Lists (5)
Sort Name ascending (A-Z)
Stars
aider is AI pair programming in your terminal
Autonomous coding agent right in your IDE, capable of creating/editing files, executing commands, using the browser, and more with your permission every step of the way.
Curated list of project-based tutorials
Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 3, and other large language models.
The AI framework that adds the engineering to prompt engineering (Python/TS/Ruby/Java/C#/Rust/Go compatible)
The official Typescript SDK for Model Context Protocol servers and clients
Model Context Protocol Servers
The specification of the Model Context Protocol
Master programming by recreating your favorite technologies from scratch.
Magical Rust patterns laid out and simplified
The AWS Amplify CLI is a toolchain for simplifying serverless web and mobile development. This plugin provides functionality for the API category, allowing for the creation and management of Graph…
Home to all tools related to Amplify's code-first DX (Gen 2) for building fullstack apps on AWS
jsii allows code in any language to naturally interact with JavaScript classes. It is the technology that enables the AWS Cloud Development Kit to deliver polyglot libraries from a single codebase!
Swift benchmark runner with many performance metrics and great CI support
⌨️ The missing keyboard shortcut utility for macOS
yeetd is a lil' daemon that watches for specific CPU-intensive Simulator processes and stops them in their tracks!
This is a module for the AWS SDK for C. It handles all IO and TLS work for application protocols.
A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions
📖 A collection of pure bash alternatives to external processes.
Publish your roadmap inside your app and allow users to vote for upcoming features
iOS Objective-C headers as derived from runtime introspection
This repository offers a UI component for Amazon Rekognition Face Liveness, enabling developers to ensure that only authentic users, and not bad actors using spoofs, can access their services.