INSERT (the Inside Security Rescue Toolkit) aims to be a multi-functional, multi-purpose disaster recovery and network analysis system. It boots from a credit card-sized CD-ROM and is basically a stripped-down version of Knoppix. It features good hardware detection, fluxbox, emelfm, links-hacked, ssh, tcpdump, nmap, chntpwd, and much more. It provides full read-write support for NTFS partitions (using ntfs-3g), and the ClamAV virus scanner (including a fairly recent signature database and a GUI). It provides partition handling with gParted and also has a network boot facility.
radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. At its core, radmind operates as a tripwire. It is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change. Each managed machine may have its own loadset composed of multiple, layered overloads. This allows, for example, the operating system to be described separately from applications. Loadsets are stored on a remote server. By updating a loadset on the server, changes can be pushed to managed machines.
PIKT is cross-categorical, multi-purpose software for monitoring and configuring computer systems, administering networks, organizing system security, and much more. PIKT is intended primarily for system monitoring, and secondarily for configuration management, but its versatility and extensibility evoke many other wide-ranging uses. PIKT consists of a sophisticated, feature-rich file preprocessor; an innovative scripting language with unique labor-saving features; a flexible, centrally directed process scheduler; a customizing file installer; a collection of powerful command-line extensions; and other useful tools.
DashO is a Java application obfuscator, optimizer, and packager. It performs a dependency analysis on the application, removing unused methods and fields. Classes and members can be renamed using the patented Overload-induction renaming algorithm. Byte code optimization, control flow obfuscation, and string encryption can also be selectively applied. Special features include analytics for Java/Android/RIM/J2ME including exception reporting, Android obfuscation and tamper protection, and JAR watermarking.
Advisory Check is a program that reads security advisories for you. It gathers security advisories using RSS, RDF, or XML feeds, compares them against the installed software, and alerts you if you're vulnerable. A wide variety of package managers can be queried to detect installed software. Remote systems can be monitored by using the integrated SSH, Windows-RPC, and Nmap support.
Gspoof is a GTK+ program written in the C language which makes it easier and more accurate to build and send TCP packets with or without a data-payload. It's possible to modify TCP/IP fields and also ethernet header working to Link Level. You can send one or more packets together. It runs also in "console mode" without X and so you can compile it without GTK+.