The purpose of the glideinWMS is to provide a simple way to access the Grid resources. To achieve this without reinventing the wheel, glideinWMS is a Glidein-based WMS (Workload Management System) that works on top of Condor. Once setup, final users can submit regular Condor jobs to the local queue and the glidein factory will provide the computing resources behind the scenes. From the final user point of view, the Condor pool just magically grows and shrinks as needed.
gccwrap 32bit is a set of simple wrapper scripts to make it easy to compile 32-bit only programs with uncooperative Makefiles on 64-bit systems. You can just use "32bit make" to compile them and the wrappers will transparently add any -m32 options needed and also do some other transparent fixups. This package requires a Linux distribution with proper FHS compliant -m32 / multilib support like SUSE, Fedora, or Mandriva.
gc-utils is a small set of scripts that let you import and update CVS repositories into git very easy and let you export patches back into a CVS working copy. To makes the exchange easy, gc-utils stores the CVS working copy into a subdirectory and receives all information from there whenever necessary.
autogen.sh (a.k.a. buildconf) provides automatic build system preparation and is generally very useful to projects that use the GNU build system (i.e. the GNU autotools: autoconf, automake, and libtool). It is a POSIX shell script that is used for preparing a build system for compilation, verifying versions, ensuring necessary functionality, and overcoming many common build preparation issues.
WebSH is a script that executes commands on a remote machine through Web requests. This script currently only works for Unix based servers and Unix based clients. It emphasizes the fact that a vulnerability that allows a file to be edited or uploaded is just as bad as a buffer overflow of PHP or an Apache thread.
SQLIer takes an URL vulnerable to SQL injection attacks and attempts to determine all of the necessary information to build and exploit an SQL injection hole by itself. It requires no user interaction unless it can't guess the table/field names correctly. By doing so, it can build a UNION SELECT query designed to brute force passwords out of the database. It does not use quotes in the exploit, meaning it will work for a wider range of sites. An 8 character password (containing any character from decimal ASCII code 1-127) takes approximately one minute to crack.