GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.
aria2 is a utility for downloading files. The supported protocols are HTTP(S), FTP, BitTorrent, and Metalink. It has a powerful segmented downloading ability, downloading a file from multiple sources and multiple protocols and utilizing your download bandwidth to the maximum. It supports downloading a file from HTTP(S)/FTP and BitTorrent at the same time, while the data downloaded from HTTP(S)/FTP is uploaded to the BitTorrent swarm. Using Metalink's chunk checksums, aria2 automatically validates chunks of data while downloading a file like BitTorrent.
VerliHub is a Direct Connect server (HUB) for Linux. It features banlists for IP addresses, nicks, and hosts, temporary or permanent bans, the ability to register users for a hierarchy of 2 non-op and 4 opertor levels, MySQL data storage, and the ability to change some settings at runtime. It consumes minimal CPU resources and quite moderate RAM resources. Users that are registered for a VerliHub server gain a few advantages. For example, the user won't be affected by an IP address ban that was set against another user who shares the same IP address.
The Photomaniac Media Library is a media management solution for digital photographers who have to manage large amounts of digital media. Its strength is its native support for RAW images, version control, team functionality, speed, cross-platform compatibility, and cost efficiency.
Galet is a peer-to-peer application which primarily aims to provide easy-to-setup, secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connections occur between two nodes that have not been explicitly accepted by the users of these nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited.