaster shown in the results of a search to begin a new search.

quickwit-oss/tantivy-py

A Python module that wraps around the Tantivy search engine.

quickwit-oss/tantivy

Tantivy is closer to Apache Lucene than to Elasticsearch or Apache Solr in the sense it is not an off-the-shelf search engine server, but rather a crate that can be used to build such a search engine. Tantivy is, in fact, strongly inspired by Lucene's design.

Full-text search. Configurable tokenizer (stemming available for 17 Latin languages) with third party support for Chinese, Japanese, and Korean. Fast. Tiny startup time (<10ms), perfect for command-line tools. BM25 scoring (the same as Lucene). Natural query language and phrase query search. Incremental indexing of data. Multithreaded indexing (indexing English Wikipedia takes < 3 minutes on my desktop).

There is a CLI tool (tantivy-cli) that lets you do all the configuration and setting up from the command line.

Pandemic Mitigation Collaborative - COVID-19 Forecasting Model

The mission of the Pandemic Mitigation Collaborative is to reduce the physical and emotional burden of the COVID-19 pandemic.

As New Orleans was one of the hardest-hit cities at the pandemic onset, Dr. Hoerger's Tulane University team sprang into action to reduce the burden of the pandemic in March of 2020. The Pandemic Mitigation Collaborative was born. We are a collaborative organization grounded in trust. We have led projects to reduce COVID transmission, identify and protect the most vulnerable, and understand the physical and mental toll of COVID-19. Along the way, we have become international experts in comprehensive COVID-19 mitigation, community partnership, and mutual support. Please contact us if we can be of help.

Weekly reports will typically appear on Monday, often with some figures released early on social media. Tune in on Twitter, Instagram, or BlueSky for more frequent updates. No RSS feeds.

dalf/pypisearch

A project that reads the output of the Pypi API endpoints, builds a local database with it, and lets you run searches (which Pypi hasn't let anyone do for years).

Stored package list using rust-fst (old but works on Python 3.13). Note: there is not support for the arm architecture. The package details are fetched in real time using the JSON API, so new versions appear instantly.

Disappeared: People disappeared under the Trump regime

Has links to news articles, Court Listener documents, dates, and statuses.

Source code: https://codeberg.org/reed/disappeared

RSS feed of updates to the repo: https://codeberg.org/reed/disappeared.rss

VikOlliver/RepRapMicron

The RepRapMicron Project, or μRepRap, is an extension of the Open Source RepRap 3D printer project that aims to bring micron-scale fabrication into very widespread adoption. The main project page is here. It uses hardware and software familiar to 3D printer developers, and materials that are easily and inexpensively available.

The meaty part is in the "maus" directory, where the OpenSCAD models for a rapidly reconfigurable 3D printed prototype can be found.

At present, the project is in the very early prototyping stages, figuring out the unknown unknowns. This repository holds files that can reasonably be expected to be useful to potential developers/experimenters, but at this stage there are absolutely no guarantees.

The proof-of-concept prints have already manufactured things between 8 and 30 microns in size.

paralax/awesome-honeypots

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide.

Beej's Guide to C Programming—Library Reference

This is the second volume of Beej's Guide to C, the library reference.

This isn’t a tutorial, but rather is a comprehensive set of manual pages (or man pages as Unix hackers like to say) that define every function in the C Standard Library, complete with examples. There are, in fact, a number of functions left out of this guide, most notably all the optional “safe” functions (with a _s suffix). But everything you’re likely to want is definitely covered in here. With examples. Probably.

Github: https://github.com/beejjorgensen/bgclr

Beej's Guide to C Programming

What we’ll try to do over the course of this guide is lead you from complete and utter sheer lost confusion on to the sort of enlightened bliss that can only be obtained through pure C programming. Right on.

In the old days, C was a simpler language. A good number of the features contained in this book and a lot of the features in the Library Reference volume didn’t exist when K&R wrote the famous second edition of their book in 1988. Nevertheless, the language remains small at its core, and I hope I’ve presented it here in a way that starts with that simple core and builds outward.

This guide assumes that you’ve already got some programming knowledge under your belt from another language, such as Python2, JavaScript3, Java4, Rust5, Go6, Swift7, etc. (Objective-C8 devs will have a particularly easy time of it!)

