John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.
Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.
NetXMS is a network monitoring and management system with a modular architecture. It can be used for monitoring an entire IT infrastructure, starting with SNMP-capable hardware (like switches and routers) and ending with applications on servers. The system has a three-tier architecture; the information is collected by monitoring agents (either its own agents or SNMP agents) and delivered to the monitoring server for processing and storing, where it can be accessed by using the management console. It features centralized configuration and centralized agent upgrades.
ControlTier is a set of tools and an automation framework for deploying and managing multi-tier Web applications (or any application stack). It orchestrates the deployment and updating of code, data, and content across multiple physical, virtual, or cloud-based servers or clusters. Multiple tools include a command dispatching framework, a self-service Web interface, a multi-purpose CMBD/inventory tool, and a reporting infrastructure. Tools can be used individually or as an integrated system for large scale use.
Zenoss is an enterprise network/systems management application that provides an integrated software package for monitoring availability, performance, events, and configuration across layers (network, servers, applications, environment, etc.) and across platforms (Linux, Windows, Unix, etc.).
fetchconfig is a Perl script for retrieving configuration of multiple devices. It has been tested under Linux and Windows, and currently supports a variety of devices, including Cisco IOS, Cisco Catalyst, Cisco ASA, Cisco PIX, FortiGate Firewalls, ProCurve, Alcatel Ethernet Routers (aka Riverstone), Dell PowerConnect Switches, Terayon 3200/3500 CMTS, Datacom DmSwitch Switches, HP MSR Routers, Mikrotik Routers, Tellabs MSR Routers, Juniper EX Switch JunOS, Oracle Acme Packet, and Audiocodes Mediant.
Nagstamon is a Nagios status monitor with a UI that resides in the systray or as a floating statusbar on your desktop. It informs you in realtime about the status of your Nagios, Icinga, Opsview, Ninja, Check_MK/Multisite, Centreon, or Thruk-monitored network. It alerts you with sound and visual notification. Failed hosts and services are easy to connect with by SSH, RDP, and VNC. Custom actions can be run on certain events. It works best with GNOME, but also with KDE, Mac OS X, and Windows.
PowerBroker Identity Services is an application that joins Linux, Unix, and Mac OS machines to Microsoft Active Directory and securely authenticates users with their domain credentials. Features include: joining non-Windows systems to Active Directory domains in a single step from the command line or from a GUI; authenticating users with a single user name and password; enforcing the same password policies for all platforms; supporting multiple forests with one-way and two-way cross forest trusts; caching credentials in case your domain controller goes down; and providing single sign-on for SSH and Putty. It does not require Active Directory schema changes for installation.