Angst is an active sniffer, based on libpcap and libnet. It dumps into a file the payload of all the TCP packets received on the specified ports. It implements two methods for active sniffing. Angst is able to monitor ARP requests, and after enabling IP forwarding on the local host, it sends ARP replies mapping all IPs to the local MAC address. Also, it can flood the local network with random MAC addresses (like macof), causing switches to send packets to all ports.
autostatus is yet another network monitoring program. It was designed to be easy to use and configure, fast and efficient. The 'fast' and 'efficient' part is handled by making autostatus aware of network hierarchies, and avoiding checking a host or service when another host/service/link upon which it is dependent is unavailable. It exploits maximum parallelism during its checking to speed up monitoring.
mod_backhand is a load balancing module for Apache. It provides per-request HTTP redirection within a heterogeneous Apache server cluster. Each request is processed and run through a set of "candidacy functions" to determine which server is best suited to respond. The request is then proxied to that server. Facilities are in place to allow you to write your own dynamically loadable decision making algorithms. Everything about the request and the current availability of resources can be used in the decision-making process.
The NET-SNMP (formerly UCD-SNMP) package contains various tools relating to the Simple Network Management Protocol including an extensible agent, an SNMP library, tools to request or set information from SNMP agents, tools to generate and handle SNMP traps, a version of the unix 'netstat' command using SNMP and a Tk/perl mib browser. It was originally based on the Carnegie Mellon University SNMP implementation (version 22.214.171.124), but has been greatly enhanced, ported and fixed and barely resembles the original package anymore.
ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes IPv4/6, TCP, UDP, ICMPv4/6, IGMP and Raw across Ethernet, PPP, SLIP, FDDI, Token Ring, and null interfaces, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
RUE is intended to be used as a general, local or remote, monitoring tool for any Java based server such as Tomcat, Tyrex, Enhydra, JBoss, JOnAS, etc. RUE is written in 100% Java, and features pluggable samplers and sensors, data visualization plug-ins, configurable data history, output of HTML reports, a standard AWT GUI, JNDI-based sensor lookups, and a simple API for pooling, aggregation, and averaging.