Github: https://github.com/beejjorgensen/bgc

arm-university/Embedded-Systems-Fundamentals/

This textbook gives students an understanding of the most important topics in embedded systems design using a coherent, compelling and hands-on approach.

PDF, two editions in the repo.

You are free to fork, clone or download this book in PDF format for personal, non-commercial use only. You may reprint or republish portions of the text for non-commercial, educational or research purposes but only if there is an attribution to Arm Education. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Nothing in this license grants you any right to modify the whole, or portions of, this book.

The yaff font file format, version 1.0.3

The yaff format has the following design aims:

Human-friendly. Truly human-readable and human-editable. For example, BDF and XML claim to be human-readable formats, but let's not kid ourselves. Human-friendly means plain text, flat, immediately visualised, easy on the eye, and light and obvious syntax. We should avoid duplication of information, unless it is of obvious use to a human user.

Able to represent fixed-width and proportional fonts.

Preserves comments, metadata and metrics. Formats such as BDF contain a wealth of metadata such as names, acknowledgements and style specification, but also font metrics that affect the way the font is displayed. The yaff format should preserve these.

Able to represent Unicode fonts as well as codepage fonts.

robhagemans/hoard-of-bitfonts/

This repository contains bitmapped fonts from disused operating systems and graphical user interfaces.

As operating systems and GUIs have moved on to scalable vector fonts, the bitmap fonts that dominated the 1980s and 1990s languish away in non-obvious and often binary formats that are rapidly falling into obscurity.

The main purpose of this repository is to liberate these fonts from their binary shackles, preserving the ancient art of monochrome bitmap typography for human appreciation.

The fonts in this repository are stored in the human-friendly text-based YAFF format. As such, the easiest way to view them is to open the text files directly. Alternatively, you can use monobit to render them to images or convert them to font formats supported by current operating systems. You can also see the fonts as images here.

webrecorder/replayweb.page

ReplayWeb.page provides a static site generated with MkDocs, an npm package/library, and an Electron app all in this repo.

This repository contains the 'frontend' UI for the replay system, while the 'backend' is provided via a service worker implementation found at: https://github.com/webrecorder/wabac.js. (Of course, both frontend and backend actually run in the browser). The frontend is loaded from ui.js, while the backend service/web worker is loaded from sw.js.

To run ReplayWeb.page and view web archives, a regular HTTP server is all that is needed.

Webrecorder/pywb

pywb is a Python 3 web archiving toolkit for replaying web archives large and small as accurately as possible. The toolkit now also includes new features for creating high-fidelity web archives. This toolset forms the foundation of Webrecorder project, but also provides a generic web archiving toolkit that is used by other web archives, including the traditional "Wayback Machine" functionality.

So, basically, if you have WARC files you can view them with this application because it plays back the whole session.

pyllyukko/user.js

A user.js configuration file for Mozilla Firefox designed to harden browser settings and make it more secure. This is a default template with every possible hardening measure enforced. See the relaxed branch for a variant providing more usability.

Limit the possibilities to track the user through web analytics. Harden the browser against known data disclosure or code execution vulnerabilities. Limit the browser from storing anything even remotely sensitive persistently. Make sure the browser doesn't reveal too much information to shoulder surfers. Harden the browser's encryption (cipher suites, protocols). Limit possibilities to uniquely identify the browser/device using browser fingerprinting. Hopefully limit the attack surface by disabling various features.

Heatseeker: 3D Printable Search and Rescue Drone

Search and Rescue drones are a life saving technology for disaster response, as they can provide real-time information, deliver supplies, and help locate survivors in inaccessible areas. Unfortunately, commercial SAR drones are often expensive and hard to repair.

Dune: Text to Harkonnen Mentat Font

Online converter that substitutes the Mentat letter glyphs for English ones. Or you can download the font as a .ttf file and install it locally.

