mylbhelper helps dumb load balancers do their job. It monitors a local MySQL instance by periodically issuing a query. Should the query fail, a custom script, which typically would firewall off the load balancer, is executed. Likewise, when it comes back up, another script is executed. This means you can use any load balancer capable of distributing TCP traffic rather than one natively capable of talking MySQL. mylbhelper can also act solely as a monitoring daemon.
StatsServ is a little program which emulates an ever smaller IRC server (in regard to the commands it handles) and transfers statistics from IRC into a database. You can then use the data, for example, on a Web site where you want to display the latest statistics. Statistics consist of the uptime of each server in the network, a list of channels, including their topic (except for secret (+s) and private (+p) channels), and the number of users in the network. You can normally get these statistics via /stats u, /list, and /lusers (if /stats u is supported on the network and enabled for normal users).
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers' IP addresses into the ipfw2 table, effectively blocking them. Addresses are automatically removed from the table after specified amount of time. Bruteblock uses regular expressions to parse logs, which gives it enough flexibility to be used with almost any network service. Bruteblock doesn't use any external programs and works with ipfw2 tables via the raw sockets API.
This is the "progress" utility from NetBSD, ported to Linux and Solaris. The progress utility allows the file I/O of progresses to be monitored. It includes support for gzip-compressed files, so "progress -z -f file.tar.gz tar xf -" would show the progress of extracting file.tar.gz.
mwcollect is an easy solution to collect worm-like malware in a non-native environment like FreeBSD or Linux. The first versions were used to collect binaries for botnet monitoring, and bots are still what it is mostly collecting. Some people consider it a next generation honeypot; however, that comparison often leads to the misunderstanding that computers running mwcollect can actually be infected with the malware, which is not the case.