Lists (8)
Sort Name ascending (A-Z)
- All languages
- Assembly
- Astro
- AutoHotkey
- AutoIt
- Batchfile
- Bicep
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- Crystal
- Cython
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- Erlang
- Fortran
- FreeMarker
- GDScript
- Go
- HCL
- HTML
- JSON
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MATLAB
- MDX
- MQL5
- Makefile
- Markdown
- Nim
- OCaml
- PHP
- PLpgSQL
- Pascal
- Perl
- PowerShell
- Pug
- Python
- R
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Svelte
- Swift
- TeX
- TypeScript
- VBScript
- Verilog
- Vim Script
- Vue
- YARA
- Zig
Starred repositories
Demonstrate all the questions on LeetCode in the form of animation.(用动画的形式呈现解LeetCode题目的思路)
Free and Open Source, Distributed, RESTful Search Engine
Ghidra is a software reverse engineering (SRE) framework
A browser automation framework and ecosystem.
Open Source Identity and Access Management For Modern Applications and Services
Desktop/Android/HTML5/iOS Java game development framework
The official home of the Presto distributed SQL query engine for big data
Logstash - transport and process your logs, events, or other data
Generate diagrams from textual description
🔎 Open source distributed and RESTful search engine.
Spinnaker is an open source, multi-cloud continuous delivery platform for releasing software changes with high velocity and confidence.
Web-based notebook that enables data-driven, interactive data analytics and collaborative documents with SQL, Scala and more.
Idiomatic persistence for Java and relational databases
Upserts, Deletes And Incremental Processing on Big Data.
The WebRTC module for React Native
A Java architecture test library, to specify and assert architecture rules in plain Java
Heritrix is the Internet Archive's open-source, extensible, web-scale, archival-quality web crawler project.
Supplementary resources for the AWS Lambda Developer Guide
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network i…