European Union Vulnerability Database

Access to reliable and timely information about vulnerabilities affecting Information and Communication Technology (ICT) products and services contributes to an enhanced cybersecurity risk management. Sources of publicly available information about vulnerabilities are an important tool for users of these services, competent authorities, and the broader cybersecurity community. ENISA has established a European Vulnerability Database (EUVD) where entities, regardless of whether they fall within the scope of the NIS2 Directive, and their suppliers of network and information systems, as well as competent authorities, most notably CSIRTs, can voluntarily disclose and register publicly known vulnerabilities to allow users to take appropriate mitigating measures.

In line with Coordinated Vulnerability Disclosure practices, which aim at providing improved transparency regarding the publication process, the EUVD is eventually used to publicly disclose the vulnerability information.

To avoid efforts duplication and to support complementarity, ENISA closely cooperates with MITRE and European as well as non-European operators of the Common Vulnerabilities and Exposures (CVE) system. In this context, ENISA offers vulnerability registry services after its onboarding as a CVE Numbering Authority (CNA), with a focus on vulnerabilities in IT products discovered by or reported to European CSIRTs for coordinated disclosure.

API: https://euvd.enisa.europa.eu/apidoc

JPL Open Source Rover

The JPL Open Source Rover is an open source, build it yourself, scaled down version of the 6 wheel rover design that JPL uses to explore the surface of Mars. The Open Source Rover is designed entirely out of consumer off the shelf (COTS) parts. This project is intended to be a teaching and learning experience for those who want to get involved in mechanical engineering, software, electronics, robotics but is also an excellent research platform for rugged terrain. No prior skills or knowledge is required.

The OSR has been around since 2017 and has undergone many iterations. It is a premium and robust robot with a unique look, high customizability, and powerful abilities. The hardware and electronics were designed with expansions like a head display and robot arm in mind.

Github: https://github.com/nasa-jpl/open-source-rover

appcypher/awesome-mcp-servers

A curated list of awesome Model Context Protocol (MCP) servers. MCP is an open protocol that enables AI models to securely interact with local and remote resources through standardized server implementations. This list focuses on production-ready and experimental MCP servers that extend AI capabilities through file access, database connections, API integrations, and other contextual services.

punkpeye/awesome-mcp-servers

MCP is an open protocol that enables AI models to securely interact with local and remote resources through standardized server implementations. This list focuses on production-ready and experimental MCP servers that extend AI capabilities through file access, database connections, API integrations, and other contextual services.

Pill Cats™ — Megan Fabbri

They're cute. They're cats. They look like pills. What's not to love?

Hackers Town Logo Bug by Kestral_ - Thingiverse

The hackers.town Void Mantis.

Original Art by K Brown

Unknown Binaries' online store.

ollama/ollama-python

The Ollama Python library provides the easiest way to integrate Python 3.8+ projects with Ollama. The Ollama Python library's API is designed around the Ollama REST API.

elder-plinius/L1B3RT4S

A repository of jailbreaks and workarounds for popular LLM models.

The CVE Foundation

A coalition of longtime, active CVE Board members have spent the past year developing a strategy to transition CVE to a dedicated, non-profit foundation. The new CVE Foundation will focus solely on continuing the mission of delivering high-quality vulnerability identification and maintaining the integrity and availability of CVE data for defenders worldwide.

Watch this space.

edoardottt/awesome-hacker-search-engines

A curated list of search engines useful during penetration testing, vulnerability assessments, red/blue team operations, bug bounties, and more.

rif/spark

A self-contained emergency web server. For those occasions when your webserver is down and you want to display a quick maintenance note. Or just want to quickly demo a static site. It can take a directory, a file or the bare HTML you want to serve as a string. The -proxy flag can be useful when used as a development server for another project.

steffest/bassoontracker

Webbased old-school Amiga music tracker in plain old javascript. Plays and edits Amiga Mod files and FastTracker XM files. This tracker requires a modern browser that supports WebAudio. It's tested to work on all major browsers desktop and mobile browsers. Midi support is not available in Firefox or Safari. Minimum requirements for mobile devices: IOS9 or Android 6.

BassoonTracker is a web application that runs in your browser. Just serve "index.html" from a webserver and you're good to go. There are no runtime dependencies. No build process is involved. There is even a stand-alone player in the player/ subdirectory.

jacklinquan/micropython-samtts

A Micropython port of Software Automatic Mouth Text-To-Speech program.

