Fenris is a multipurpose tracer, debugger, and code analysis tool that detects and documents high-level language constructions, can recover symbols, graph program execution flow, detect internal functions, recover symbol tables, and deal with anti-debugging protection. It features a command-line interface as well as a SoftICE-alike GUI and Web frontend.
memfetch dumps the memory of a program without disrupting its operation, either immediately or on the nearest fault condition (such as SIGSEGV). It can be used to examine suspicious or misbehaving processes on your system, verify that processes are what they claim to be, and examine faulty applications using your favorite data viewer so that you are not tied to the inferior data inspection capabilities in your debugger.
DieHard automatically hardens software applications against a wide range of bugs. These bugs, known as memory errors, often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior. DieHard either eliminates these bugs altogether, or avoids them with high probability.
Sticker is a system call spy API which runs in user mode. It is a user-friendly, object-oriented wrapper around the ptrace API. Using Sticker, an end user can utilize the benefits of ptrace without knowing the details of the ptrace API. The objective is to produce an API (libSticker) that can help in speedy development of applications that work like debuggers, code injectors, and system call spies.
scanmem is a simple interactive debugging utility for Linux that can be used to locate the address of a variable in an executing program. scanmem can then be used to modify the variable once, or continually over a period of time. It is similar to the "pokefinders" used to cheat at video games.
PhishBouncer is an anti-phishing platform based on an HTTP/HTTPS proxy integrating anti-phishing checks that do not depend on block lists or Phish signatures. The checking algorithms make use of the attributes of the Web site being visited, the structure and properties of the referring URL, and the Web site's association with other legitimate Web sites that the user interacts with. The checks are implemented as plug-in interceptors, and it is easy to modify them and add or remove new checks.