oXygen is an XML editor that supports any XML document, and works with XML Schemas, DTDs, Relax NG schemas, and NRL Schemas. It has powerful transformation support that allows you to edit XSLT and XSL-FO documents and to obtain documents in the desired output format (such as HTML, PS, or PDF) with just one click. It also includes a complete Subversion client, support for flattening XML Schemata, an XML Schema instance generator, integration with the X-Hive/DB, MarkLogic and TigerLogic XML databases, editing actions on the diagram, and a rename refactoring action.
RefDB is a reference database and bibliography tool for SGML, XML, and LaTeX documents. Command-line tools allow interactive or scriptable access to the data which are stored in a SQL database. RefDB can also be accessed through a Web interface, a SRU interface, or via editor extensions (Emacs/vim). Libraries for Perl and PHP are available for programmers. RefDB provides sophisticated character encoding handling, using Unicode by default.
Staroffice/Openoffice to HTML Converter converts a Staroffice/Openoffice.org document to HTML, using xsltproc for the XML conversion and ImageMagick's convert to convert images. It creates a table of contents with links, and handles tables, styles, spans, and many other XML elements from a writer file.
The GCC XML Tree Node Introspector project consists of a patch to the gcc compiler to output the internal compiler tree nodes in RDF/XML and programs to process that RDF/XML. The tree nodes are complex data structures which represent the source code inside the compiler. Through these tree nodes, users are able to extract information from their programs that would be otherwise very difficult to obtain. Modules exist to store these nodes in Redland RDF using a Berkley database. The long-term goal of the project is create a high-level API that will make the programmatic manipulation of programs easier than it is now.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.