MachDB is machine database to catalog of the changing state of your hosts. It consists of a database, an aggregator, an XML spec, and some example information gathering scripts. Along with a Web UI, these form the basis of a system that will allow you to catalog the current and historical state of the hosts in your infrastructure. It has been designed with scale in mind, and the goal is to support 10k hosts. It is being actively developed and is used in production at a few organizations.
n2 is a client/server system for transmitting forensic snapshots from a number of hosts to a receiver node. This receiver collects statistics and is able to present an overview of the current and historical situation on a server. n2 provides a robust solution for real-time monitoring, optimizing performance, and analyzing crashes.
ChiMeRA is a configuration management tool designed around three basic concepts. The first is a framework for managing servers, allowing for command execution and file transfer over SSH. The second is a repository for managing files that enables change tracking, archiving, and management of various user definable configuration files across multiple servers through a standard revision control tool. The third concept is an aesthetic principle of simplicity, giving administrators straightforward interfaces to manage complicated environments.
Unhide.rb finds hidden processes on your system. It looks for active processes in many different ways. Processes found by some means but not others are considered to be "hidden", and are reported to the user. Unhide.rb is a Ruby rewrite of the original Unhide, which was written in C. Unhide.rb performs the same checks as the original, but is 10 times faster in only half as much code, and has better diagnostics when hidden processes are found.
Chef is a systems integration framework, built to bring the benefits of configuration management to your entire infrastructure. With Chef, you can manage your servers by writing code, not by running commands (via Cookbooks), integrate tightly with your applications, databases, LDAP directories, and more (via Libraries), and easily configure applications that require knowledge about your entire infrastructure ("What systems are running my application?" "What is the current master database server?").
agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.
tsf is a command line utility for creating timestamped copies of files. When invoked on a file, a copy of that file is created with a name made of the file name plus a timestamp. When invoked again on the same timestamp mark, a copy with a timestamp plus a sub-index is created, and so on. tsf provides an easy and quick way for creating timestamped copies of files before modifying them.
RHash is a utility for computing hash sums and creating magnet links. It supports CRC32, MD4, MD5, SHA1/SHA2, Tiger, TTH, Torrent BTIH, AICH, ED2K, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, WHIRLPOOL, and SNEFRU hash algorithms. Hash sums are used to ensure and verify the integrity of large volumes of data for long-term storage or transferral. RHash can calculate magnet links and EDonkey 2000 links. It can update existing hash files by adding sums of files missing in the hash file. It can output in a predefined (SFV, BSD-like) or user defined format. It can process directories recursively.