10 Repositories
JavaScript scheme Libraries
Hydra-S1 ZK Proving scheme circuits, used for ZK Attesters in Sismo
Hydra-S1 ZKPS Hydra-S1 Zero-Knowledge Proving Scheme Made by Sismo Hydra-S1 is a Zero-Knowledge Proving Scheme used by Hydra S1 attesters of the Sismo
Color palette generation function using hue cycling and simple easing functions.
Rampensau 🐷 Color palette generation function using hue cycling and easing functions. Check out a simple demo or see it in action over on farbvelo 10
🪝 React hook for subscribing to user's color scheme preference.
use-prefers-color-scheme React hook for subscribing to user's color scheme preference. 🚀 Getting Started 🐇 Jump Start npm install @anatoliygatt/use-
🌓 Add dark mode/night mode custom elements to your website.
dark-mode A custom element that allows you to easily put a Dark Mode 🌒 toggle. so you can initially adhere to your users' preferences according to pr
An implementation of (Untyped) Lambda Calculus in JavaScript.
Lambda Calculus More restraint and more pure, so functional and so reduced. -- Anonymous Bauhaus Student An implementation of (Untyped) Lambda Calculu
Tints and shades generator in React.
Reactry's shades goals add option to enter hexColor by hand add option to get hexColor from clipboard add option to set one of the shades or tints as
JCS (JSON Canonicalization Scheme), JSON digests, and JSON Merkle hashes
JSON Hash This package contains the following JSON utilties for Deno: digest.ts provides cryptographic hash digests of JSON trees. It guarantee that d
Predefined color schemes for Chart.js
chartjs-plugin-colorschemes Predefined color schemes for Chart.js You can pick the perfect color combination for your charts from the predefined color
a blue-ish gray with a purple accent color palette for Visual Studio Code.
Installation via VSCode Open Extensions sidebar panel in VS Code. View → Extensions Search for nightfall Click Install to install it Click Reload to r
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing