Stars
Manages Envoy Proxy as a Standalone or Kubernetes-based Application Gateway
Cloud-native high-performance edge/middle/service proxy
AKShare is an elegant and simple financial data interface library for Python, built for human beings! 开源财经数据接口库
A cli tool to help discover deprecated apiVersions in Kubernetes
Qwen3-Coder is the code version of Qwen3, the large language model series developed by Qwen team, Alibaba Cloud.
[Support 0.49.x](Reset Cursor AI MachineID & Bypass Higher Token Limit) Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machi…
《动手学深度学习》:面向中文读者、能运行、可讨论。中英文版被70多个国家的500多所大学用于教学。
Python for《Deep Learning》,该书为《深度学习》(花书) 数学推导、原理剖析与源码级别代码实现
RAGFlow is a leading open-source Retrieval-Augmented Generation (RAG) engine that fuses cutting-edge RAG with Agent capabilities to create a superior context layer for LLMs
整理开源的中文大语言模型,以规模较小、可私有化部署、训练成本较低的模型为主,包括底座模型,垂直领域微调及应用,数据集与教程等。
A Flexible Framework for Experiencing Cutting-edge LLM Inference Optimizations
Production-ready platform for agentic workflow development.
The all-in-one Desktop & Docker AI application with built-in RAG, AI agents, No-code agent builder, MCP compatibility, and more.
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
🧰 记录每一个与运维相关的优秀项目,⚗️ 项目内表格通过 GitHub Action 自动生成,📥 当前收录项目 651 个。
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Email recon made fast and easy, with a framework to build on
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
The Browser Exploitation Framework Project
A PowerShell based utility for the creation of malicious Office macro documents.
PowerSploit - A PowerShell Post-Exploitation Framework
Impacket is a collection of Python classes for working with network protocols.
A swiss army knife for pentesting networks