Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.
XSockets is an open, lightweight, and highly portable library of universal and extensible super sockets for point-to-point communication. It provides a unified API for many communication methods between programs and devices. Currently, many methods of point-to-point communication are well established, like TCP/IP sockets, serial links, named pipes, infrared, or Bluetooth connections. XSockets is meant to provide a single API that can be used for of these methods and more.
CANpie defines a Standard API for access to the CAN (Controller Area Network) bus. The API provides functionality for ISO/OSI Layer 2 (Data Link Layer). The CANpie driver is the base for HLPs like CANopen, DeviceNet, J1939, etc. Through its low memory footprint, CANpie can be used for embedded applications (without any OS) as well as for Linux. Access to the Linux CAN driver is via a socket interface (AF_CAN).
Nipper is a network infrastructure parser. It takes a network infrastructure device configuration file(s), processes it, and produces a report with a security audit, device configuration, and other relevant information. It currently supports Cisco IOS-based routers, Cisco IOS-based switches, Cisco IOS-based catalysts, Cisco NMP-based catalysts, Cisco CatOS-based catalysts, Cisco PIX-based Firewalls, Cisco ASA-based Firewalls, Cisco FWSM-based Firewalls, Cisco Content Service Switches, Juniper ScreenOS-based Firewalls (NetScreen), Nortel Passport devices, CheckPoint Firewall-1 Firewalls, and Sonicwall SonicOS-based Firewalls. Report output is in HTML, LaTeX, XML, and text formats.
uvlan is a User-space Virtual Local Area Network. In other words, uvlan peers act as nodes on a network switch. Ethernet traffic is routed between peers intelligently. This allows for multiple networks to share resources and even IP address space. Some may call it a VPN (Virtual Private Network) application, but it's much more powerful: it is peer-to-peer, is much simpler, and operates at layer 2 (ethernet). VPNs generally operate at layer-3 (IP), and layer 2 applications like gaming can't be supported with layer 3 tunneling.
Bandit is a system of loosely-coupled components that provide consistent identity services and create a community that organizes and standardizes identity-related technologies in an open way, promoting both interoperability and collaboration. It implements open standard protocols and specifications so identity services can be constructed, accessed, and integrated from multiple identity sources. The Bandit system supports many authentication methods and provides user-centric credential management.