WormTrack is a network IDS that allows detection of scanning worms on a LAN by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network without having privileged access on a switch to set up a dedicated monitor port. It does not require constant updating of the rules engine to address new threats.
Network Inventory Lookup Assistant (NILA) is a combination network inventory database and lookup tool. It is designed to be compact and easily extensible to provide a custom solution for your network. The backend is a Perl CGI script which processes requests and returns output. It uses a SQL server for its storage and retrieval. The frontend is a Perl script which queries the HTTP backend and returns results. It is intended to be simple enough that you can take full advantage of its querying and updating abilities from a console or shell script.
SpurTracer is a push-notification based monitoring solution for heterogenous loosely coupled IT infrastructures. It complements a service-endpoint monitoring solution like Nagios with a component-level interface auto-discovery. It automatically provides a certain level of functional tracing along with many non-functional measurements (e.g. call, error and timeout rates, interface latency, component execution, etc.). While being zero config itself, SpurTracer relies on you adding push notification support to the components you want to monitor. The best way to use SpurTracer is by adding punctual tracing to components in your infrastructure on-demand.
Arandomd is a network daemon that provides statistically tested output from a single ARC4 stream cipher generator to anyone able to connect to its listening TCP port. As multiple consumers cause it to reseed itself from a separate, strong random source, it is expected to produce consistently unpredictable results for cryptographic purposes. A configurable number of tests from the Statistical Test Suite for Random and Pseudorandom Number Generators must be passed before output data is sent to the client. It may be be useful in low-entropy environments, such as compute clouds, for generating high quality key material for strong cryptography.