Showing 4 open source projects for "reader"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • See what everyone is allocated to. Projects, clients, meetings - all in one tool. Icon
    See what everyone is allocated to. Projects, clients, meetings - all in one tool.

    The fast, simple way to schedule people, equipment and other resources online.

    Designed to replace clunky, old scheduling spreadsheets, Resource Guru helps managers get organized fast. The platform covers resource planning, resource scheduling, resource management, staff leave management, reporting, and more.
    Free Trial
  • 1

    AnyELF

    ELF File Viewer implemented as a Total Commander plugin

    ELF File Viewer implemented as a Total Commander plugin
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Reader of metadata stored in .Net compiled application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Farben is a Java-based universal binary file reader and writer. Easily view binary files hierarchically. Edit embedded file metadata in a variety of formats. Identify orphaned files. A wide variety of file formats will be included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A small program that reads and change bytes in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • Previous
  • You're on page 1
  • Next