Search Results for "desktop application in java source code"

Showing 4 open source projects for "desktop application in java source code"

View related business solutions
  • Cloud-Based Software Licensing - Zentitle by Nalpeiron Icon
    Cloud-Based Software Licensing - Zentitle by Nalpeiron

    The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.

    1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
    Learn More
  • OpenMetal is an automated bare metal and on-demand private cloud provider. Icon
    OpenMetal is an automated bare metal and on-demand private cloud provider.

    Large Scale. Cloud Native. Fixed Costs.

    OpenMetal is an automated bare metal and on-demand private cloud provider. Our mission is to empower your team with cost effective private infrastructure that outperforms traditional public cloud.
    Learn More
  • 1
    cc-switch

    cc-switch

    A cross-platform desktop All-in-One assistant tool for Claude Code

    cc-switch is a cross-platform desktop assistant designed to unify and streamline the management of multiple AI coding tools such as Claude Code, Codex, OpenCode, and Gemini CLI within a single interface. The application focuses on improving developer productivity by providing centralized configuration, provider switching, and workflow orchestration across different AI backends. Built as a modern desktop app using Tauri and web technologies, it enables users to manage credentials, sessions,...
    Downloads: 750 This Week
    Last Update:
    See Project
  • 2
    LaReview

    LaReview

    The code review workbench

    LaReview is a developer-first, local-first code review workbench designed to transform complex pull requests or diffs into structured, high-signal review workflows powered by AI assistance. Instead of overwhelming developers with raw diffs or automated comment spam, the tool analyzes code changes and generates an intent-driven review plan that groups changes into logical flows such as authentication, API behavior, or data handling, and prioritizes them based on risk. It operates as a desktop...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Modsurfer

    Modsurfer

    Modsurfer provides ops & dev teams with a system of record

    Modsurfer provides ops & dev teams with the first system-of-record and diagnostics application to search, browse, validate, audit, and investigate WebAssembly binaries. At-a-glance insights into WebAssembly module data (code size & complexity, imports/exports & more). Search for details about modules (hash, ID, function names, strings, namespaces, errors & more). Easily audit and track all the WebAssembly code in your stack. Debug & triage issues otherwise difficult to pinpoint in opaque...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB