Showing 16 open source projects for "block"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • Purchasing and invoice automation solution for small to mid market companies. Icon
    Purchasing and invoice automation solution for small to mid market companies.

    Save your team 10s of hours/week with a fully personalized and automated procurement process.

    ProcureDesk is an integrated purchasing and invoicing platform tailored to help small to medium sized businesses streamline their procurement processes. This user-friendly system automates workflows and consolidates purchasing data into a centralized dashboard, allowing companies to control spending and enhance transparency efficiently. Features like automated invoice matching, simple requisition creation, and immediate cash flow insights minimize manual tasks and boost operational efficiency. ProcureDesk is perfect for smaller enterprises leveraging big-business strategies to reduce costs and optimize their purchasing activities. Discover how ProcureDesk can transform your procurement process into a more effective and manageable part of your business.
  • 1
    OpenSnitch

    OpenSnitch

    OpenSnitch is a GNU/Linux port of the Little Snitch firewall

    OpenSnitch is a GNU/Linux port of the Little Snitch firewall. You can launch the GUI from the icon or from the system menu. The daemon will start intercepting connections, prompting you to allow or deny them. If you don't apply an action, after 15 seconds (configurable) it'll apply the default action configured. When you open the GUI, you'll see all the connections and processes that the daemon has intercepted. Double click on a row to view the details of a process, rule, host or user. Once...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    RecoverPy

    RecoverPy

    Interactively find and recover deleted or overwritten files

    RecoverPy is a powerful tool that leverages your system capabilities to recover lost files. Unlike others, you can not only recover deleted files but also overwritten data. Every block of your partition will be scanned. You can even find a string in binary files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Mailu

    Mailu

    Insular email distribution - mail server as Docker images

    ..., block malicious attachments. Antispam, auto-learn, greylisting, DMARC and SPF, anti-spoofing. Freedom, all FOSS components, no tracker included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Throttled

    Throttled

    Workaround for Intel throttling issues in Linux

    This tool was originally developed to fix Linux CPU throttling issues affecting Lenovo T480 / T480s / X1C6. The CPU package power limit (PL1/2) is forced to a value of 44 W (29 W on battery) and the temperature trip point to 95 'C (85 'C on battery) by overriding default values in MSR and MCHBAR every 5 seconds (30 on battery) to block the Embedded Controller from resetting these values to default. On systems where the EC doesn't reset the values (ex: ASUS Zenbook UX430UNR), the power limit can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 5
    elmocut

    elmocut

    Eye candy ARP spoofer for Windows

    elmoCut aims to make arp spoofing easy for all users with all the hard work done under the hood. One of it's main features is to use as low CPU and RAM usage as possible while offering nearly the same results as other closed source spoofers.
    Leader badge
    Downloads: 436 This Week
    Last Update:
    See Project
  • 6
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Keras TCN

    Keras TCN

    Keras Temporal Convolutional Network

    ... as the maximum number of steps back in time from current sample at time T, that a filter from (block, layer, stack, TCN) can hit (effective history) + 1. The receptive field of the TCN can be calculated. Once keras-tcn is installed as a package, you can take a glimpse of what is possible to do with TCNs. Some tasks examples are available in the repository for this purpose.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    LoL Absent

    LoL Absent

    Program to block League of Legends contacts.

    ABANDONED PROJECT. THE PROGRAM DOES NOT WORK BECAUSE THE CHAT SERVERS HAVE CHANGED SINCE THE LAST UPDATE. Program to block League of Legends contacts. When you use it, you will appear offline and you will not be able to write in the picks and bans phase, but yes during the game. REQUIREMENTS: 1 - Windows 10 x64 or higher operative system. 2 - NET Framework 4.7.2 or higher.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box. KeexyBox...
    Downloads: 10 This Week
    Last Update:
    See Project
  • Speech-to-Text: Automatic Speech Recognition Icon
    Speech-to-Text: Automatic Speech Recognition

    Accurately convert voice to text in over 125 languages and variants by applying Google's powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
  • 10

    log2table

    track log files, block intrusions, and much more

    Log2table allows you to continuously monitor your logfiles. You can trigger actions when a specific message comes in your audited logfiles or when a specific number of occurences are present.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Python Control Systems Library

    Python Control Systems Library

    Feedback control system analysis and design

    The Python Control Systems Library, python-control, is a python module that implements basic operations for analysis and design of feedback control systems. This homepage for this project is at http://python-control.org and the code base in maintained at https://github.com/python-control/python-control. Information on this page is out of date, but left here for posterity.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12

    lbatofile

    Map logical block address to filename

    A sysadmin tool that maps a sector (for example a bad sector) to a filename (so you know which file got trashed). It relies on and integrates a variety of other tools such as blkid, lvm, and debugfs to chase the sector number through the layers of partitions, logical volumes, and filesystems that are part of a modern system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    pystim is an open source electrical stimulation device driver and development framework. It features a parallel/sequential block paradigm and supports event-base programming. It also provides a device simulator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A daemon that creates realtime dynamic, expirable iptables rules to block/drop IP addresses attempting brute-force breakin attacks on a linux host via ssh or other mechanism. Highly customizable and extensible.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    magicsearch

    magicsearch

    Search and restore files on broken filesystems

    Search a data block for magic MIME identifiers and try to recover the found data using file type specific header information. Currently recovers audio and video files best, but also recognizes PDFs and other file types. New recipes for even more filetypes as well as contributors are welcome ! Logo: Derivative work of http://commons.wikimedia.org/wiki/File:Pied_Avocet_chick.jpg (CC-BY-SA)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next