☆17Dec 20, 2024Updated last year
Alternatives and similar repositories for libaleominer
Users that are interested in libaleominer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sia GPU miner☆10Jul 20, 2016Updated 9 years ago
- ☆14May 19, 2021Updated 4 years ago
- ☆12Oct 29, 2022Updated 3 years ago
- My Unofficial Specification of the Oracle Database Wire Protocol.☆15May 26, 2022Updated 3 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Apr 24, 2026Updated 2 weeks ago
- KafeDB: End-to-End Structurally-Encrypted Database System. Based on Apache Spark SQL.☆12Nov 11, 2021Updated 4 years ago
- Convert keyboard or mouse events to USB HID reports.☆25Feb 9, 2021Updated 5 years ago
- ☆35Sep 18, 2024Updated last year
- 30天自制操作系统的部分注释☆15Oct 5, 2018Updated 7 years ago
- An Edge Computing based Workflow Execution Engine for Smart Systems☆21Feb 24, 2023Updated 3 years ago
- ☆44Sep 17, 2021Updated 4 years ago
- Tunnels a regular TCP connection through an AWDL link by exploiting the NetService API☆39Aug 6, 2018Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- FreeWTP -- An Open Source CAPWAP WTP☆31May 30, 2017Updated 8 years ago
- An open source FPGA miner for Blakecoin☆52Sep 22, 2014Updated 11 years ago
- ☆31Nov 10, 2022Updated 3 years ago
- kata 安全容器相关笔记,原理实战,开发进阶☆33Feb 25, 2024Updated 2 years ago
- ARL OpenSHMEM for Epiphany☆31Sep 13, 2019Updated 6 years ago
- Repo of sample implementations leveraging Azure Confidential Computing for container deployments☆34Jul 21, 2023Updated 2 years ago
- A high-performance hardware acceleration algorithm library of OpenSSL engine based on Kunpeng processor☆44Oct 12, 2025Updated 6 months ago
- ☆34Aug 3, 2015Updated 10 years ago
- ☆44Jul 8, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- nwEPC is a free and open source framework software implementation of SAE/EPC Serving Gateway or SGW and Packet Data Network Gateway or PG…☆40Sep 25, 2012Updated 13 years ago
- pcie-bench code for NetFPGA/VCU709 cards☆45Jul 27, 2018Updated 7 years ago
- A go implementation of Verkle trees☆237Jan 2, 2026Updated 4 months ago
- CUDA kernel author's tools☆117Apr 24, 2022Updated 4 years ago
- RAPL power capping C interface with multiple implementations☆53Apr 25, 2025Updated last year
- Apache Teaclave (incubating) Java TEE SDK is an open source universal confidential computing framework, making java computation on privac…☆63Apr 18, 2026Updated 3 weeks ago
- openhitls☆91Apr 30, 2026Updated last week
- ☆65Jun 30, 2023Updated 2 years ago
- Blog and pages generated by Jekyll. Hosted on GitHub.☆58Nov 10, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An alternative implementation of the Bitcoin Cash protocol, written in Golang☆84May 19, 2019Updated 6 years ago
- ☆76Jun 14, 2018Updated 7 years ago
- Confidential Containers Guest Tools and Components☆121Updated this week
- Ensō is a high-performance streaming interface for NIC-application communication.☆80Apr 11, 2026Updated 3 weeks ago
- ☆89Jan 9, 2026Updated 4 months ago
- Tools and runtime for launching unmodified container images in Trusted Execution Environments☆152Jul 31, 2025Updated 9 months ago
- EdgelessDB is a MySQL-compatible database for confidential computing. It runs entirely inside a secure enclave and comes with advanced fe…☆167Mar 12, 2023Updated 3 years ago