Showing 20 open source projects for "computer"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    WIFIM - Monitor and Manage Wi-Fi

    WIFIM - Monitor and Manage Wi-Fi

    Monitor and Manage Wi-Fi

    This professional WiFi management tool allows you to view and manage detailed information about all wireless networks registered on your computer.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    PyNuker

    PyNuker

    A stress testing tool written in python.

    ...Because it is written in python it should run equally well on any system that has Python version 3.x installed. It infinitely(until stopped) sends a string of text via a UDP packet to a target computer or network device in an effort to flood the target with so much useless traffic that it stops responding to valid requests. I digitally sign some files in my releases. If you'd like to verify those signatures, you can find my PGP/GPG keys at: https://marcusadams.me/keys.html If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD LiberaPay: https://liberapay.com/gerowen
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    DirectXDiagnostic Tool Opener

    DirectXDiagnostic Tool Opener

    Open DirectXDiagnostic Tool without any commands

    Comprehensive Hardware Analysis, Monitoring and Reporting for Windows. Exhausting information about hardware components displayed in hierarchy unfolding into deep details. Useful for obtaining a detailed hardware inventory report or checking of various hardware-related parameters. Real-time monitoring of a variety of system and hardware parameters covering CPUs, GPUs, mainboards, drives, peripherals, etc. Useful for detection of overheating, overload, performance loss or failure...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    megawake

    megawake

    Remotely turn on devices connected to your home network

    A Free and Open-Source program to send Wake on Lan (WoL) packets What is Wake on Lan (WoL)? Wake on Lan (WoL) is a feature that allows you to remotely turn on supported devices (such as Smart TVs, and computers) when connected to the same local network. What is a Wake on Lan (WoL) packet? It is a packet used to request a WoL order to remotely turn on a WoL supported device. More details available in: https://en.wikipedia.org/wiki/Wake-on-LAN For this program to work you have...
    Downloads: 5 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 5
    internet-control

    internet-control

    Control how long your childs computer is connected to the internet

    internet-control is a very special implementation of parental control. It allows the child to be productive at the computer while lowering the danger of addiction to a minimum. Instead of restricting the time the computer may be used, it allows parents to restrict the time the computer may be connected to the internet. This way the child is still able to do its homework at the computer, but the danger of addiction to a game or social media application is minimised - the unpredictabillity of the multiplayer mode and the social interaction via the internet are missing. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    WiFiSafe

    Small utility software conceived to share WiFi connections between com

    ...It will run with admin rights in order to access WiFi keys. 1)Place this program on a USB device. 2)Run it, you will be asked to set up a new password. 3)Once it is done, choose Export profiles (or Synchronise profiles). 4)Exit the program and remove the USB device. 5)Plug the USB device into another computer, run it, enter the right password and choose Import profiles (or Synchronise profiles). You have successfully shared the password-protected WiFi connections from the first computer into the second one. Warning: the software will create two folders, "profiles" and "temp", do not remove those folders during use. The encrypted data will be stored within the profiles folder
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    howmanypeoplearearound

    howmanypeoplearearound

    Count the number of people around you by monitoring wifi signals

    howmanypeoplearearound calculates the number of people in the vicinity using the approximate number of smartphones as a proxy (since ~70% of people have smartphones nowadays). A cellphone is determined to be in proximity to the computer based on sniffing WiFi probe requests. Possible uses of howmanypeoplearearound include, monitoring foot traffic in your house with Raspberry Pis, seeing if your roommates are home, etc. There are a number of possible USB WiFi adapters that support monitor mode. Namely you want to find a USB adapter with one of the following chipsets: Atheros AR9271, Ralink RT3070, Ralink RT3572, or Ralink RT5572. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    pyforward

    pyforward

    Turn your linux machine into an infrastructure wifi router.

    pyforward is a GTK+ front-end to three core linux technologies that make it possible to turn your computer into a wifi access point in infrastructure mode: 1. iptables - To enable routing of your requests. 2. dnsmasq - To assign ip-addresses using dhcp. 3. hostapd - To enable wifi access to your machine in infrastructure mode. Refer the wiki page for more information on how to run pyforward. Note: Presently I'm in "development" mode.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Flightdeck-UI is a project that utilizes the ideas from the design of aircraft controls and instruments for creating computer user interfaces, such as for monitoring.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Top Corporate LMS for Training | Best Learning Management Software Icon
    Top Corporate LMS for Training | Best Learning Management Software

    Deliver and Track Online Training and Stay Compliant - with Axis LMS!

    Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
    Learn More
  • 10
    indicator-hosts-up

    indicator-hosts-up

    Panel Indicator to interact and monitor hosts

    It is an easy and handy way for home or small offices where nowadays we have many hosts (pcs, routers, smartphones, NAS, media centers, wi-fi intruders, etc) and we want to know what is up and interact with them. This was born as many others from my need to turn on/off a computer in another room or see what is up before going to bed or be alerted by some intrusion in my local net via wi-fi. It needs a lot of improvements and I hope the community can help. New hosts are discovered via /etc/hosts and nmap but can be added manually too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    NSDMiner

    Tool for identifying Network Service Dependencies

    ...For more information, see the paper "Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E. Hutchinson, "NSDMiner: Automated Discovery of Network Service Dependencies," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Orlando, FL, March 2012." This work is supported by the U.S. Army Research Office (ARO) under a MURI grant W911NF-09-1-0525.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    etherwall
    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    NRClientX is a GUI frontend to make NeoRouter client CLI easy to use on Mac, Linux and Windows. It provides the computer list, add-on commands and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Gnmond is a monitoring tool for computer clusters, that collect data originating from individual hosts, analyzes it and provides a concise view of the individual cluster's state to other monitoring systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Wopy is yet another Wake on LAN/WAN tool, that allow a computer to be turned on or woken up remotely by a network message sent usually on another computer on the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Open Linux Router is a toolkit to centralize computer networking and Internet services within an organization. Its goal is to provide secure, alternative, open source solutions to the seemingly standard, but competitive and commercialized IT market.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Pitchers Duel is a Baseball simulation focusing on the one-on-one contest between a batter and a pitcher. Will include both against-the-computer and networked interplayer variations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    META is a decision making software which aims are to track computer attackers, computer attacks and to help investigators finding useful elements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Digital Archive Creator for OCS

    Digital Archive Creator for OCS Inventory NG

    This software is written in python and aim to add export function to OCS Inventory NG for a formatted xml with custom stylesheet in a pdf or html. DAC can export a single computer or all the computers. Web version and Cli version
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next