Stars
Configure keys, macros, and lighting on GK6X keyboards (GK64, GK84, GK61, etc)
GUI Tool To Removes Ads From Various Places Around Windows 11
Self-hosted asset management app designed to help users efficiently sort through a large number of 3D printer model assets.
A fancy, easy-to-use and reactive self-hosted docker compose.yaml stack-oriented manager
win32ss / supermium
Forked from chromium/chromiumChromium fork for Windows XP/2003 and up
reverse engineered python3 client to control all your 16x16 or 32x32 pixel displays (experimental)
a simple ESP32 NAT Router with some additional features
A gentoo installer with a TUI interface that supports systemd and OpenRC, EFI and BIOS, as well as variable disk layouts using ext4, zfs, btrfs, luks and mdraid.
Keep your application settings in sync (OS X/Linux)
🚀 Awesome list of open source applications for macOS. https://t.me/s/opensourcemacosapps
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration.
LGOGDownloader is unofficial downloader to GOG.com for Linux users. It uses the same API as the official GOG Galaxy.
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
An open source, self-hosted implementation of the Tailscale control server
🤖 The free, Open Source alternative to OpenAI, Claude and others. Self-hosted and local-first. Drop-in replacement for OpenAI, running on consumer-grade hardware. No GPU required. Runs gguf, transf…
Some ultra low cost, unique layouts mechanical macropad using CH552G
Don't waste your time with compliance. FastForward automatically skips annoying link shorteners.
High performance self-hosted photo and video management solution.
A patch for GNU Core Utilities cp, mv to add progress bars
smtp4dev - the fake smtp email server for development and testing
Generate high-quality triangulated and polygonal art from images.
A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensit…