TreeSheets 7439661030

Published by Jon Ben-Mayor 0

TreeSheets combines spreadsheet tools, mind mappers, outliners, personal information managers, text editors and small database utilities into an all-in-one office application.

Joplin 2.13.13

Published by Jon Ben-Mayor 0

Joplin is an Open Source note-taking application that can handle a large number of notes organized into notebooks.

AutoHideMouseCursor 5.55

Published by Jon Ben-Mayor 0

AutoHideMouseCursor is a small portable tool that allows you to set specific times for your mouse cursor to disappear from the screen.

Scribus 32-Bit 1.6.1

Published by Timothy Tibbetts 0

Scribus will help design and produce magazines, newsletters, print advertising, brochures, calendars, and pretty much anything that requires text to look visually appealing on paper. 64 Bit available.

FreeFileSync 13.3

Published by KT 0

FreeFileSync is a file/folder comparison and synchronization tool.

Scribus 64-Bit 1.6.1

Published by Timothy Tibbetts 0

Scribus will help design and produce magazines, newsletters, print advertising, brochures, calendars, and pretty much anything that requires text to look visually appealing on paper. 32 Bit available.

Memtest86+ 7.00

Published by Timothy Tibbetts 0

Based on the well-known original memtest86 written by Chris Brady, memtest86+ is a port by some members of the x86-secret team.

Psiphon 181.20240107

Published by KT 0

Psiphon is an Open Source censorship circumvention tool for Windows and Android designed to give access to the internet where censors and firewalls block it.

CompactGUI 3.0.2

Published by Timothy Tibbetts 0

CompactGUI enables a graphical interface for the Windows 10 command-line tool compact.exe, allowing space-saving file compression.

Monkey's Audio 10.42

Published by KT 0

Monkey's Audio is a free and convenient way to compress digital music enabling you to obtain bit-for-bit copies of your favorite music.

PeStudio 9.57

Published by KT 0

PeStudio is a portable tool that performs malware assessments on executable files. Since the target file is never launched during the course of the investigation, you can safely evaluate the file, in addition to malware, without risk.