360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
KeyOS is an integrated IT management platform compliant with the principles behind ISO 20000. Easily expandable through a plugins system, it provides a wide set of management consoles and dashboards, and interoperability with other tools used by system administrators. It provides a Windows and Linux agent to provide inventory and monitoring of hardware assets, a Centreon-Nagios connector, monitoring for anti-virus and backup programs, remote assistance, a help-desk and ticketing system with request routing, escalation, and SLA management, VoIP integration, automated translation, time-sheets, and intervention reports, and more.
Inguma is a penetration testing and vulnerability research toolkit. The framework includes modules that discover hosts, gather information, fuzz targets, brute force user names and passwords and attempt exploits. While the current exploitation capabilities are limited, the program provides numerous tools for information gathering and target auditing.
CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.
ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.
Phuzby will let you search your organisation's LDAP directory (such as Active Diretory, Novell eDirectory, or OpenLDAP) for the contact details of colleagues, customers, or suppliers. Phuzby can display a photo for each person, and can even read the telephone number out loud to help you dial it correctly. In fact, if your phone system supports TDMF tones, you can hold your handset near you PC's speaker and phuzby will dial the number for you.
n2n (network-to-network) is a layer-two peer-to-peer virtual private network (VPN) that allows users to exploit features typical of P2P applications at network instead of application level. This means that users can gain native IP visibility (e.g. two PCs belonging to the same n2n network can ping each other) and be reachable with the same network IP address regardless of the network where they currently belong.