googleapis / genai-toolbox
MCP Toolbox for Databases is an open source MCP server for databases.
See what the GitHub community is most excited about today.
MCP Toolbox for Databases is an open source MCP server for databases.
A Commander for modern Go CLI interactions
Declarative Continuous Deployment for Kubernetes
Secure, high-performance AI infrastructure in Python.
Open Source Data Security Platform for Developers to Monitor and Detect PII, Anonymize Production Data and Sync it across environments.
Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.
🔥 1Panel provides an intuitive web interface and MCP Server to manage websites, files, containers, databases, and LLMs on a Linux server.
A toolkit with common assertions and mocks that plays nicely with the standard library
Yet another WebUI for Nginx
KEDA is a Kubernetes-based Event Driven Autoscaling component. It provides event driven scale for any container running in Kubernetes
OpenTelemetry Collector distribution with programmable pipelines
Main repository for Datadog Agent
OSV-SCALIBR: A library for Software Composition Analysis
Get JSON values quickly - JSON parser for Go
Go configuration with fangs
PostgreSQL driver and toolkit for Go
Go implementation of JSON Web Tokens (JWT).
Structured, pluggable logging for Go.
Contrib repository for the OpenTelemetry Collector
ZITADEL - Identity infrastructure, simplified for you.
🔥 Proxy is a high performance HTTP(S) proxies, SOCKS5 proxies,WEBSOCKET, TCP, UDP proxy server implemented by golang. Now, it supports chain-style proxies,nat forwarding in different lan,TCP/UDP port forwarding, SSH forwarding.Proxy是golang实现的高性能http,https,websocket,tcp,socks5代理服务器,支持内网穿透,链式代理,通讯加密,智能HTTP,SOCKS5代理,黑白名单,限速,限流量,限连接数,跨平台,KCP支持,认证API。
Autoscaling components for Kubernetes
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication