Showing 9 open source projects for "command-line"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    This project is intended to provide code to be used with MySQL and Python to create a database of major league baseball game events which are freely provided by the mlb.com Gameday application. Older version also support creating a retrosheet.org database but that is no longer supported. All major and minor league pitch location and game statistic data can be downloaded using BBOS. Installation Videos! Part 1: http://youtu.be/rnv2VLcG-eI Part 2: http://youtu.be/eFudbMWHNlQ Special...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ...FireStrike is a suite of six programs which used together form a Battle Control System. FireStrike will take control of the various components of a wargame and automate them so that the wargamer can do what he does best - to command his or her troops in a Simulated Battle Environment. FireStrike will handle all aspects of the battle, from morale to ammunition, from radio communications to the complexities of Tank Versus Tank Warfare
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    IDTE- ID3 Tag Editor

    IDTE- ID3 Tag Editor

    A Smarter Way to Tag FLAC, Vorbis, Lyrics, WMA, WavPack, and ID3 Tags

    IDTE is a full-featured tag editor for Windows that supports tagging of FLAC, APE, ID3v1.x/2.x, WMA, Lyrics, and Vorbis metadata in audio files. It also includes a powerful audio player with support for 40+ lossy and lossless formats, including FLAC, ALAC, OGG, APE, MP3, and more. IDTE offers a wide range of advanced features: • Rename files using tag information • Export and manage tag data • Create and manage playlists • Search online for missing or incomplete tags • Fetch...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 4

    Open TeamPlay

    An OpenSource (C# .NET) TeamPlay Environment.

    An Open Source (C# .NET) TeamPlay Environment. - Permits the easy downloading of games that may not be available via Steam, and their Source Port derivatives. - Preconfigured for easy play. - Enables the easier download of enhanced user made content for such titles. - Enables easier Multi-Player. - May incorporate a chat client in later versions. - Encryption: May incorporate up to 9.99% U.S.-origin parts or components. Officially Supported Operating Systems: -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Financial reporting cloud-based software. Icon
    Financial reporting cloud-based software.

    For companies looking to automate their consolidation and financial statement function

    The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
    Learn More
  • 5
    Koll3ctions
    Kindle collection manager. Runs on Mac OS X, Linux and Windows. Creates collections from your folders on Kindle. Copy your books into your Kindle, run this program, restart your Kindle and enjoy collections!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Image Compare project provides two applications. The Image Compare application (imagecomp) is a tool to aid the visual comparison of two coin images. The Image Mask command line application prepares coin images for publication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Archive DJ
    ArchiveDJ produces a suite of play-lists based on automatically determined themes that span a given music archive. It has settings for optimal size and how important it is to cover as much of the archive as possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    pr0nor lends you a hand enjoying your media collection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Command-line tool to check ADFs (Amiga Disk Files) for errors and viruses. A binary is included for Windows users; Linux users are advised to compile the application themselves. Might also compile under plain DOS; but BE WARNED! When you scan files already renamed by the TOSEC standard, consider that file names may become insanely long in no time.
    Downloads: 3 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • Previous
  • You're on page 1
  • Next