Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like CheckPoint, Netfilter, IPFilter, Packet Filter, Cisco PIX/ASA, NetScreen, TippingPoint, and Lucent BRICK in a similar way.
Passwd_exp notifies users via email of upcoming password or account expiration. Its simple modular architecture allows you to perform expiration checks on any data source you use (SQL databases, LDAP...), send expiration warnings only to desired users or group and on selected days only. Administrators can use it to review expired accounts in the system. Support for Linux and Solaris shadow (including LDAP and NIS systems) and BSD passwd systems is included.
nexB OpenAssets is a tool for inventorying, managing, and monitoring applications, software, hardware, networks, and generally any IT asset. It is designed so that system administrators, IT, and finance can determine what they have, how it is configured, what it is used for, and how much it is being used, so that informed decisions can be made. It complements existing network management software, integrates with a growing number of protocols and tools, and features no-agent discovery and inventory, configuration management including dependencies and correlation, monitoring, and reporting. It makes extensive and innovative use of XML, Xpath, and Xquery.
cpm (Console Password Manager) is a small console tool to manage passwords and other sensitive data and store them in a public-key encrypted file. It also allows you to configure the whole hierarchy yourself, so it's easily adoptable for many requirements. The encryption is handled through GnuPG, and the data inside is stored as XML.
SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and syncronize all sensor configurations.
Pak transfers multiple, possibly very big, regular files between possibly different hosts you have shell access to. It transmits segment IDs instead of file names and uses on-the-fly Blowfish-CBC encryption while being absolutely restartable with practically no loss of data already transmitted. Encrypted pak streams can be stored in intermediary regular files on untrusted hosts. Several stored pak streams, even truncated ones, can be merged for re-piping without decryption. Integrity is never checked. File offsets of any magnitude are supported via recompilation (the default width is 64 bits). Either UNIX 95 or UNIX 98 conformance is required and sufficient.
Shade (Steganographically Hide and Analyze Data Entries) is a versatile and feature-rich program designed to analyze and manipulate the LSBs (least significant bits) of files. LSB manipulation is a form of steganography, the art or science of making the existence of information undetectable by normal means. This is achieved by writing the contents of a file to the LSBs of a separate and inconspicuous host file.