jPersist is an extremely powerful object-relational database persistence API that manages to avoid the need for configuration and annotation; mapping is automatic (A-O/RM). It uses JDBC, and can work with any relational database and any type of connection resource. It uses information obtained from the database to handle mapping between the database and Java objects, so mapping configuration is not needed, and annotation is not needed. In fact, there is no configuration needed at all.
The X Binary Package System (in short XBPS) is a binary package system designed and implemented from scratch. Its goal is to be fast, easy to use, bug-free, featureful, and portable as much as possible. There is a well documented API provided by the XBPS Library that is the basis for its frontends, to handle binary packages and repositories.
CSVSee graphs data from CSV files, especially those containing timestamps. You can graph all columns, or specific columns matching regular expressions. Graphs can be displayed in an interactive viewer, or saved to a .png or .svg file. Tools are also provided to generate CSV files by string-matching in multiple timestamped text files, and for creating CSV reports of Grinder load test logs.
Grinder Webtest allows running Visual Studio .webtest files from the Grinder load testing tool. It supports an arbitrary number of tests, grouping tests into scenarios, parameterization of requests, and parameter capturing in responses. Test sets may be run sequentially, in threads, randomly, or with relative weighting.
SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing. It terminates SSL/TLS and initiates a new connection to the original destination, logging all data transmitted. It supports plain TCP and SSL, HTTP and HTTPS, and IPv4 and IPv6. For SSL and HTTPS, it generates and signs forged X509v3 certificates on-the-fly using the original certificate's subject DN and subjectAltName extension. It supports Server Name Indication, RSA, DSA, and ECDSA keys, and DHE and ECDHE cipher suites. It can also use existing certificates if the private key is available.