wasora is a computational tool designed to aid a cognizant expert, whether an engineer, scientist, technician, or geek, to analyze complex systems by solving mathematical problems by means of a high-level plain-text input file containing algebraic expressions, data for function interpolation, differential equations, and output instructions amongst other facilities. At first glance, it may look like another high-level interpreted programming language, but it should be seen as a syntactically-sweetened way to ask a computer to perform a certain mathematical calculation. For example, the famous Lorenz system may be solved by writing the three differential equations in a human friendly plain text file.
g7ctrl is a daemon and a command shell that are used together with the Xtreme GM7 GPS tracker to help simplify its management and to make it possible to monitor alerts sent by the tracker. It is designed to run in the background and can be used to both receive location updates from a remote tracker and configure a tracker over USB. All received events are stored in a database and can be exported to GPX, KML, and CSV, with distances calculated. It can also execute action scripts upon receiving specific events or generate mail notifications. Extensive reference documentation (HTML and PDF) and Unix man pages are provided.
Dowse eases the configuration of network routing for a local area network, starting from the setup of ARP-level static entries of known peers, IP-level firewall, DHCP configuration, and local DNS cache, up to an application layer transparent proxy and optional gateways to anonymous networks such as Tor and I2P. It consists of a minimalistic script which can run on any GNU/Linux box and which, from a central configuration point, controls Ebtables, Iptables, and all the daemons needed for such operations: DnsMasq, Squid2, and Privoxy. It comes with a module system for contributed add-ons like DNSCrypt-proxy and HTTPS-everywhere.
crackxls2003 breaks the encryption on Microsoft Excel and Word 97/2000/XP/2002/2003 files which have been encrypted using the RC4 method. These files are encrypted using a 40-bit-long key. It will not work on files encrypted using versions later than 2007 or versions 95 or earlier, or if a non-default encryption method was used.
pyHIDS is a host-based intrusion detection system. It uses an RSA signature to check the integrity of its database. Alerts are written in the logs of the system, and can be sent via email to a list of users or on IRC channels (through the irker IRC client). You can define rules to specify files to be checked periodically.