• Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Pixeval

    Pixeval

    Wow. Yet another Pixiv client!

    ...The project was conceived in 2018. At that time, the api of the P station was written in Java. At that time, it could also be accessed by modifying the hosts method. After that, GFW The blocking strategy was upgraded, and DNS pollution was upgraded to SNI blocking, so I went to find information to understand the different blocking levels and blocking mechanisms of GFW. I started writing this project in the second half of 2019, which took about 3 months. (Actually, the realization of this project is partly inspired by Notsfsssf.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    ...Shadowsoks' encryption protocol design makes the transmitted data package itself have almost no characteristics, and it looks similar to a completely random bitflow, which can indeed effectively bypass GFW in the early days. Contrary to Shadowsoks, Trojan does not use self-defined encryption protocols to hide itself. On the contrary, the clearly characterized TLS protocol (TLS/SSL) is used to make the flow look the same as the normal HTTPS website. TLS is a mature encryption system, and HTTPS uses TLS to carry HTTP traffic. For passive testing, the flow of the Trojan agreement is completely consistent with the characteristics and behavior of the HTTPS flow. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Basic framework for creating networkable games.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB