Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available, so it can measure the effectiveness and minimum requirements of each one. Currently, weplab supports several methods, and it is able to crack the WEP key from 600,000 encrypted packets.
fpwdman manages a file of passwords that is accessed by one master passphrase. It can import and export password files and makes it possible for encrypted password files to easily be transferred across operating systems. It supports multiple password files, which could be used when a number set of system administrators share a site-wide file of passwords for common tasks, while each maintaining a file of personal passwords. It also exports and imports password files to and from plain text and optionally uses user-generated random entropy. The source includes two command lines tools to encrypt and decrypt: ensbc and desbc.
libencio is a library providing a stdio-like interface for reading and writing of encrypted files (in MCrypt format only for now). Additionally, it provides full support for fseek()-like random read access of encrypted data. This allows one to operate on encrypted files as if they were ordinary, cleartext files. It could be used to provide MUAs with a layer to transparently handle encrypted attachments, as a backend to ffmpeg or mplayer to directly play encrypted files, or in combination with tar for encrypted backups. It uses libmcrypt and libmhash for encryption and hashing algorithms.
HAVEGE (HArdware Volatile Entropy Gathering and Expansion) is a user-level software unpredictable random number generator for general-purpose computers that exploits modifications of the internal volatile hardware states as a source of uncertainty. It combines on-the-fly hardware volatile entropy gathering with pseudo-random number generation. The internal state includes thousands of internal volatile hardware states and is merely unmonitorable. It can support several hundreds of megabits per second on current workstations and PCs.
John The Ripper MPI is an updated version of Ryan Lim's patch for John the Ripper to support MPI, in addition to a large number of third party patches to support additional ciphers and other features. MPI allows you to use multiple processors on a single system, or a cluster of systems for cracking passwords using John the Ripper.
A reasonable way to achieve a long term backup of OpenPGP (GnuPG, PGP, etc) keys is to print them out on paper. Due to metadata and redundancy, OpenPGP secret keys are significantly larger than just the "secret bits". In fact, the secret key contains a complete copy of the public key. Since the public key generally doesn't need to be backed up in this way (most people have many copies of it on various keyservers, Web pages, etc), only extracting the secret parts can be a real advantage. Paperkey extracts just those secret bytes and prints them. To reconstruct, you re-enter those bytes (whether by hand or via OCR), and paperkey can use them to transform your existing public key into a secret key.