widentd is a small ident/RFC1413 deamon which provides a fixed (and fake)
auth reply, regardless of the IP/port pair quoted.
It's intended use is on firewalls, and NAT machines - where you may
want to simply syphon off auth-requests from, for example, IRC servers.
Author: Dirk-Willem van Gulik / dirkx@webweaving.org
A simple tool to convert packet captures in 802.11 format to Ethernet format.
Lots of tools can only understand Ethernet link types, so I wrote this
tool to convert captures to a format that they can understand.
Note that this tool is really only useful for encrypted traffic.
Specify a wireless packet capture as an input file, and the name of the
desired Ethernet-format output file. Wlan2eth will only convert data frames
to the output file, which will likely result in a significantly smaller output
packet capture file. Note that wlan2eth will only convert unencrypted frames.
A multiping hostchecker dockapp.
Take a look at the README for further details.
A DockApp that shows the state of a wireless network device.
OpenPGM is an open source implementation of the Pragmatic General Multicast
(PGM) specification in RFC 3208 available at www.ietf.org. PGM is a reliable
and scalable multicast protocol that enables receivers to detect loss, request
retransmission of lost data, or notify an application of unrecoverable loss.
PGM is a receiver-reliable protocol, which means the receiver is responsible
for ensuring all data is received, absolving the sender of reception
responsibility. PGM runs over a best effort datagram service, currently OpenPGM
uses IP multicast but could be implemented above switched fabrics such as
InfiniBand.
PGM is appropriate for applications that require duplicate-free multicast data
delivery from multiple sources to multiple receivers. PGM does not support
acknowledged delivery, nor does it guarantee ordering of packets from multiple
senders.
PGM is primarly used on internal networks to help integrate disparate systems
through a common communication platform. A lack of IPv4 multicast-enabled
infrastructure leads to limited capability for internet applications, IPv6
promotes multicast to be a part of the core functionality of IP but may still
be disabled on core routers. Support of Source-Specific Multicast (SSM) allows
for improved WAN deployment by allowing end-point router filtering of unwanted
source traffic
nDPI is a ntop-maintained superset of the popular OpenDPI library. Its goal is
to extend the original library by adding new protocols that are otherwise
available only on the paid version of OpenDPI. Furthermore, we have modified
nDPI do be more suitable for traffic monitoring applications, by disabling
specific features that slow down the DPI engine while being them un-necessary
for network traffic monitoring.
Xrdesktop2 is a GTK2-Perl frontend for Rdesktop, which allows for the
saving, and editing of session configurations.
Xrdesktop2's intent is to handle Rdesktop's available commandline options,
by presenting them in a [Perl/GTK2] GUI. Xrdesktop2 currently handles most
any of the options you're likely to be interested in. Future versions will
undoubtedly add more.
YAPH - Yet Another Proxy Hunter
Yaph provides the ability to reveal public proxy servers.
tcpstat reports certain network interface statistics (such as
bandwidth) much like vmstat does for system statistics. It gets its
information by either monitoring a specific interface, or by reading
previously-saved tcpdump data from a file. It has been tested under
Linux, Solaris, FreeBSD, NetBSD, and BSD/OS.
More and more people are posting binary files to usenet these days.
Because of limitations in the type data that usenet can accommodate,
binaries must be encoded into text, and because binary files are
commonly very large relative to text files usenet was designed to
handle, they frequently must be broken up into pieces.
aub, which stands for "assemble usenet binaries", automates the
reassembly process for you. aub determines whether or not any new
binaries have appeared in selected newsgroups since the last time it was
run, and if so, retrieves, organizes and decodes them, depositing them
in a configurable location. This process requires no human intervention
once aub has been configured. aub also keeps track of binaries which it
has seen some, but not all, of the pieces of. It remembers how to find
these old pieces, so that when new, previously missing pieces arrive at
your site, it will build the entire binary the next time it is run. It
also remembers which binaries it has already seen all of the pieces of
already, so that it does not waste time rebuilding the same binaries
over and over again.
run: ``aub -M | more'' for the long form documentation, or
``aub -m | more'' for the short form.