Tcl provides a portable scripting environment for Unix, Windows, and Macintosh that supports string processing and pattern matching, native file system access, shell-like control over other programs, TCP/IP networking, timers, and event-driven I/O. Tcl has traditional programming constructs like variables, loops, procedures, namespaces, error handling, script packages, and dynamic loading of DLLs. Tk provides portable GUIs on UNIX, Windows, and Macintosh. A powerful widget set and the concise scripting interface to Tk make it a breeze to develop sophisticated user interfaces.
TAO (The ACE ORB) is an advanced, CORBA-compliant, real-time Object Request Broker (ORB). It is designed to meet the stringent Quality of Service (QoS) requirements of real-time applications, resulting in superior end-to-end predictability, efficiency, and scalable performance. It implements the latest CORBA specifications from the OMG. It is built with components from the ADAPTIVE Communication Environment (ACE) C++ framework, resulting in a highly extensible architecture, adaptability to a wide variety of situations, and portability across a broad range of platforms. Although TAO was designed to meet the demanding requirements of real-time applications, it is also well-suited for general-purpose CORBA applications.
The Glasgow Haskell Compiler is a robust, fully-featured, optimising compiler for the functional programming language Haskell. GHC compiles Haskell to either native code or C. It implements numerous experimental language extensions to Haskell for example concurrency, a foreign language interface, several type-system extensions, exceptions, and so on. GHC comes with a generational garbage collector, a space and time profiler, and a comprehensive set of libraries.
UnZip will list, test, or extract files from a ZIP archive, commonly found on DOS and Windows systems. A companion program, Zip, creates ZIP archives; both are part of the Info-ZIP project. Both programs are compatible with archives created by PKWARE's PKZIP or Nico Mak's WinZip, but in many cases the program options or default behaviors differ.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.
Ayam is a free 3D modelling environment for the RenderMan interface. It features good RIB export, CSG (all RenderMan primitives supported), and NURBS modelling. Features instancing, arbitrary number of modeling views, object clipboard, independent property clipboard, n-level undo, console, and Tree-View with Drag-and-Drop support.
F-Script is a lightweight scripting layer specifically designed for the Mac OS X object system (i.e. Cocoa). It provides scripting and interactive access to Cocoa frameworks and custom Objective-C objects. It aims to be a useful and fun tool for both beginners and experts, allowing interactively exploring, testing, and using Cocoa-based objects and frameworks.
Onyx is a powerful stack-based, multi-threaded, interpreted, general purpose programming language similar to PostScript and Forth. It can be embedded as an extension language into other applications, and was designed to have a small memory footprint. It is among the smallest embeddable interpreters available.
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.