Showing 4 open source projects for "scrcpy 32 bit"

View related business solutions
  • SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM Icon
    SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM

    SalesTarget.ai streamlines your sales process, providing everything you need to find high- quality leads, automate outreach, and close deals faster

    SalesTarget is ideal for B2B sales teams, startup founders, and marketing professionals looking to streamline lead generation and outreach. It also benefits growing SaaS companies and agencies aiming to scale their outbound efforts efficiently.
    Learn More
  • Dynamic Work and Complex Project Management Platform | Quickbase Icon
    Dynamic Work and Complex Project Management Platform | Quickbase

    Quickbase is the leading application platform for dynamic work.

    Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.
    Learn More
  • 1
    Snap7

    Snap7

    32/64 bit multi-platform Ethernet S7 PLC communication suite

    Snap7, through three specialized components: Client and the inedited Server and Partner, allows you to definitively integrate your PC based systems into a PLC automation chain. Designed to transfer large amounts of hi-speed data in industrial facilities, it scales easily, down to small Linux Arm boards such as Raspberry PI. Hi level object oriented wrappers are provided, currently C/C++, .NET/Mono, Pascal, LabVIEW, Python with many source code examples. Very easy to use, a full...
    Leader badge
    Downloads: 941 This Week
    Last Update:
    See Project
  • 2

    SnapModbus

    32/64 bit multi-platform Modbus communication library

    SnapModbus is an Open-Source multi-platform suite (library and tools) to manage Modbus communication in strict adherence to the modbus.org specifications, both master and slave side. It supports all the functions described in the documents: * MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3 * MODBUS MESSAGING ON TCP/IP IMPLEMENTATION GUIDE V1.0b * MODBUS over Serial Line - Specification and Implementation Guide V1.02 through the standard transport protocols and the most widespread...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Bubbles

    Bubbles

    Bubbles the simple, easy to use HTTP web server, browser controlled

    Bubbles the simple, easy to use HTTP web server that is browser controlled, and capable of serving static files over the internet, either streamed from disk, or direct from RAM without lag. A GUI administration panel is accessed through your web browser (e.g. "http://localhost:1080/admin/" + default password of "admin"), which controls all her settings and vital functions, all in real time. Apart from serving files, she is capable of tracking site visits (site counters), receiving...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TenForTwo has already been through 3 major interations. It was a closed source Win32 E-Mail client. Now, I will realize, what I planned months ago: build the ultimate Win & Linux E-Mail client that will be easy - stable - secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB