7 projects tagged "Firewalls"

Download Website Updated 05 Apr 2014 CGIProxy

Screenshot
Pop 926.64
Vit 66.45

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. The user is kept as anonymous as possible from any servers. HTTP and FTP are supported, and optionally SSL. Common uses include censorship circumvention, VPN-like setups, anonymous proxies, personal proxies, and others. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, access restriction by server, encoded target URLs and cookies, configuration by end user, and much more (currently over 70 config options). Javascript and Flash are fully supported. Messages are in 12 languages so far. Can be installed as a CGI script, a mod_perl script, a FastCGI script, or with its own embedded secure HTTP server. An online demo is available.

Download Website Updated 29 Jan 2011 Nmap Security Scanner

Screenshot
Pop 968.49
Vit 19.29

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

Download Website Updated 28 Jan 2009 AnomicFTPD

Screenshot
Pop 30.85
Vit 1.93

AnomicFTPD is an RFC959-compliant FTP server with OS- independent user and group management. Active and passive modes, non-root mode, and anonymous and/or read-only modes are supported. A built-in client IP filter acts as a firewall and provides additional access limitation. The server has no online interface; attributes, groups, and user accounts are configured through text files. The protocol/ format-unspecified LIST command produces output that is compatible with most FTP clients, including common Web browsers in FTP mode.

Download Website Updated 10 Jan 2007 Host Identity Protocol on Linux

Screenshot
Pop 29.70
Vit 1.47

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.

Download Website Updated 05 Dec 2010 Hyenae

Screenshot
Pop 113.84
Vit 4.46

Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.

Download No website Updated 25 Apr 2012 AppGate Security Server

Screenshot
Pop 39.87
Vit 2.75

AppGate Security Server is an access control gateway for secure access to resources such as TCP ports, network ranges, Web pages, file shares, and remote desktops. Users connect with the cross-platform AppGate client (or any standard SSH client) and the server has a detailed configuration that says which users gain access to what under which circumstances. AppGate Free Edition is a virtual appliance running in a VMWare image and is limited to a maximum of 10 concurrent users.

Download No website Updated 17 Nov 2013 360-FAAR Firewall Analysis Audit and Repair

Screenshot
Pop 208.77
Vit 10.05

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.

Screenshot

Project Spotlight

WSN Guest

A PHP/MySQL guestbook script.

Screenshot

Project Spotlight

Character Recognition

A simple OCR application for Android.