Dough is a personal budgeting application. It's designed to be both simple and attractive whilst being very effective at helping you keep in control of your spending. It features an attractive, to the point user interface with plenty of visual elements. It has many options for filtering and searching transactions, can import your bank statements, and you can make graphs of pretty much anything.
Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.
TeXstudio is a fully featured LaTeX editor. It is designed to make writing LaTeX documents as easy and comfortable as possible. It features an integrated PDF viewer with (almost) word-level synchronization, live inline preview, advanced syntax highlighting, and live checking of references, citations, LaTeX commands, spelling, and grammar.
UniMote server is a universal Android-to-Linux Bluetooth remote controller for multimedia applications. It is fast and stable. It supports easy-to-develop plugins. For now, plugins for controlling these applications are available: XBMC, Clementine, VLC, and file browser. More plugins will be added as soon as the core is stable.
ARP Neighbor Cache Fingerprinter is a tool that provides a mechanism for remote operating system detection by extrapolating characteristics of the target system's underlying neighbor cache and general ARP behavior. Given the non-existence of any standard specification for how the neighbor cache should behave, several differences in network stack implementations can be used for unique identification. The main disadvantage of this tool versus traditional fingerprinting is that because it's based on a Layer 2 protocol instead of a Layer 3 protocol, the target machine that is being tested must reside on the same Ethernet broadcast domain (usually the same physical network).