IPv6 CARE, "IPv6 Compliant Automatic Runtime Environment", provides an environment where applications instantly become IPv6-compliant ('patch' mode, see RFC6535). It can also generate a diagnosis about the IPv6 compliance of an application ('check' mode). It uses an LD_PRELOAD-based library injection technique.
LANforge is a unified multi-protocol network traffic generation and WAN emulation application. It allows users to generate real world customer traffic in a controllable manner. The WAN emulator allows the injection of latency and other network oddities like dropped, duplicated, and re-ordered packets. LANforge includes a drag-and-drop virtual network builder that supports virtual routers, WAN links, traffic-generating nodes, and more. It provides a scriptable command line interface with Perl libraries as well as a graphical user interface.
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do about the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.
sipsak is a command line tool for performing various tests on Session Initiation Protocol (SIP) applications and devices. It can make several different tests, send the contents of a file, and interpret and react on the responses. It supports (de-) registration with given contact URIs and digest authentication.
Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments.