Universal Password Manager (UPM) allows you to store usernames, passwords, URLs, etc. in an encrypted database protected by one master password. Its three strongest features are simplicity (it provides a small number of very strong features with no clutter), the ability to run cross-platform, and database sharing. Rather than having many separate databases (home, work, etc.), database sharing allows you store your database at a remote location (password protected HTTP URL, for example) and then have UPM automatically keep your local database in sync with the remote database.
MAPDAV (More Accurate Password Dictionary Attack Vector) is designed to use what is known about users via the /etc/passwd file on Unix/Linux systems to generate a dynamic dictionary of more accurate guesses as to what their possible password may be. It does this by mangling the user's username and user information in various user-specified ways to look for bad password protection practices.
The HOTP Toolkit package contains tools that are useful when deploying the one-time password HOTP technology. It contains a shared library, a command-line tool to generate and validate one-time passwords, and a PAM module (pam_hotp) to make system login or SSH use HOTP one-time passwords for authentication.
Keynesis Lockngo is a security application that runs directly from a portable drive. Lockngo encrypts and password-protects data against loss or theft. When protected, the drive appears empty (data is hidden) and will not allow new data to be written onto it. Lockngo has Military Grade 256-bit AES Encryption, FIPS 140-2 Certified. Lockngo also comes in a cross-platform version for Mac and Windows. This version allows you to lock a drive on a Macintosh and open it on a computer running Windows and vice versa.
The te-edu Password Meter class can be used to check whether a password is strong enough to not be guessed easily. It can perform several tests on a given password string to compute a score that represents the strength of a password. Password checking is based on brute force attack class A and considers 10 million password checks in one minute. It checks characters, character pairs, repeated characters, time needed to be discovered, character standard entropy, etc.
The OATH Toolkit makes it easy to build one-time password authentication systems. It contains shared libraries, commandline tools, and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC4226) and the time-based TOTP algorithm (RFC6238). OATH stands for Open AuTHentication, which is the organization which specifies the algorithms. For managing secret key files, the Portable Symmetric Key Container (PSKC) format described in RFC6030 is supported.