The yaSSL Embedded Web Server is a fast, embeddable, and easy-to-configure Web server with a strong focus on portability and security. The Web server offers SSL/TLS (HTTPS) support built-in through the CyaSSL embedded SSL Library. With a footprint size of less than 100kB with SSL enabled (or 40kB without SSL) and a simple and clean API, the yaSSL Embedded Web Server was designed to fit perfectly into resource-constrained embedded environments. While maintaining a small size and fast speeds, the yaSSL Embedded Web Server offers a full feature set to give you the maximum amount of freedom and flexibility when developing your project.
sec-wall is a feature-packed security proxy that supports SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching/rewriting, and an optional header enrichment. It's a security wall with which you can conveniently fence otherwise defenseless backend servers.
KTorrent is a BitTorrent application that allows you to download and share files using the BitTorrent protocol. Key features include queuing of torrents, global and per-torrent speed limits, previewing of certain file types, importing of partially or fully downloaded files, file prioritization for multi-file torrents, selective downloading for multi-file torrents, kick/ban peers with an additional IP Filter dialog for list/edit purposes, UDP tracker support, support for private trackers and torrents, support for µTorrent's peer exchange, support for protocol encryption (compatible with Azureus), support for creating tracker-less torrents, support for distributed hash tables (DHT), support for UPnP to automatically forward ports on a LAN with dynamic assigned hosts, support for webseeds, scripting support via Kross, and interprocess control via DBus interface.
Inguma is a penetration testing and vulnerability research toolkit. The framework includes modules that discover hosts, gather information, fuzz targets, brute force user names and passwords and attempt exploits. While the current exploitation capabilities are limited, the program provides numerous tools for information gathering and target auditing.