WARNING: This project is not under any open source software license. Use it at your own risk.

This MicroPython module usamtts is trimmed and optimized for MicroPython from the CPython package samtts. It keeps the core of samtts which consists of Reciter, Processor and Renderer. And it puts all the code in a single file for easy installation.

This project is an unofficial Python port of SAM. It is translated by hand from the adaption to C by Stefan Macke and the refactorings by Vidar Hokstad.

meshtastic/web

Official Meshtastic web interface, that can be hosted or served from a node.

Now includes Progressive Web App (PWA) functionality, allowing users to install the app on desktop and mobile devices, access the interface offline, receive updates automatically, and experience faster load times with caching. Works with both the hosted and self-hosted instances.

Cyber Verified Emote Pack by Revengeday

A collection of birbsite-like verified checkmark emojo in a range of neon colors.

From CORTEX IMPLANT with love Emote Pack by Revengeday

A collection of cyberpunk emojo - hearts, indicators, icons, and suchlike.

RumorGuard from the News Literacy Project

The News Literacy Project (NLP), a nonpartisan education nonprofit, is building a national movement to advance the practice of news literacy throughout American society, creating better informed, more engaged and more empowered individuals — and ultimately a stronger democracy.

NLP created RumorGuard to help us all learn how to recognize misinformation and stop it in its tracks. Each fact-checked viral rumor contains concrete tips to help you build your news literacy foundation and confidently evaluate claims you see online.

Misinformation and the lack of news literacy have created an existential threat to our democracy. As a result, there is an urgent need for news literacy for people of all ages.

A free and independent press and the ability to determine whether information is credible are necessary for the future of a healthy democracy. News literacy teaches about the importance of a free press in our democracy, including how to recognize and demand standards-based journalism, which builds an appreciation for quality journalism. Relying on the standards of fact-based journalism as an aspirational yardstick is the best way to measure the credibility of news and other information.

Misinformation affects everything in our daily lives — from our health care, to our finances, to our personal values. And if we can’t agree on a set of basic facts, then we can’t make well-informed decisions about our lives and our governance.

Pilgrim Sky

A tabletop RPG and fiction setting by Vyr Cossont and millenomi. It’s a fantasy setting with hard sci-fi trappings about humanity breaking into another universe, fallen utopias, and everyday life in the thin sliver of this dead cosmos that was terraformed to sustain the descendants of these ancient interlopers.

It’s a setting where history has consequences, vistas are beautiful, familiar battles rage anew, and a better world is feasible; and where queer pilots can joyride on mechs, curse destiny, birth new gods, and flirt at swordpoint.

It was inspired by a misreading of the cover of Armour Astir by Briar Sovereign, and was developed for use with that game.

Ghost X

The Ghost X was developed with the goal of researching and developing artificial intelligence useful to humans.

The large language model was developed with goals including excellent multilingual support, superior knowledge capabilities and efficiency. The organization aims to develop products with openness to support the community and startups. Focus on small and medium sized models instead of giant ones but still ensure efficiency at low cost. The models are developed with the goal of optimal production and high performance. Easily deploy them yourself on your own computer, server, or anywhere with enterprise-level scalability.

Github: https://github.com/ghost-x-ai/ghost-7b-alpha

Scrap SF

SCRAP is a 501(c)(3) Arts education nonprofit and a creative Reuse center founded in 1976 in San Francisco. SCRAP works at the intersection of the arts, arts education, and the environment. Our mission is to put the materials and methods of art-making in reach for everyone, helping people turn everyday objects into creative projects that fuel the human spirit, support community vibrancy, and reinforce environmental awareness. And we divert over 200 tons of materials heading from landfill each year!

We pride ourselves on providing equal access to creativity. Our depot in the Bayview is a wonderful "Aladdin's Cave" that provides students, teachers, and artists of all walks of life with access to high quality materials at affordable prices. The materials in our depot change every day, but you’ll always find an abundance of classroom and art supplies, a wide variety of artifacts of inspiring textures, colors, and shapes. The Depot is loosely organized by type of material: paper, wood, metal, glass, fabric, leather, images, office supplies, plastic, natural materials, beads & buttons, arts & crafts, toys, and more.

