- Paris, France
-
02:20
(UTC +02:00) - https://www.marvinroger.fr
Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Stars
- All languages
- Arduino
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Crystal
- D
- Dart
- Dockerfile
- Elixir
- Erlang
- F#
- Go
- Groovy
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LiveScript
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Mustache
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Perl
- Python
- QML
- ReScript
- Reason
- Red
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Swift
- TeX
- TypeScript
- V
- Vue
- WebAssembly
- Wren
- Zig
A curated list of awesome Go frameworks, libraries and software
The worldβs fastest framework for building websites.
Open Source Continuous File Synchronization
Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
The Prometheus monitoring system and time series database.
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
A platform for building proxies to bypass network restrictions.
Easily and securely send things from one computer to another π π¦
A modern load testing tool, using Go and JavaScript - https://k6.io
CasaOS - A simple, easy-to-use, elegant open-source Personal Cloud system.
Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge.
A command-line tool that makes git easier to use with GitHub.
The Single Sign-On Multi-Factor portal for web apps
The high-performance database for modern applications
Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Turn any program that uses STDIN/STDOUT into a WebSocket server. Like inetd, but for WebSockets.
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Find, verify, and analyze leaked credentials
Easy and fast file sharing from the command-line.