SparForte is a scripting language for large projects requiring reliable, scalable code, reduced maintenance time, and strong bug elimination requirements. It is targeted for programmers interested in quickly writing reliable software, educators wanting to teach disciplined programming skills, and advocates of the Ada/Spark programming languages.
Xidel is a command line tool to download Web pages and extract data from them. It can download files over HTTP/S connections, follow redirections, links, or extracted values, and process local files. The data can be extracted using XPath 2.0, XQuery 1.0, and JSONiq expressions, CSS 3 selectors, and custom, pattern-matching templates that are like an annotated version of the processed page. The extracted values can then be exported as plain text/XML/HTML/JSON, or assigned to variables to be used in other extract expressions or be exported to the shell. There is also an online CGI service for testing.
The Mirror C++ reflection library provides both compile-time and run-time meta-data describing common C++ program constructs like namespaces, types, enumerations, classes, their base classes and member variables, constructors, etc. and provides generic interfaces for their introspection. It also provides several high-level utilities based on the reflected meta-data like a factory generator, which generates, at compile-time, implementations of object factories which can create instances of arbitrary 'reflectable' type.
Cloonix is a Linux router and host simulation platform. It fully encapsulates application, host, and network l2 and l3 into a relatively easy-to-use simulation GUI. Network delay and loss characteristics can be configured per link. It provides support for running kvm or UML virtual machines configured into an arbitrary complex network configuration. It is possible to run a 12 router UML simulation on a small x86 host (a P4 with 512 MB RAM). 32- and 64-bit KVM machines are provided.
Inguma is a penetration testing and vulnerability research toolkit. The framework includes modules that discover hosts, gather information, fuzz targets, brute force user names and passwords and attempt exploits. While the current exploitation capabilities are limited, the program provides numerous tools for information gathering and target auditing.