bmon is a portable bandwidth monitor and rate estimator. It supports various input methods for different architectures. Various output modes exist, including an interactive curses interface, lightweight HTML output, and simple ASCII output. Statistics may be distributed over a network using multicast or unicast and collected at some point to generate a summary of statistics for a set of nodes.
MIDAS NMS is a highly configurable network monitoring and network intrusion detection server. It uses a distributed client/server model that allows it to scale to very large networks, and features highly optimized Snort support that dramatically reduces the overhead of both the Snort Sensor and the alert data repository. It also supports Netsaint/Nagios plugins and Big Brother clients, allowing for easy migration.
NetMRG is a network monitoring, reporting, and graphing system. Using MySQL, PHP, C++, pthreads, and RRDTOOL, it is capable of monitoring thousands of arbitrary values at user-configured intervals (typically 5 minutes). Graph templating allows network and system admins to begin monitoring routers, switches, servers and other devices with minimal setup overhead. NetMRG is also capable of responding to programmable events, such as variables exceeding accepted tolerances. NetMRG can be deployed in server hosting and ISP environments, allowing users to view only their own equipment's bandwidth or traffic graphs.
rrs is a reverse (connecting) remote shell. Instead of listening, it will connect out to rrs in listen mode. The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-TTY support, full OpenSSL support (client/server authentication and choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text sessions, peer-side session snooping, a daemon option, and reconnection features. It is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD, and QNX.
trackpeer is an agent that helps network and server administrators with tracking their users' computers. It makes it possible to determine the MAC addresses of computers over a network, even when the computers are behind NATed gateways. This agent is intended to be used by the administrators who need to identify and locate malicious computers and virus-infected computers in a network such as a middle-sized wireless LAN, public Ethernet jack system, campus, or corporate network.