Shopping: Tuesday - Sunday: 10 AM - 6 PM

Material Donations: Tuesday - Saturday: 10 AM - 3 PM

Closed on Mondays

We are located at 2150 Newcomb Street, San Francisco
415-647-1746

darealshinji/haiku-icons

Haiku OS icons, exported to HVIF, SVG and PNG.

Wu-Tang Plaque

"Presidents are temporary; Wu-Tang is forever."

Dangerzone: Convert potentially dangerous documents into safe PDFs

No Network Access: Sandboxes don't have network access, so if a malicious document can compromise one, it can't phone home.
Dangerzone can optionally OCR the safe PDFs it creates, so it will have a text layer again. Compresses the safe PDF to reduce file size. After converting, Dangerzone lets you open the safe PDF in the PDF viewer of your choice, which allows you to open PDFs and office docs in Dangerzone by default so you never accidentally open a dangerous document.

You give it a document that you don't know if you can trust (for example, an email attachment). Inside of a sandbox, Dangerzone converts the document to a PDF (if it isn't already one), and then converts the PDF into raw pixel data: a huge list of of RGB color values for each page. Then, Dangerzone takes this pixel data and converts it back into a PDF.

Github: https://github.com/freedomofpress/dangerzone

Compiler Options Hardening Guide for C and C++

This document is a guide for compiler and linker options that contribute to delivering reliable and secure code using native (or cross) toolchains for C and C++. The objective of compiler options hardening is to produce application binaries (executables) with security mechanisms against potential attacks and/or misbehavior.

Hardened compiler options should also produce applications that integrate well with existing platform security features in modern operating systems (OSs). Effectively configuring the compiler options also has several benefits during development such as enhanced compiler warnings, static analysis, and debug instrumentation.

This document focuses on recommended options for the GNU Compiler Collection (GCC) and Clang/LLVM, and we expect the recommendations to be applicable to other compilers based on GCC and Clang technology. In the future, we aim to expand to guide to also cover other compilers, such as Microsoft MSVC.

dmjio/Assembler.py

Write an Assembler program that translates programs written in the symbolic Hack assembly language into binary code that can execute on the Hack hardware platform built in the previous projects.

To run this program execute the shell script make.sh from the command line. This will generate all the necessary .hack files from .asm files using a python script (Assembler.py)

Once this has been completed open up the Assembler.sh and load up the .asm and corresponding hack files and compare their output.

ilmenit/CC65-Advanced-Optimizations

CC65 is a mature cross-compiler of the C programming language for the 6502 processor. Some people have tried to use it (e.g. here, here, or here) and got discouraged by the quality of the generated code, often not understanding why the code generated was slow and big. This article is aiming to show that with a few changes in the coding style you can achieve both speed and size comparable to assembly language, while still having a majority of the benefits of working in a higher-level language. This article is based on CC65 version 2.18 (April 2020) and we may expect that in the future the compiler will handle more optimizations mentioned here automatically.

Jarvik-7 Artificial Heart (nonfunctional model)

This is a replica of the Jarvik-7 artificial heart, first successfully implanted in a human in 1982.

A Guide to the Registration Data Access Protocol

A definitive guide to implementing, using, and understanding all aspects of RDAP by Andy Newton.

The Registration Data Access Protocol (RDAP) is the successor protocol to the Whois protocol. It was first ratified by the Internet Engineering Task Force (IETF) in March 2015 by their WEIRDS working group, and initial server and client implementations were released shortly thereafter by the many Regional Internet Registries (RIRs) in June 2015.

In the years since RDAP became standardized, extensions have been added and profiles have been specified. While this is a clear sign of the success of the protocol, the amount of information spread across RFCs, IANA registries and other documents makes specification information more difficult to acquire and implementations harder to develop and deploy.

This book is intended to describe RDAP a in way the RFCs do not, and in many cases cannot describe the protocol and its ecosystem through the use of mdbook, the many mdbook plugins, annotated examples, easier to read language and references to other materials.

