RSS 22 projects tagged "Firewalls"

No download No website Updated 22 Oct 2013 Trigger

Screenshot
Pop 25.55
Vit 13.28

Trigger is a robust network automation toolkit that was designed for interfacing with network devices and managing network configuration and security policy. It increases the speed and efficiency of managing large-scale networks while reducing the risk of human error.

Download Website Updated 02 Dec 2007 Proto Balance

Screenshot
Pop 22.78
Vit 1.00

Proto Balance is a load balancing and traffic management system that can handle up to 10,000 concurrent connections and 20,000 downloads per second. Proto Balance is a load balancer and TCP traffic port forwarder for high availability. It features an easy-to-use Web interface that requires minimal knowledge of networking and no command-line experience. Its target audience includes enterprise cluster providers, Internet service providers, and network administrators.

No download Website Updated 23 Mar 2014 sslh

Screenshot
Pop 406.88
Vit 35.89

sslh accepts connections in HTTP, HTTPS, SSH, OpenVPN, tinc, XMPP, or any other protocol that can be tested using a regular expression, on the same port. This makes it possible to connect to any of these servers on port 443 (e.g. from inside corporate firewalls, which almost never block port 443) while still serving HTTPS on that port. sslh supports IPv6, privilege dropping, transparent proxying, and much more.

Download Website Updated 20 Dec 2007 Path Analyzer Pro

Screenshot
Pop 32.94
Vit 2.42

Path Analyzer Pro integrates advanced traceroute software (based on the open-source tool LFT) with performance measurements, DNS, whois, and specialized network resolution to help investigate network issues. It also supports geolocation, and can plot network paths on a map. People use it to research IP addresses, email addresses, and network paths, to graph protocol latency, jitter, and other factors, and to locate firewalls and other filters that may be impacting your connections.

Download Website Updated 20 Feb 2007 AlmostVPNPRO

Screenshot
Pop 27.71
Vit 1.46

AlmostVPN is an SSH tunnel manager with a twist. It is packaged as a Preference Panel, so you do not have to use yet another application to configure your tunnels. Instead, it uses creative network configuration techniques to provide almost VPN-like access to remote services, so you can keep using real IP addresses and port numbers while accessing service on the other side of your tunnels. It provides a simple way to mount remote volumes, use remote printers and faxes, access iTunes, iPhoto, and almost any other Bonjour-based application, transfer and execute files, and more.

Download Website Updated 03 Sep 2006 yxorp

Screenshot
Pop 39.12
Vit 1.00

Yxorp is a reverse proxy for HTTP. All the fields in requests can be checked and modified by rules. Load balancing, virtual hosting, multiple TCP ports, and SSL are supported. The configuration can be modified on-line. Yxorp can be used to protect Web sites, place pages behind a login, rewrite URLs, etc.

Download Website Updated 20 Aug 2013 ike-scan

Screenshot
Pop 82.99
Vit 1.47

ike-scan discovers IPsec VPN servers, and can fingerprint them using UDP backoff and Vendor ID fingerprinting techniques. It supports IKE Main Mode and Aggressive Mode. ike-scan allows flexible specification of the outgoing IKE packet, and decodes the response packets. It also supports pre-shared key cracking for IKE aggressive mode with pre-shared key authentication.

Download Website Updated 15 Nov 2006 PBNJ

Screenshot
Pop 38.78
Vit 2.61

PBNJ is a network suite to monitor changes that occur on a network over time. It does this by checking for changes on the target machine(s), which includes the details about the services running on them as well as the service state. PBNJ parses the data from a scan and stores it in a database. It uses Nmap to perform scans.

Download Website Updated 06 May 2013 HTTPTunnel

Screenshot
Pop 216.37
Vit 13.15

HTTPTunnel is a simple client/server application for creating an HTTP tunnel between two machines, optionally via a Web proxy. This tunnel can then be used to wrap arbitrary TCP socket traffic in HTTP, thus allowing communications even through a restrictive firewall that only allows outgoing HTTP connections.

Download Website Updated 05 Sep 2005 The Doorman

Screenshot
Pop 62.26
Vit 2.61

The Doorman is a "port-knocking" listener daemon which helps users secure private servers. It allows a Linux or Unix server to run invisibly, with all TCP ports closed.

Screenshot

Project Spotlight

DRBL

A diskless or systemless environment for client machines.

Screenshot

Project Spotlight

LinOTP

A flexible one time password authentication system with pluggable OTP algorithms and userstorages.