Dpmaster is a lightweight master server initially written for the DarkPlaces game engine. Its Quake III Arena-like protocol allows it to fully support new games without having to restart or reconfigure it. In addition to its own protocol, dpmaster also supports the master protocols of "Quake III Arena", "Return to Castle Wolfenstein", and "Wolfenstein: Enemy Territory".
kipmp is an IPMP-like daemon that will flip a server's IP address between a primary and backup network interface based on the result of active probes against a (hopefully redundant) target like a default gateway. It is useful when one server is connected to multiple switches in the same network and higher availability is desired.
Borderline is a firewall generator. It takes a generic rule specification as input and generated an highly optimized firewall. It features IPv6 rule generation, support for multiple interfaces, and integrated support for network zones. It currently only supports firewall generation for Linux 2.6 (netfilter).
htrosbif is a tool that actively probes an HTTP server. It prods the Web server in all sorts of old, new, basic, fancy, spec-compliant, and spec-breaking ways. It tries to characterize both the well-spoken educated responses and the seriously deviant babble it receives in return. Signatures contain no user data, only header names and HTTP-level quirks. As a useful side effect, this might detect reverse proxies, HTTP load balancers, intrusion prevention systems, and Web application firewalls.
FastFwD is a small daemon that allows users to set up port forwarding from a source IP address and port number to a target IP address and port number easily without the need to deal with complicated ipchains/iptables-rules. FastFwD offers a fault-proof possibility for port forwarding between two networks or IP addresses and additionally gives the possibility to password-protect this connection. FastFwD has been tested for Linux and QNX and should compile and work with all POSIX-based systems.
netsniff-ng is a high performance Linux network sniffer for packet inspection. It is similar to analyzers like tcpdump, but without the need to perform system calls for fetching network packets. A memory-mapped area within kernelspace will be used for accessing packets, so there is no requirement for copying them to userspace (a 'zero-copy' mechanism). For this purpose, netsniff-ng is libpcap independent, but nevertheless supports the pcap file format for capturing, replaying, and performing offline analysis of pcap dumps. The project is focused on building a robust, clean, and secure analyzer and utilities that complete netsniff-ng as a support for penetration testing. netsniff-ng can be used for protocol analysis, reverse engineering, and network debugging.