Github: https://github.com/anewton1998/rdap_guide

RDAP - Registration Data Access Protocol

The Registration Data Access Protocol (RDAP) is the successor to WHOIS. Like WHOIS, RDAP provides access to information about Internet resources (domain names, autonomous system numbers, and IP addresses). Unlike WHOIS, RDAP provides:

  • A machine-readable representation of registration data;
  • Differentiated access;
  • Structured request and response semantics;
  • Internationalisation;
  • Extensibility.

RDAP.org aims to support users and developers of RDAP clients by providing a "bootstrap server", i.e. single end point for RDAP queries. RDAP.org aggregates information about all known RDAP servers. RDAP clients can send RDAP queries to RDAP.org, which will then redirect requests to the appropriate RDAP service.

Pwncat - A reverse shell handler with all of netcat's features

pwncat is a sophisticated bind and reverse shell handler with many features as well as a drop-in replacement or compatible complement to netcat, ncat or socat. Fully scriptable with Python. Self-injecting mode to deploy itself and auto-start multiple unbreakable reverse shells back to you. Reverse shells will reconnect to you if you accidentally kill pwncat or are cut off. Connections over TCP or UDP. Bind shells, reverse shells, port forwarding.

It can wrap your network traffic in any other protocol to obfuscate it or encrypt it.

Written using only with Python core libraries to allow it to run without having to install anything.

In the AUR. Also installable with pip.

Github: https://github.com/cytopia/pwncat

theimpossibleastronaut/modemu2k

modemu2k adds telnet capability to a comm program. It can redirect telnet I/O to a pty so that a comm program can handle the pty as a tty with a real modem, and allows you to use a comm program's scripting and file transfer features over telnet. Now supports IPv6 connections.

It works like file transfer protocols do in minicom (rx/sx, ry/sy, rz/sz).

Or you can use it as a stand-alone CLI client.

sandialabs/wiretap

Wiretap is a transparent, VPN-like proxy server that tunnels traffic via Wireguard and requires no special privileges to run.

Wireguard configs are generated and deployed on all of the servers. Clients can then interact with local network resources as if on the same network as the server, and optionally chain additional servers to reach new networks. Access to the Wiretap network can also be shared with other clients.

A Wiretap Server is any machine where a Wiretap binary is running the serve command. Servers receive and relay network traffic on behalf of Wiretap Clients, acting like a VPN "exit node." A Wiretap Client is any machine running the Wireguard configurations necessary to send and receive network traffic through a Wiretap Server. It functions much like a client in a VPN connection. Clients are also able to reconfigure parts of the Wiretap network dynamically using the Wiretap binary.

Seems to work like Nebula, only without the certificates expiring every year.

IronOS Companion

Fun fact: The Pinecil has Bluetooth support built in. If you have the right version of firmware you can turn it on.

This app presents a much easier to use set of controls for the Pinecil. You can set the temperature, startup behavior, and look at various parameters without getting lost in the tiny little display all the time.

A Guide to Caching with Nginx and Nginx Plus
Stickerapp: Print Custom Stickers and Labels

Make your own custom stickers and labels. Express delivery as fast as 2-4 business days. Get an instant proof and free shipping!

Interestingly, they also make custom PC case badges. Under Stickers:

  • Pick Epoxy 3D Sticker
  • Shape: Rounded Corners
  • Material: Epoxy vinyl
  • Finish: Epoxy
  • Size: 1" x 1"
unum-cloud/usearch

A fast open source source vector search and clustering engine. API bindings for multiple languages. Tries to be simple to use and extensible; if you're using it with C++ you only need to import one header file. Tries to be hardware agnostic; supports half-precision and quarter-precision with 16-bit floats and 8-bit integers, respectively. Can scan very large indices without loading the entire file into memory; implicitly supports serializing indices to disk. Heterogeneous lookups, renaming/relabeling, and on-the-fly deletions. Supports semantic search. Supports exact and approximate search.

niklasf/python-chess

python-chess is a chess library for Python, with move generation, move validation, and support for common formats. If used with ipython or Jupyter, it'll render the board as SVG images so you can see what's going on. Otherwise it'll display an ASCII chess board. Supports multiple variants of chess. Seems fairly smart at detecting situations, like check, repetitions, checkmates, stalemates, and draws by insufficient material.

Designed such that you can interface it with other software, such as chess playing engines, endgame searchers, GUIs, and AI research environments.