trackpeer is an agent that helps network and server administrators with tracking their users' computers. It makes it possible to determine the MAC addresses of computers over a network, even when the computers are behind NATed gateways. This agent is intended to be used by the administrators who need to identify and locate malicious computers and virus-infected computers in a network such as a middle-sized wireless LAN, public Ethernet jack system, campus, or corporate network.
tsocks provides transparent network access through a SOCKS version 4 or 5 proxy (usually on a firewall). tsocks intercepts the calls applications make to create TCP connections and determines if they can be directly accessed or need the SOCKS server. If they need the SOCKS server they connection is negotiated with the server transparently to the application. This allows existing applications to use SOCKS without recompilation or modification. tsocks is a wrapper library for the libc connect() call.
ttmap passively analyzes values of TCP Timestamps in captured IP packets. After collecting enough data, it computes characteristic remote machine parameters. These values let it guess remote operating systems and identify unique machines behind a single IP address. For example, it can analyze remote IP load-balanced clusters.
twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding.
twonz is a small Perl/TK program which lets you generate and manage the endless quantities of passwords you may need to get anything done online. Rather than making an encrypted database or anything, it just calculates a secure hash of obvious information appended to a user-supplied pad. So you only have to remember the pad, and none of your passwords are actually stored anywhere at all.
txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.