Showing 957 open source projects for "command-line"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 1
    The purpose of on-line is to maintain servers 24/7 connected to the net. It will monitor your network connection and make sure its on-line (if not, it will bring it back). It is capable of syncing your IP (e.g: noip, dns2go). It has a notification system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The SunGazer PacketFilter is a small and simple tool under GPL to set up firewall rules. It uses iptables and it is easy to use and to configure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RemenDeKO is a file repair program that you can use to generate off-line patch files to apply over damaged files. It's targeted for corrupted downloads, so the downloader just need to re-download a (probably) small file to fix the damaged download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JNI solution for masking command line input such as password entry. This project supports non-echoed input on Windows and unix platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 5
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    The development of a biometric system and applications e.g. Access Control based on the system to recognize and verify people. The primary goal is face recognition, but other human attributes might get used too in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Line command cleaner/converter files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    a linux netfilter/iptables firewall log summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A simple yet powerful command line cryptosystem, coded in C++ for win32 and Unix/Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    AuthClassed is a class, written in PHP, to implement a simple authentification scheme for database-oriented webpages. Using AuthClassed is as simple as putting a single code line at the top of the webpage you would like to protect.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Geheimnis is no longer maintained (use of kpgp is now recommended). Geheimnis was an application for UNIX/KDE that "wraped" around encryption programs and their irksome command-line interface, making it easier for users to use these programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Web-Check is a tool for comparing two web pages using md5 digests. It can be run from the command line or as a daemon. This project plans to become an opensource version of Tripwire for Apache.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    mod_antihak is an Apache Module designed to eliminate the CodeRed and Nimda worm\'s network bandwidth consumption. We're working to make it as easy as writing a line of text to add more worms! :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    ...It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet. Run as daemonize (-d ) if specified in command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A modular steganography program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A command line tool written in C++ that analyzes the source files of a C program to represent the pattern of its system calls in terms of a LALR(1) grammar.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    An educational project dedicated to port scanning and network discovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Secure and portable command-line password manager written in Java and based in the existing sf JRijndael project.
    Downloads: 0 This Week
    Last Update:
    See Project