Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Stars
A flexible distributed key-value database that is optimized for caching and other realtime workloads.
Open-source AI agents for penetration testing
A privacy-first, open-source platform for knowledge management and collaboration. Download link: http://github.com/logseq/logseq/releases. roadmap: https://discuss.logseq.com/t/logseq-product-roadmβ¦
A list of Free Software network services and web applications which can be hosted on your own servers
The official Java SDK for Model Context Protocol servers and clients. Maintained in collaboration with Spring AI
The official Python SDK for Model Context Protocol servers and clients
Unified Efficient Fine-Tuning of 100+ LLMs & VLMs (ACL 2024)
Custom Kubernetes controller that can be used to replicate secrets, configmaps and certificates.
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
No fortress, purely open ground. OpenManus is Coming.
An invisible desktop application to help you pass your technical interviews.
OpenHealth, AI Health Assistant | Powered by Your Data
πͺ Create rich visualizations with AI
21 Lessons, Get Started Building with Generative AI
Various Telco AI Usecases & Experiments
Simple, unified interface to multiple Generative AI providers
Run your own AI cluster at home with everyday devices π±π» π₯οΈβ
Command-line client for WebSockets, like netcat (or curl) for ws:// with advanced socat-like functions
Transformer Explained Visually: Learn How LLM Transformer Models Work with Interactive Visualization
Get up and running with OpenAI gpt-oss, DeepSeek-R1, Gemma 3 and other models.
Connect your local process and your cloud environment, and run local code in cloud conditions.
π PR-Agent: An AI-Powered π€ Tool for Automated Pull Request Analysis, Feedback, Suggestions and More! π»π
Secure environments for developers and their agents
A Java architecture test library, to specify and assert architecture rules in plain Java
eBPF-based Networking, Security, and Observability