da-x / deltaimage
a tool to generate and apply binary deltas between Docker images to optimize registry storage
☆19Updated last year
Alternatives and similar repositories for deltaimage:
Users that are interested in deltaimage are comparing it to the libraries listed below
- Identify and automatically fix issues in shell scripts☆14Updated last year
- A proxy that allows you to host ollama images in your local environment☆23Updated 6 months ago
- Utility commands for Maestro operating system☆12Updated 6 months ago
- Android has APKs, Docker has OCIs - Edge now has Edge Containers☆12Updated 11 months ago
- A fast TUI application (with optional webui) to visually navigate and inspect JSON and JSONL data. Easily localize parse errors in large …☆13Updated 4 months ago
- A more advanced utility to generate a large collection of unique images along with metadata.☆5Updated last year
- Fragmented Classless Inter-Domain Routing (FCIDR)☆16Updated last year
- Access llamafile localhost models via LLM☆15Updated 9 months ago
- ☆11Updated this week
- A caddy module for IP geofencing your caddy web server using ipbase.com☆18Updated 6 months ago
- Environment Variables Encryption Tool☆11Updated 4 months ago
- Various tools, images, etc. to support the Wolfi OSS project☆20Updated this week
- Define and implement any functions on the fly with LLMs☆11Updated 8 months ago
- convert natural language into technical diagrams☆12Updated last month
- A collection of tools that can be used for LLM function calling☆32Updated 10 months ago
- Datasette plugin for authenticating access using API tokens☆11Updated 4 months ago
- ☆13Updated 3 months ago
- Example dev environments built with Devbox☆26Updated last year
- 🛠 Self-hosted, fast, and consistent remote configuration for apps.☆14Updated 2 years ago
- ☆13Updated 4 months ago
- My public wallpapers for consumption by downstream projects☆13Updated 10 months ago
- Search a JSON path and get the value fast☆21Updated this week
- Nomad task driver capable of blocking unwanted syscall and filesystem access. Based on the pledge utility for Linux by Justine Tunney☆22Updated 9 months ago
- n8n workflows used for testing nodes☆17Updated this week
- A secure and easy-to-use tool for managing sensitive data with built-in encryption, decryption, and key management. Protect your secrets …☆18Updated last month
- Execute any command, cache its output and get cached output on subsequent execution☆17Updated 10 months ago
- Guest Users Module for Linux☆14Updated 2 weeks ago
- Image builder image definition library☆24Updated this week
- rsync, scp, sftp, and sshfs for your object store☆17Updated 2 weeks ago