The Voodoo compiler is an implementation of the Voodoo programming language. The Voodoo programming language is a low-level programming language, abstracting over the platform's instruction set and calling conventions, but otherwise leaving the programmer free to do anything at all. The Voodoo compiler supports multiple target platforms and provides a stand-alone compiler, as well as a Ruby module for programmatic code generation.
Zorp is a proxy firewall suite with its core architecture is built around today's security demands: it uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.
Fotoxx navigates an image collection using a thumbnail browser to choose images to view or edit. Edit functions include brightness, contrast, color, gamma, white balance, tone mapping, red eyes, sharpen, blur, noise suppression, smart erase, trim (crop), resize, rotate, add text, bend/warp, many art effects, HDR, HDF, stack, and panorama. Edit functions use movable curves and sliders. Feedback is live using the whole image. RAW files can be edited and saved with deep color. Areas or objects can be selected using freehand draw, follow edge, and tone matching. Selections can be edited in place with adjustable blending. They can also be cut and pasted into other images. Any metadata can be edited, reported, and searched (filenames, tags, dates, geotags, comments, captions, ratings, etc.). Collections (arbitrary subsets) can be defined and viewed. Batch functions are available for rename, resize/export, RAW conversion, and more.
Rescatux is a GNU/Linux rescue CD that comes with Rescapp, a nice wizard that will guide you through your rescue tasks. It can restore Grub to the MBR update a Grub configuration, perform filesystem checks, fix a Windows MBR, and more. Features that can indirectly assist the rescue process include chat programs to let you reach human online help, a share log (automatic pastebin), and a share log that uses formatting appropriate for posting on a forum.
Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking (VTP). It helps the pen-tester in different tasks, such as becoming the root role in the Spanning Tree, creating virtual CDP neighbors, setting up rogue DHCP servers, becoming the active router in a HSRP scenario, enabling trunk, performing ARP spoofing over VLAN hopping, adding or deleting VLANs (via VTP), and more.
The X Binary Package System (in short XBPS) is a binary package system designed and implemented from scratch. Its goal is to be fast, easy to use, bug-free, featureful, and portable as much as possible. There is a well documented API provided by the XBPS Library that is the basis for its frontends, to handle binary packages and repositories.
x509watch is a simple command line application that can be used to list soon expiring or already expired X.509 certificates, such as SSL certificates. All certificates are searched by default in the standard PKI directory, but any other directory can be specified as a parameter. Only Base64 encoded DER and PEM X.509 certificates are supported.