BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).
Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, and BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell, and implements tools like carwhisperer, BSS, L2CAP packet generator, L2CAP connection resetter, RFCOMM scanner, and greenplaque scanning mode (using more than one HCI device).
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
Bluelog is a Bluetooth site survey tool, designed to tell you how many discoverable devices there are in an area as quickly as possible. Bluelog differs from most Bluetooth scanners in that it prioritizes speed of reporting over anything else (i.e. it doesn't spend time trying to pull detailed data from a device) and doesn't require any user intervention to function. As the name implies, its primary function is to log discovered devices to file rather than to be used interactively. Bluelog could run on a system unattended for long periods of time to collect data. In addition to basic scanning, Bluelog also has a unique feature called "Bluelog Live", which puts results in a constantly updating Web page which you can serve with your HTTP daemon of choice.
Bob the Butcher is a distributed password cracker. It is built around a client/server system. Cracking speed scales linearly with the number of connected clients. It is designed for efficient cracking resource usage. It will handle many password files at once, aggregating passwords as much as possible.
Bombardier is a software system that delivers visibility, control, and automation to data center environments. Bombardier provides a means for changes to be rolled out to a network of Linux and Windows servers in a highly controlled way, providing optimum security, logging, and centralized change control.
Bork is a very small, cross-platform file encryption utility using a password-based RC4 algorithm. It is designed to be included in source code form along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies are designed to make it fairly futureproof.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.