FF Multi Converter is a simple graphical application which converts audio, video, image, and document files between all popular formats, using and combining other programs. It uses ffmpeg for audio/video files, unoconv for document files, and the PythonMagick library for image file conversions.
Window Switch is a tool that allows you to move applications between networked computers. The windows appear where you need them, as they were. You no longer need to save and send documents to move them around; simply move the view of the application to the machine where you need it.
GlusterFS is a clustered filesystem capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is based on a stackable user space design without compromising performance.
pcapfix is a repair tool for corrupted pcap files. It checks for an intact pcap global header and repairs it if there are any corrupted bytes. If one is not present, one is created and added to the beginning of the file. It then tries to find pcap packet headers, and checks and repairs them.
Sustainable IDE (SIDE) is a set of graphical tools for developers who want to build sustainable software. Sustainable software is software you can extend easily, from a functional or technological point of view. On one hand, this means that when a user has a new requirement, it's easy for any developer to add it, even if the original author is not there anymore. On another hand, if you want to change the underlying technologies, you don't need to rewrite your existing application from scratch. Sustainable Software gives you the freedom to change technology, requirements, or achitecture. This can be achieved thanks to the use of models in a model driven software development (MDSD) paradigm.
Malheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox environment). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.