IBM's TPM 2.0 TSS
Network Load Balancer and Application Security
Intelligently block brute-force attacks by aggregating system logs
KeePass Command Line Interface
Probably the most modern and sophisticated insecure web application
AWStats Log Analyzer
Passive & Aggressive WiFi attack distro
Implementation of the EDIINT AS2 protocol (RFC 4130)
A network security analysis and monitoring toolkit Linux distribution.
edit and replay captured network traffic
Wapiti is a web-application vulnerability scanner
Implementation of the OFTP2 protocol (RFC 5024)
Full-featured enterprise network management tool
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
PGP graphical user interface
AS2 1.1 server implementation in Java
For full, incremental, compressed and encrypted backups or archives