Network Pivoting Toolkit
Hook into application processes and monitor network interactions
Framework for Man-In-The-Middle attacks
ICAP Daemon that implements content scanning
Multithreaded Proxy Enumeration Utility
Enumeration and automation of file discovery for your sec tools.
Perl Hacking Tools (BackTrack)
Provide users with a managed temporary access to arbitary FTP
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks