POSIXplorer will help you find, navigate, and open files on Linux, Mac OS, or most POSIX systems. You just type the command and then a regex for which you'd like to search. By default, it searches filenames and excludes class and other data files. It looks recursively down from your current directory. If you'd like to search through file contents, use the '-c' flag. When using -c, after the regex, you can list a file pattern, such as * (the default) to match any file or *.java to match Java files. After searching on your query, it presents a list of results and lets you type a number to select one for opening in the editor you have defined in the EDITOR environment variable, or by default Vim. After quitting the editor, you come back to your results and can continue opening files or execute a new search. To run a new search, just type the query and the script will detect that you did not intend to enter a file number. Note that in content searches with -c, only a new content query can be entered, not a new file filter.
sortsamples is a utility that solves the problem of having many sample CD/sample library directories with each having kick, hi-hat, snare, etc. folders (leading to sampledirectorychaosmadness). With many sample directories, you ll be slapped around many directories hunting for kicks/hi-hats etc. This utility creates symbolic links to directories which are similar. This way, you can have all your kick. It was made because external Sample organizing utilities can also become a pain, because usually your DAW also has a sample browser in it. It would be nice to have structure at the source: the filesystem. This is a crazy effort to combine similar folders and categorize automatically.
CIRCLean aims to be used by someone receiving a USB key from an untrusted source who wants to see the content without opening the original and potentially malicious files. The code runs on a Raspberry Pi, which means it is never required to plug the original USB key into a computer.
pwgrep is a simple password manager that manages a database file using encryption of GnuPG. It uses encryption and version control on all of the passwords that are stored. The password database can be used on several hosts at once with automatic synchronization. Even several users can share the same password database. The versioning system will keep track of who was changing which entries and at which time. The versioning system to use can be configured (and is Subversion by default). Besides passwords, pwgrep can also be used for storing a collection of files like certificates. The file shredding command for secure deleting of temporary files can be configured. A local backup of all database changes is automatically made. It can be used without a GUI (such as through an SSH session).
The purpose of the glideinWMS is to provide a simple way to access the Grid resources. To achieve this without reinventing the wheel, glideinWMS is a Glidein-based WMS (Workload Management System) that works on top of Condor. Once setup, final users can submit regular Condor jobs to the local queue and the glidein factory will provide the computing resources behind the scenes. From the final user point of view, the Condor pool just magically grows and shrinks as needed.
SQLIer takes an URL vulnerable to SQL injection attacks and attempts to determine all of the necessary information to build and exploit an SQL injection hole by itself. It requires no user interaction unless it can't guess the table/field names correctly. By doing so, it can build a UNION SELECT query designed to brute force passwords out of the database. It does not use quotes in the exploit, meaning it will work for a wider range of sites. An 8 character password (containing any character from decimal ASCII code 1-127) takes approximately one minute to crack.