mms2web.pl is a simple Perl program that extracts pictures from mail files and publishes them on, for example, a Web server. The mail or MMS sent to the mail address/mail folder is separated into different sections on the Web server based on a tagging system. This gives you the ability to create profile/user based sections in your Web space where users can send content from email or cell phones that can be automatically published.
DBGMEM is a feature rich memory debugger for C and C++ programs; it currently works for Linux only. It helps you to find problems such as memory leaks, heap memory corruption misuse, illegal arguments to selected standard library functions, stack corruption, and the use of freed or uninitialized heap memory. It is extensible via an API. The tool overrides GLIBC memory allocation functions and memory and string manipulation functions in order to add its features.
The CRT X-Y Library (libcrtxy) allows you to write vector-based video games (like Asteroids, Lunar Lander, and Battlezone from the 1970s and 80s). The end-user (and/or packager of your software) determines how lines are rendered, depending on the capabilities of their system. This choice includes anti-aliasing, alpha blending, blurring, and even the display size and depth. Fixed-point math is used, and sine and cosine trigonometric functions (using look-up tables) are provided. The library is based on libSDL and uses SDL as the video backend.
AYUMiS is a project aiming to create a cross-platform MMORPG set in space. It is developed in C++ with ClanLib. It will give the player full control over the game universe, with no NPCs or pre-planned storyline. It attempts to give the player a full range of choices and open-ended gameplay.
The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.