Eric is a full featured Python and Ruby editor and IDE, written in Python. It is based on the cross platform Qt GUI toolkit, integrating the highly flexible Scintilla editor control. It is designed to be usable as an everyday quick and dirty editor as well as being usable as a professional project management tool, integrating many advanced features that Python offers the professional coder. Eric includes a plug-in system, which allows easy extension of the IDE functionality with plug-ins downloadable from the net. Current stable versions are Eric4 based on Qt4 and Python 2 and Eric5 based on Python 3 and Qt4.
GSL shell offers an interactive user interface that gives access to the GSL collection of mathematical functions. It is based on the powerful and elegant scripting language Lua. GSL shell is not just a wrapper over the C API of GSL, but offers a much more simple and expressive way to use GSL. The objective is to give the user the power to easily access GSL functions without having to write a complete C application. It also has a powerful module to produce plots or almost any kind of graphics based on data or functions.
crackxls2003 breaks the encryption on Microsoft Excel and Word 97/2000/XP/2002/2003 files which have been encrypted using the RC4 method. These files are encrypted using a 40-bit-long key. It will not work on files encrypted using versions later than 2007 or versions 95 or earlier, or if a non-default encryption method was used.
Qt is a comprehensive, object-oriented development framework that enables development of high-performance, cross-platform rich-client and server-side applications. When you implement a program with Qt, you can run it on the X Window System (Unix/X11), Apple Mac OS X, and Microsoft Windows NT/9x/2000/XP by simply compiling the source code for the platform you want. Qt is the basis for the KDE desktop environment, and is also used in numerous commercial applications such as Google Earth, Skype for Linux, and Adobe Photoshop Elements.
pyHIDS is a host-based intrusion detection system. It uses an RSA signature to check the integrity of its database. Alerts are written in the logs of the system, and can be sent via email to a list of users or on IRC channels (through the irker IRC client). You can define rules to specify files to be checked periodically.