Unattended installation of several Linux(kickstart,preseed,autoyast) and Windows(2000,XP,2003,2003R2,Vista,7,8,2008,2012). Features: inventory, software management, dhcp-ldap, dns-ldap, php-ssh, syslog-ng, rsyslog, switch managment, ldap browser, pxe manager, central cron management, license management.
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
Turbulence is a general BEEP server that provides many site administration features. Turbulence is built on top of the Vortex library and is extensible through modules and allows you to implement server side profiles that are used and combined later with other profiles through run time configuration. Turbulence is written to make it easy to develop and deploy BEEP profiles, allowing developers to provide a convenient configuration interface to site administrators and end users.
Pen is a load balancer for "simple" TCP-based protocols such as HTTP or SMTP. It allows several servers to appear as one to the outside. It automatically detects servers that are down and distributes clients among the available servers. This gives high availability and scalable performance.
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
BACnet is an implementation of the BACnet (Building Automation and Control Networks) protocol specifically tailored for embedded systems. BACnet itself is a standard routable protocol designed to handle communications in automation in buildings, such as air conditioning systems and other HVAC equipment.
MIB Views is an entry-level SNMP management application providing an easy to use tabbed interface with several SNMP tools. The tools are based partly on those bundled in MIB Smithy, with a more consolidated GUI and new features. The suite includes MIB Browser (Tree View), SNMP Query, Table View, SNMP Walk, and Trap Watch tools, with more tools and plugin features in the works. MIB Views supports SNMPv1, SNMPv2c, and SNMPv3, with MD5 and SHA authentication and encryption with DES or AES.
MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
Vortex Library is an implementation of the RFC 3080 and RFC 3081 standard definitions, known as the BEEP Core protocol, implemented on top of the TCP/IP stack. It comes with complete XML-RPC over BEEP RFC 3529 support, complete support for the TUNNEL profile (which allows you to perform proxy operations for every BEEP profile developed), support for HTTP proxies, and more. The API is consistent, easy to use, and allows you to write application protocols very quickly. The API is designed to allow bindings for other languages to be built easily.