Hacking on sched_ext

an invention by flonnegren

Description

Updated 7 months ago. 1 hackers ♥️. 1 follower.

Customizable control panel for Home Assistant

an invention by jbaier_cz

Description

Updated 7 months ago. No love. 3 followers.

YQPkg - Bringing the Single Package Selection Back to Life

a project by shundhammer

tl;dr

Updated 6 months ago. 3 hacker ♥️. 1 follower.

A way a for Longhorn UI automation

a project by cchien

Description

During each release cycle, Longhorn QA needs to run a UI sanity check. We should explore ways to automate the Longhorn UI testing process.

Updated 8 months ago. No love. 1 follower.

Learning Game Development with Unity

a project by tmuntan1

Description

Updated 8 months ago. 2 hacker ♥️. 1 follower.

Improve libzypp

a project by jtorres

Description

Try to make libzypp a bit more flexible when you try to use it but there's already something using it and you get a message like:

Updated 8 months ago. No love. 1 follower.

Contribute to terraform-provider-libvirt

a project by pinvernizzi

Description

Updated 8 months ago. 1 hackers ♥️. 1 follower.

Learn about OSB and contribute to `kustomize` and `k9s` packages to add ARM arch

a project by dpock

Description

There are already k9s and kustomize packages that exist for openSUSE today. These could be used as the source for these binaries in our rancher projects. By using them we would benefit from CVE fixes included in our distribution of the packages not in cluded upstream. However they are not providing arm package builds which are required.

Updated 8 months ago. 1 hackers ♥️. 1 follower.

Mammuthus - The NFS-Ganesha inside Kubernetes controller

an invention by vcheng

Description

As the user-space NFS provider, the NFS-Ganesha is wieldy use with serval projects. e.g. Longhorn/Rook.

Updated 7 months ago. 2 hacker ♥️. 3 followers.

VulnHeap

an invention by r1chard-lyu

Description

The VulnHeap project is dedicated to the in-depth analysis and exploitation of vulnerabilities within heap memory management. It focuses on understanding the intricate workflow of heap allocation, chunk structures, and bin management, which are essential to identifying and mitigating security risks.

Updated 7 months ago. 2 hacker ♥️. 1 follower.