InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now. Learn more →
Top 23 Hackage Open-Source Projects
-
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
-
-
-
-
-
It's a thirty year-old language, it's bound to have cruft. However modern codebases tend to showcase a pretty efficient combination of language features, oftentimes optimised for productivity rather than research in lazy FP. Such codebases are https://github.com/flora-pm/flora-server or https://github.com/change-metrics/monocle
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
-
-
-
-
-
-
-
-
-
-
Software engineers should be made aware of such pitfalls, but I don't think a whole course is necessary or useful. It's very easy to build encryption that you can't crack, especially because the "types of attacks" is a truly endless font.
It's probably more useful to have a module within a course to discuss the current state of the art and learning some history about how the methods were chosen (e.g. NIST's AES, SHA2/3, and PQC open processes. I think making it very obvious that there are extremely good, quality, free tools out there would reduce the likelihood of someone DIYing some crap.
That said, I once spec'd using Ed25519 asymmetric signatures for webhooks sent out to customers, and later on one of our Elixir developers was complaining that the throughput was garbage. I was confused because https://ed25519.cr.yp.to/ boasts signing rates of ~27k/sec/core on very old hardware. Turns out they were using some "pure Elixir" library which had shit (over 1000x worse) performance. There wasn't any real surface area for attacks here, but there are plenty of devs who will blindly search package-manager-of-choice for an otherwise good encryption and get screwed. Not sure who blame in that scenario.
-
-
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Hackage discussion
Hackage related posts
-
"YOLO" is not a valid hash construction
-
NIST Announces Post-Quantum Cryptography Standards
-
GitLab: Authentication and Signing with SSH Keys
-
Show HN: Name Checker – check your project name accross many sites
-
Would anyone be interested in hoot: A cabal wrapper for haskell based on Cargo?
-
`cabal update` stuck here forever.
-
The Algorand Community Study Group just had our first meeting yesterday. We read Chapter 15 Elliptic Curve Cryptography in A Graduate Course in Applied Cryptography (Boneh, Shoup). Are you interested in learning applied cryptography? Which topic should we cover next? Come join us!
-
A note from our sponsor - InfluxDB
www.influxdata.com | 25 Jun 2025
Index
What are some of the best open-source Hackage projects? This list will help you:
# | Project | Stars |
---|---|---|
1 | Cabal | 1,678 |
2 | hackage-server | 433 |
3 | cabal2nix | 376 |
4 | acid-state | 303 |
5 | envy | 151 |
6 | json-autotype | 149 |
7 | flora-server | 143 |
8 | hip | 117 |
9 | hasbolt | 81 |
10 | hackage-diff | 63 |
11 | homplexity | 61 |
12 | clock | 59 |
13 | hackage-repo-tool | 57 |
14 | email-validate | 43 |
15 | htoml | 39 |
16 | regex | 29 |
17 | hackage-search | 25 |
18 | ed25519 | 22 |
19 | conferer | 21 |
20 | hPDB | 21 |
21 | sdl2-image | 17 |
22 | IntervalMap | 17 |
23 | wordpass | 15 |