Showing 1126 open source projects for "open source invoice"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    xccdf2pdf renders XCCDF documents in PDF and other formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This java tools design to decrypt and obtain the MS Windows Admin password from encrypted password get from Amazon EC2. It can run as standalone application or embedded as Java applet in HTML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PassGen is a simple password generator that creates random passwords. The user can define the length and whether to use special characters. PassGen can create very long passwords. I t has been tested for ut to 100000 characters!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Rasea
    An acronym for cRoss-plAtform accesS control for Enterprise Applications. Rasea aims to become a reference in access control as a service based on the RBAC model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 5
    A library help for signing data with PKCS11 token (certificates with SHA1withRSA Sign Algorithm) and create CMS packages. It uses Bouncy Castle Crypto API and SUNPKCS11. Also it verify the signed data and verify signing certificate's OCSP control.
    Leader badge
    Downloads: 37 This Week
    Last Update:
    See Project
  • 6
    Over-encrypt provides a secure solution for data sharing capabilities in an outsourcing scenario where the storage service provider is trusted neither for data confidentiality nor for enforcing access control functionalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    FAB DNS Snooper
    This project focuses on a tool development, FAB DNS Snooper, which allows extract information from the company's DNS cache, to get the technological and social behavior patterns of any Domain Name System. DNS Cache Snooping is used technique.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Identity and service provisioning software component allows service developers to automate the creation, modification and deletion of users' identity and service subscription information on multiple disparate identity stores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 10
    MD5Analyser
    MD5Analyser is an open source java program to create and verify MD5 checksums.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Project Aristotle
    Project Aristotle (formerly the Identity Governance Framework (idgov) project) is an openLiberty.org project that enables developers writing applications using identity-related information to access information in a multi-protocol environment supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Based on the free text to image service: http://img4me.com/ You can convert text formatted email address or message into image, and send a shorten URL to share with your friends, so the search engine could not catch these information in a easy way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    its a simple java based log viewer to view iptables log no depedency and small and portables
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Based on the Swipe Toolkit, Data Calculator lets you know what your information is worth on the open market. Your information is valuable - don't give it away!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PasswordMaker - One Password To Rule Them All!
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    Urutau
    Algoritmo / classe de criptografia em JAVA
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A tool designed to determine all SSL/TLS ciphers and protocols supported by the target server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Password tools bundle is one application combining three tools - the Analyser (shows the "strength" of your password, the Generator (generates "strong" passwords) and the Manager (stores passwords securely using Rijndael).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    JBroFuzz
    The OWASP JBroFuzz Project is a web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    GenoGUARD is a DNA sequence screening software that implements the best match method recommended by the federal government to detect the presence of biosecurity threats in synthetic DNA orders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java File Checksum tool for calculating an hash (MD5, SHA-1, SHA-256, SHA-512).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Asgard is a tool to test and monitoring a lot of elements and integration sequences
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java implementation of MIKEY (Multimedia Internet KEYing, RFC 3830).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Brute-force the input parameters of your numeric models when only the output is known.
    Downloads: 0 This Week
    Last Update:
    See Project