Lists (8)
Sort Name ascending (A-Z)
- All languages
- ApacheConf
- Assembly
- Blade
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Crystal
- Cython
- Dockerfile
- Elixir
- Elm
- Emacs Lisp
- Erlang
- F#
- Go
- HCL
- HTML
- Haskell
- J
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Mustache
- Nix
- OCaml
- Objective-C
- PHP
- Perl
- PowerShell
- Python
- QML
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Svelte
- Swift
- TeX
- TypeScript
- TypeSpec
- Vim Script
- Visual Basic
- WebAssembly
- ZIL
- reStructuredText
Starred repositories
Tools to support converting a Python project into a standalone native application.
Home of CodeT5: Open Code LLMs for Code Understanding and Generation
MiniMax-M1, the world's first open-weight, large-scale hybrid-attention reasoning model.
Desktop tool for managing virtual machines via libvirt
Golem is creating a global market for computing power.
Auto-detect the connected display hardware and load the appropriate X11 setup using xrandr
cve-search - a tool to perform local searches for known vulnerabilities
Pronterface, Pronsole, and Printcore - Pure Python 3d printing host software
A TensorFlow implementation of the Differentiable Neural Computer.
The code used to train and run inference with the ColVision models, e.g. ColPali, ColQwen2, and ColSmol.
Scripts for packaging virtio-win drivers
asyncio (PEP 3156) Redis support
AI code-writing assistant that understands data content
Personalized, user-focused recommendations for employee information security.
Python CLI utility and library for manipulating SQLite databases
Safety checks Python dependencies for known security vulnerabilities and suggests the proper remediations for vulnerabilities detected.
Extended pickling support for Python objects
Prompts, workflows and more for agentic engineering
OAuthlib support for Python-Requests!
pytest plugin for distributed testing and loop-on-failures testing modes.
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…