pam_redirector is a pluggable authentication module (PAM) that allows redirection of login credentials to a local UNIX stream socket server and includes an example simple socket server (written in Python) just to show how easy it is to do this redirection. It is a simple C module that can transfer (redirect) credentials to a long-running server written in a scripting language. This is preferable to using direct PAM support in a scripting language because instantiating a full interpreter on every login is quite expensive.
Yet Another Flowmeter (YAF) is a tool for network flow capture, primarily designed to operate efficiently on white box hardware and generate IPFIX flow records. It is designed to operate primarily on Unix-based systems (including Mac OS X), and is supported by the Network Situational Awareness team at CERT.
SMTPUtils is a tool to secure mail servers, through testing or analysis, which provides the service manager or staff of computer security a summary of its implementation. It currently supports: resolution by MX record, checking for open relays, testing the perimeter antivirus system, testing the anti-spam system, performance testing, obtaining information, checking for DNSBL, SPF greylisting autodetection, and ping support.
Proto Balance SSL negotiates an SSL connection and forwards the plain HTTP connection to your Web server. Certificate management like request generation, vendor certificate installation, and key generation are all done from an easy-to-use Web interface. It load balances connections over multiple Web servers. It performs 1000 SSL transaction per second. Traffic management and on-the-fly redirection of traffic. On-the-fly adding and removal of servers. Traffic accounting and client-connection-rate limits. Denial of server protection. Layer 7 inspection and X-Forwarded-For support.
CCHEF (Covert Channels Evaluation Framework) is a software framework for empirically evaluating covert channels in network protocols running under Linux. CCHEF can be used in real networks with real overt traffic, but can also emulate covert channels using overt traffic from trace files. CCHEF was mainly designed for research purposes, but not to be (mis)used for real covert channel communication. Therefore, the sender/receiver application is a normal user space programs and not disguised in any way.