arpon|2.7|A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.|http://arpon.sourceforge.net/
artillery|163.e9ef627|A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.|https://www.trustedsec.com/downloads/artillery/
chkrootkit|0.50|Checks for rootkits on a system|http://www.chkrootkit.org/
inetsim|1.2.5|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.|http://www.inetsim.org
jhead|3.00|EXIF JPEG info parser and thumbnail remover|http://www.sentex.net/~mwandel/jhead/
malmon|0.3|Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.|http://sourceforge.net/projects/malmon/
mat|0.6.1|Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.|https://mat.boum.org/
portspoof|100.70b6bf2|This program's primary goal is to enhance OS security through a set of new techniques.|http://portspoof.org/
sniffjoke|0.4.1|Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.|http://www.delirandom.net/sniffjoke/
tor-autocircuit|0.2|Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.|http://www.thesprawl.org/projects/tor-autocircuit/