Dyject is a dependency injection module for Python. Unlike other enterprise libraries used for Inversion of Control (IoC) which have classes which look like AbstractSingletonProxyFactoryBean, dyject is simple to understand and easy to use. It supports both Python 2.7 and Python 3, has no other dependencies, and uses standard configuration files to define and wire objects.
KeyBox provides a way to manage OpenSSH v2 public keys, and can start a Web-based SSH terminal to execute commands and scripts on multiple SSH sessions simultaneously. The authorized_keys file is generated and distributed based on relationships maintained in the application. This allows for centralized management to help prevent public key sprawl. Also, composite terminals or scripts can be created so that commands can be shared across SSH sessions.
The Pegasus Workflow Management System encompasses a set of technologies which help workflow-based applications execute in a number of different environments, including desktops, campus clusters, grids, and clouds. It bridges the scientific domain and the execution environment by automatically mapping high-level workflow descriptions onto distributed resources. It automatically locates the necessary input data and computational resources necessary for workflow execution. It enables scientists to construct workflows in abstract terms without worrying about the details of the underlying execution environment or the particulars of the low-level specifications required by the middleware (Condor, Globus, or Amazon EC2). It bridges the current cyberinfrastructure by effectively coordinating multiple distributed resources.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
MASTIFF is a static analysis framework which automates the process of extracting key characteristics from a number of different file formats. To ensure the framework remains flexible and extensible, a community-driven set of plugins is used to perform file analysis and data extraction. While originally designed to support malware, intrusion, and forensic analysis, the framework is well-suited to support a broader range of analytic needs. In a nutshell, MASTIFF allows analysts to focus on analysis rather than figuring out how to parse files.