geohot / solidityLinks
☆62Updated 5 years ago
Alternatives and similar repositories for solidity
Users that are interested in solidity are comparing it to the libraries listed below
Sorting:
- A distributed decentralized chess tournament☆96Updated 2 years ago
- ☆69Updated 5 years ago
- A simple Ethereum mining pool☆92Updated 4 years ago
- Bridge between L1 (Ethereum) and L2 (cheapETH)☆118Updated 4 years ago
- Computing digits of pi for the people☆69Updated 4 years ago
- mergesort in many languages☆264Updated 2 years ago
- Tic Tac Toe in React because it is Simple Skills Sunday☆97Updated 2 years ago
- Official Go implementation of the Ethereum protocol☆95Updated 4 years ago
- ☆69Updated 4 years ago
- Optimism Deployment on the cheapETH network☆22Updated 4 years ago
- compression = AI☆55Updated 3 years ago
- You like pytorch? You like micrograd? You love tinygrad! ❤️☆49Updated 5 years ago
- Digital version of the asymptote puzzle by perplexingpuzzles.com.au☆31Updated 4 years ago
- ☆34Updated 7 years ago
- Some ipython notebooks implementing AI algorithms☆1,396Updated 8 months ago
- Open-source simulator for autonomous driving research.☆21Updated 5 years ago
- The comma.ai Calibration Challenge!☆978Updated last year
- Exploration of x86-64 ISA using speculative execution.☆315Updated 2 weeks ago
- Best way to learn x86 is by hacking it☆28Updated 7 years ago
- On chain interactive fault prover for Ethereum☆588Updated 2 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Let's get it☆89Updated 3 years ago
- ☆368Updated 2 years ago
- ☆452Updated 9 months ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Papers relating to decentralized applications.☆15Updated 8 years ago
- Hypervisor Memory Introspection Core Library☆675Updated this week
- Markdown version of Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine☆179Updated 3 years ago
- A crawling framework for blockchains and peer-to-peer systems☆46Updated 2 years ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆411Updated 4 years ago