Showing 10 open source projects for "open source invoice"

View related business solutions
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • Inventors: Validate Your Idea, Protect It and Gain Market Advantages Icon
    Inventors: Validate Your Idea, Protect It and Gain Market Advantages

    SenseIP is ideal for individual inventors, startups, and businesses

    senseIP is an AI innovation platform for inventors, automating any aspect of IP from the moment you have an idea. You can have it researched for uniqueness and protected; quickly and effortlessly, without expensive attorneys. Built for business success while securing your competitive edge.
    Learn More
  • 1
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    x_Cleaner

    x_Cleaner

    Utility to sector-level cleaning your storage with special algorithm.

    x_Cleaner erases stored data using the following algorithms*: 1. Britain HMG IS5 - Base (one pass of writing 0x0) 2. Britain HMG IS5 - Enhanced (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 3. Russian GOST R-50739-95 (1-st pass 0x0, 2-nd pass-random values) 4. US DoD 5220.22-M(E) (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 5. Bruce Schneier's algorithm (1-st pass 0x1, 2-nd pass 0x0, 3-7 passes - random values) x_Cleaner works for Windows XP, Vista,7 and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ada Cryptographic Objects (ACO) is an Ada library of cryptographic algorithms and related services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 5
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Nexus Operating System is a planned, realtime multimedia operating system compliant with POSIX standards. Nexus is intended not to become the next fad; it is the OS all developers can develop for without losing market standing in other OS's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The libadacrypt-dev is a slow crypto library for Ada with a nice API. It is written for the i386 hardware architecture and supports AES, Twofish, 3DES, Serpent SHA, Whirlpool DSA, OAEP-RSA, HMAC, RMAC... Dependencies: make and gnat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • 10
    The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next