vTemplate is a PHP class that is intended to make splitting PHP from HTML a simple and natural task. It has easily understandable syntax that is much easier to use than other template classes. It compiles a template into native PHP code using one PCRE call, thus the parsing is extremely fast. It also has powerful caching and debugging classes to extend the functionality.
Table Class allows you to create highly dyanamic HTML tables easily and quickly. It supports CSS, any number of arbitrary tags, and creating tables inside tables. This class is useful for implementing intensive reporting features. Table Class is faster than using and parsing traditional HTML templates because the class works completely in memory, storing all the table data in several comprehensive arrays, while not compiling to HTML until you want it to. This allows for dynamic editing of any attribute of any element. Rows and columns can be easily added and subtracted at any time, and row contents can be added simply by passing an array.
User Manage is a compact suite which can easily be used in any PHP script. It is modeled like a puzzle: there is the "core" that handles basic authentication, and then there are other modules that handle utility functions (e.g. a database handler that helps top-level modules like the permissions handler). With User Manage, developers can build applications with the standard user authentication complete, and developers can drop in modules to handle extra user information and to add functionality.
XmlRepository is a storage solution for XML data using a relational database. It provides methods to insert, update, and delete elements or attributes. Complete XML documents can be stored or reconstructed by using simple XPath expressions. This class uses the Edge Table Approach with Inlining to store the data in a single table.
class_sql_inject is a PHP class that searches your SQL data values for special characters that may change the meaning of your SQL data and execute actions that may compromise the security of servers. When some of these suspicious character sequences is found in HTTP POST request values ($_POST), you can either destroy the current session, redirect to a new page, or log the activity.