Awesome List Updates on May 22, 2026
12 awesome lists updated today.
🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor
1. Awesome Rust
Applications
- mmalmi/nostr-vpn (⭐581) [nvpn] - Tailscale-style private mesh VPN built on Nostr identities and a FIPS-backed data plane. Features native cross-platform apps (macOS, Linux, Windows, Mobile) and a CLI/daemon.
2. Awesome Lowcode
Educational
- TutorialSearch - Free cross-platform search engine indexing 50,000+ tutorials from Udemy, Skillshare, Pluralsight, and other major learning platforms across 45+ categories.
Misc
- ShopSavvy - Product data API with real-time pricing from thousands of retailers and price history.
3. Awesome Cli Apps
Development / Chat
- dotenv-diff (⭐49) - Validate environment variable usage in a codebase.
4. Awesome Datascience
Tutorials
- TutorialSearch - Free cross-platform search engine indexing 50,000+ tutorials from Udemy, Skillshare, Pluralsight, and other major learning platforms across 45+ categories.
5. Awesome Windows
Command Line Tools
- Fastfetch (⭐23k) - A maintained, feature-rich and performance oriented, neofetch like system information tool.
- winfetch (⭐1.8k) - Command-line system information utility written in PowerShell.
6. Awesome Osint
Email Search / Email Check / GitHub
- MailAccess (⭐30) - Free email OSINT tool, checks 800+ platforms, breach exposure via HIBP, infostealer logs via Hudson Rock, and builds a cross-platform identity graph with confidence scoring.
pip install mailaccess
Academic Resources and Grey Literature / GitHub
7. Awesome Fuzzing
Tools / API
- WuppieFuzz (⭐200) - A coverage-guided REST API fuzzer developed on top of LibAFL.
8. Awesome Cpp
Database
- Zvec (⭐9.7k) - A lightweight, lightning-fast, in-process vector database. [Apache2] website
9. Awesome Go
DevOps Tools / Libraries for creating HTTP middlewares
- Updatecli (⭐913) - A universal declarative update policy engine.
10. Awesome Bitcoin
Additional Resources
- BitcoinCompanies - Corporate Bitcoin treasury map and leaderboard with claimed vs verified holdings.
11. Awesome Billing
Pricing
- The Network Monetization Map: Aligning Incentives with Revenue - 6 models of monetization relying on network effect.
- The 5 Pillars of PriceOps - A manifesto inspired by the DevOps movement in which pricing is no longer ossified, but is practiced as a responsive iteration process, and implemented as a flexible property of the system.
Pricing / Usage-based Pricing
- Credyt - Real-time monetization infrastructure for AI products: meter usage, charge from prepaid balances, and ship a branded customer portal without writing frontend. Commercial SaaS.
- Reconcile Your Monthly GCP Invoice with BigQuery Billing Export - Behind the quest of this developer to track its expenses, you get a glimpse on cloud billing difficulties. While not explicitly pointed out, pricing cloud resources is hard and the result of quantization, granularity and rounding, between space, time and currencies.
- Electropedia: Tariffs for electricity - Before the cloud, there was another metered resource priced by its usage: electricity. Here is a detailed (and multi-lingual) taxonomy of its vocabulary from the International Electrotechnical Commission.
Pricing / Market Research
- Finding the max revenue price mark for digital products - “To find the optimal price that provides maximum revenue for your product you will need to field-test several price points; you then reconstruct the revenue curve and find the peak.”
Accounting / Double-Entry Model
- The Double-Entry Counting Method - Same premise as above, but way more detailed and complete, as it adds reporting and implementation details.
Contracts / Currencies
- CUDs vs. Commit Contracts vs. SUDs in Google Cloud - Explains the differences between various types of discounts and usage commitments in GCP.
Taxes / European VAT
- How to correctly setup SaaS subscriptions to charge VAT in Europe - “If you think you can just setup a simple Stripe integration and move on, like us, you'd be sadly mistaken.”
Invoice / Structure
- Content of EU invoices - The information required on a EU invoice is detailed by Article 226, Section 4 (Content of invoices) of Council Directive 2006/112/EC on the common system of VAT.
Invoice / Integrity
- Digital signatures: how Sleek leverages Cloud HSM to guarantee the integrity of legal documents - Here is a great way to rely on GCP's HSM to digitally sign documents and provide an immutable audit-trail. Might be applied to invoices as well as contract agreements.
Payments / Electronic invoices
- Avoiding Double Payments in a Distributed Payments System - RDBMS were build for banks around transactions to solve that specific issue. Then NoSQL came forcing us to carefully implement systems to avoid double spending.
Fraud / Cards
- Credit Card Fraud Detection using Autoencoders in Keras - Tutorial on how to rely on anomaly detection to implement suspicious card transactions.
UX/UI / Billing
- Apple In-app purchase Human Interface Guidelines - Guide and recommendation on how to make auto-renewable subscriptions user-friendly.
Business Intelligence / Metrics
- 16 Startup Metrics - The 2 critical metrics being Customer Acquisition Cost (CAC) and Customer Lifetime Value (CLV).
Business Intelligence / Customer Lifetime Value
- You're all calculating churn rates wrong - “On the surface, churn rate may seem like a natural proxy for changes in customer lifetimes. Let's dig into why that is not true.” Churn rate is not a meaningful metric to compute CLV: during the customer lifetime, the churn probability is not constant. Most of the time because of your free trial and vouchers. This article illustrate the influence of the distribution used to model the probability of a customer quitting.
12. Awesome Iam
Cryptography
- Real World Crypto Symposium - Aims to bring together cryptography researchers with developers, focusing on uses in real-world environments such as the Internet, the cloud, and embedded devices.
Zero-trust Network / Identifiers
- What is BeyondCorp? What is Identity-Aware Proxy? - More companies add extra layers of VPNs, firewalls, restrictions and constraints, resulting in a terrible experience and a slight security gain. There's a better way.
Password-less auth / Security key
- Getting started with security keys - A practical guide to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys.
Password-less auth / JWT
- JWT, JWS and JWE for Not So Dummies! - A signed JWT is known as a JWS (JSON Web Signature). In fact a JWT does not exist itself — either it has to be a JWS or a JWE (JSON Web Encryption). Its like an abstract class — the JWS and JWE are the concrete implementations.
Authorization / Policy models
- GCP's IAM syntax is better than AWS's - The minutiae of permission design in GCP improves the developer's experience.
Authorization / ReBAC frameworks
- Zanzibar: Google's Consistent, Global Authorization System - Scales to trillions of access control lists and millions of authorization requests per second to support services used by billions of people. It has maintained 95th-percentile latency of less than 10 milliseconds and availability of greater than 99.999% over 3 years of production use. Other bits not in the paper. Zanzibar Academy is a site dedicated to explaining how Zanzibar works.
Authorization / Macaroons
- Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud - Google's original paper.
OAuth2 & OpenID / Other tools
- Descope - Drag and drop your auth. Add authentication, user management, and authorization to your app with a few lines of code.
Secret Management / Hardware Security Module (HSM)
- HSM: What they are and why it's likely that you've (indirectly) used one today - Really basic overview of HSM usages.
Competitive Analysis / GDPR
- 163 AWS services explained in one line each - Help makes sense of their huge service catalog. In the same spirit: AWS In Plain English.
- Next: May 21, 2026