Compilation of resources and insights that helped me on my journey to data scientist

Overview

Data Science Career Resources

Compilation of resources and insights that helped me on my journey to data scientist. Reposted for readability:

The Big List of Data Science Interview Resources

Introduction

Data science can seem like an intimidating field to get into. I know this first hand. Throughout my journey, I've learned a lot. I've also documented a lot. Through this process, I’ve accumulated a bunch of useful resources that helped me with learning new concepts, doing impactful work, interviewing at top tech companies, and more. This repo is an attempt to ‘open-source’ my experience and insights becoming a data scientist. Enjoy! For more on me and what I'm up to, you can head over to my website.

Data Science Interview Resources

With this by your side, you should have more than enough material at your disposal the next time you’re prepping for a big interview or suring up fundamental concepts. Being updated and improved on constantly.

Data Science and Software Engineering Intern Roles

This list is a compilation of over 200+ undergraduate intern roles from Summer 2018 that were explicitly centered around data science and software engineering. You can use this as a jumping off point for your next job search.

Compilation of Advice for New and Aspiring Data Scientists

This post was designed to make it a little easier for aspiring data scientists to find all of the excellent advice out there from experts in the field. The majority of the ideas are condensed from 6 posts that I found especially helpful.

5 Lessons from a Data Science Intern at a Tech Unicorn

A reflection of lessons and advice from my time at a Data Science Intern working at Unity Technologies in San Francisco, CA. My goal is to share a handful of actionable lessons, takeaways, thoughts, and advice from the memorable experience.

5 Resources to Inspire Your Next Data Science Project

Have you ever wanted to start a new project but you can’t decide what to do? First, you spend a couple hours brainstorming ideas. Then days. Before you know it, weeks have gone by without shipping anything new. In this post, my intention is provide some useful resources to springboard you into your next data science project.

The Hitchhiker's Guide to Machine Learning in Python

Learn how to implement 8 fundamental machine learning algorithms in Python over the course of 8 minutes or less by leveraging the power of scikit-learn and Python for data science.

Python for Data Science: 8 Concepts You May Have Forgotten

If you’ve ever found yourself looking up the same question, concept, or syntax over and over again when programming, you’re not alone. Here’s the stuff that I’m always forgetting when working with Python, NumPy, and Pandas.

13 Essential Newsletters for Data Scientists

Think of your newsletter subscriptions as an elite force of smart, specialized people working to bring you the latest and most valuable information well worth your time. Data science moves fast, you should too.

An Ode to the Type A Data Scientist

Data science isn't entirely about machine learning. Here I make the argument for the value provided by skills and actions associated with the often overlooked and under-appreciated, Type A Data Scientist.

When Your Job Is Done as a Data Scientist

As Data Scientists, there is very little that is black and white. We do our work in a world of grey. We need to do a better job of consistently reminding ourselves that our primary focus should be to drive impact.

The Edge You Need at Your Next Interview

This post is designed to help you achieve an edge in data science interviews by laying out a multi-step system to product knowledge and ideation that I’ve used with a lot of success.

Owner
Conor Dewey
Product at Metabase. Previously growth at Hugo and data science at Squarespace.
Conor Dewey
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)

ExProlog ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065) Usage: exprolog.py [OPTIONS] ExProlog -

Herwono W. Wijaya 130 Dec 15, 2022
Obfuscate your Python scripts better, faster.

⚜️ Berserker ⚜️ An unique Python3 obfuscator using Kyrie Eleison's encryption protocol, written in Python3. 📋 Examples 📋 Unobfuscated: input("Hello

Billy 81 Dec 07, 2022
Chapter 1 of the AWS Cookbook

Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide

AWS Cookbook 30 Nov 27, 2022
Separation of Mainlobes and Sidelobes in the Ultrasound Image Based on the Spatial Covariance (MIST) and Aperture-Domain Spectrum of Received Signals

Separation of Mainlobes and Sidelobes in the Ultrasound Image Based on the Spatial Covariance (MIST) and Aperture-Domain Spectrum of Received Signals

Rehman Ali 3 Jan 03, 2023
Open Source Tool - Cybersecurity Graph Database in Neo4j

GraphKer Open Source Tool - Cybersecurity Graph Database in Neo4j |G|r|a|p|h|K|e|r| { open source tool for a cybersecurity graph database in neo4j } W

Adamantios - Marios Berzovitis 27 Dec 06, 2022
A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.

A simple python script to dump remote files through a local file read or local file inclusion web vulnerability. Features Dump a single file w

Podalirius 48 Dec 03, 2022
IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidra’s function patterns format.

IDA Pattern Search by Argus Cyber Security Ltd. The IDA Pattern Search plugin adds a capability of finding functions according to bit-patterns into th

David Lazar 48 Dec 29, 2022
Local File Inclusion Scanner and Exploiter

LFI-Paradise Local File Inclusion Scanner and Exploiter Features 1- Scanner 2- E

11 Sep 04, 2022
The disassembler parses evm bytecode from the command line or from a file.

EVM Bytecode Disassembler The disassembler parses evm bytecode from the command line or from a file. It does not matter whether the bytecode is prefix

alpharush 22 Dec 27, 2022
A honeypot for the Log4Shell vulnerability (CVE-2021-44228)

Log4Pot A honeypot for the Log4Shell vulnerability (CVE-2021-44228). License: GPLv3.0 Features Listen on various ports for Log4Shell exploitation. Det

Thomas Patzke 79 Dec 27, 2022
Use FOFA automatic vulnerability scanning tool

AutoSRC Use FOFA automatic vulnerability scanning tool Usage python3 autosrc.py -e FOFA EMAIL -k TOKEN Screenshots License MIT Dev 6613GitHub6613

PwnWiki 48 Oct 25, 2022
Automatically fetch, measure, and merge subscription links on the network, use Github Action

Free Node Merge Introduction Modified from alanbobs999/TopFreeProxies It measures the speed of free nodes on the network and import the stable and hig

52 Jul 16, 2022
client attack remotely , this script was written for educational purposes only

client attack remotely , this script was written for educational purposes only, do not use against to any victim, which you do not have permission for it

9 Jun 05, 2022
Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures

Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.

Stamus Networks 39 Nov 28, 2022
CVE-2021-22986 & F5 BIG-IP RCE

Vuln Impact This vulnerability allows for unauthenticated attackers with network access to the iControl REST interface, through the BIG-IP management

Al1ex 85 Dec 02, 2022
PassLock is a medium-security password manager that encrypts passwords using Advanced Encryption Standards (AES)

A medium security python password manager that encrypt passwords using Advanced Encryption Standard (AES) PassLock is a password manager and password

Akshay Vs 44 Nov 18, 2022
logmap: Log4j2 jndi injection fuzz tool

logmap - Log4j2 jndi injection fuzz tool Used for fuzzing to test whether there are log4j2 jndi injection vulnerabilities in header/body/path Use http

之乎者也 67 Oct 25, 2022
Salesforce Recon and Exploitation Toolkit

Salesforce Recon and Exploitation Toolkit Salesforce Recon and Exploitation Toolkit Usage python3 main.py URL References Announcement Blog - https:/

81 Dec 23, 2022
LdapRelayScan - Check for LDAP protections regarding the relay of NTLM authentication

LDAP Relay Scan A tool to check Domain Controllers for LDAP server protections r

315 Dec 18, 2022
Simple yara rule manager

Yara Manager A simple program to manage your yara ruleset in a (sqlite) database. Todos Search rules and descriptions Cluster rules in rulesets Enforc

Nils Kuhnert 65 Nov 17, 2022