Create nested tunnels through HTTP proxies
Intelligently block brute-force attacks by aggregating system logs
UPS Information Gathering Tool
Java SSH API
Extract and Convert Juniper Firewall Policies to CSV
The GTK Remote Desktop Client
Automated NFS misconfiguration root obtainer
Recursive mapping/discovery of network devices via CDP/OSPF