The Enhanced File Crypt/eXtended File Stealth System (EFC/XFSS) makes your uploaded files safe on the server so that no one can read them without knowing a few details to decipher the files. It generates different obfuscated names and encrypted files so no one will know what the original format or name was.
nexB OpenAssets is a tool for inventorying, managing, and monitoring applications, software, hardware, networks, and generally any IT asset. It is designed so that system administrators, IT, and finance can determine what they have, how it is configured, what it is used for, and how much it is being used, so that informed decisions can be made. It complements existing network management software, integrates with a growing number of protocols and tools, and features no-agent discovery and inventory, configuration management including dependencies and correlation, monitoring, and reporting. It makes extensive and innovative use of XML, Xpath, and Xquery.
fpwdman manages a file of passwords that is accessed by one master passphrase. It can import and export password files and makes it possible for encrypted password files to easily be transferred across operating systems. It supports multiple password files, which could be used when a number set of system administrators share a site-wide file of passwords for common tasks, while each maintaining a file of personal passwords. It also exports and imports password files to and from plain text and optionally uses user-generated random entropy. The source includes two command lines tools to encrypt and decrypt: ensbc and desbc.
SiLK (System for Internet-Level Knowledge) consists of two sets of tools: a packing system and an analysis suite. The packing system receives Netflow V5 PDUs or IPFIX and converts them into a more space efficient format, recording the packed records into service-specific binary flat files. The analysis suite consists of tools that can read these flat files and then perform various query operations, ranging from per-record filtering to statistical analysis of groups of records. The analysis tools interoperate using pipes, allowing a user to develop a relatively sophisticated query from a simple beginning.