aerotools-ng provides a C interface for accessing the Aquaero5 USB device by Aqua Computer. It consists of a set of functions for data access and conversion, and a commandline tool using these functions as an example implementation. It also includes utilities for exporting sensor data to SNMP to be used by NMS and other monitoring/graphing tools.
PASAP runs in the background, checking whether a stream exists, and, if it does, plays it. It was originally written to play back audio provided by MPD in remotely networked locations, but it also allows consumer-grade HD decoders (WDTV) to automatically play back audio/video streams from an HTTP address.
libbadger is an alternative to existing decentralized authentication systems which require regular direct communication between client and authority. Badger allows clients to authenticate with servers easily and securely in a browserless environment because there is no necessity to tunnel the client to an authority for the purposes of its own authentication. Using Badger, clients only need to communicate with an authority once in their lifetimes.
M-Pin Strong Authentication System enables true two-factor authentication for Web sites and applications, based on the open source M-Pin Authentication Server and M-Pin Managed Service. The M-Pin Managed Service is a highly available, fault tolerant software as a service that issues cryptographic secrets to M-Pin Authentication Servers and Clients. The M-Pin Authentication Server uses just one leak-proof cryptographic key, and can't reveal any information about your users such as identity or login details, even if the key is compromised. The M-Pin Client is an HTML5 browser, so developers can easily integrate M-Pin into their Web sites and applications, enabling frictionless two-factor authentication and removing all username / password vulnerabilities.
Bletchley is a real-world cryptanalysis framework. It was created to assist with the detection, analysis, and exploitation of cryptographic flaws and aims to help automate the tedious aspects of this analysis while leaving the security expert in control of the process. It features automated token encoding detection (36 encoding variants), passive ciphertext block length and repetition analysis, a script generator for efficient automation of HTTP requests, and a flexible, multithreaded padding oracle attack library with CBC-R support.