RSS 26 projects tagged "Firewalls"

Download Website Updated 30 Jan 2001 ipmkchains

Pop 12.88
Vit 2.27

ipmkchains reads in a set of firewall rule files, computes the differences between those rules and the rules that are currently in use, and executes the necessary commands to make the rules in use match the rules from the file, using diff and ipchains.

No download Website Updated 11 Feb 2014 Zorp

Pop 309.59
Vit 32.23

Zorp is a proxy firewall suite with its core architecture is built around today's security demands: it uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.

Download Website Updated 27 Jan 2006 NTLM Authorization Proxy Server

Pop 217.40
Vit 5.20

'NTLM Authorization Proxy Server' (APS) is a proxy software that allows you to authenticate via an MS Proxy Server using the proprietary NTLM protocol. APS has the ability to behave as a standalone proxy server and authenticate HTTP clients at Web servers using the NTLM protocol. It can change arbitrary values in your client's request headers so that those requests will look like they were created by MS IE. It is written in Python 1.5.2.

Download Website Updated 31 Aug 2009 DAXFi

Pop 51.71
Vit 4.92

DAXFi is a Python script that helps configure several different kinds of firewalls in a consistent way. It can run as daemon to adapt its behavior to external conditions; rules can be described with XML files, XML strings, or generated directly by the code; the program can be configured and extended with a sort of plug-ins written in Python. It comes with a Python package, useful to build other applications aimed to manipulate different firewalls in a uniform way (some example programs are included).

Download Website Updated 18 Oct 2001 Actim

Pop 37.23
Vit 2.70

Actim allows you to send and retrieve files, and to call command line programs on a target machine via emails. The application can handle both synchronous and asynchronous requests with basic security features. It has both command line and graphical user interfaces. This can be useful if, for example, your home PC does not have any access to your office workstation which is behind the company firewall.

Download No website Updated 26 Jul 2001 Joseph

Pop 15.03
Vit 68.20

Joseph is a Python class and program that parses config files into iptables commands. It supports ACL definitions to reduce the repetition of rules. The config file format is a custom, native English-like format that supports internal, external, and DMZ interfaces with allowed, masqueraded, and redirected services (ports).

Download Website Updated 05 Oct 2001 iam - iptables accounting monster

Pop 42.20
Vit 1.00

iptables accounting monster (iam) is a traffic reporting tool for iptables. Currently it can generate daily reports in plain text and HTML format. It can also create summaries (month or year) of these daily reports.

Download Website Updated 21 Oct 2003

Pop 18.41
Vit 2.36

fauxident is a small Python script that will act as an extremely naive ident server, answering all ident requests with a consistent response (either ERROR or USERID). This can be advantageous on systems where running a true identd is unavailable, where it would be would be a security risk, or when masquerading firewalls are in use, where multiple machines are involved behind the firewall and running a proper ident system is not an option.

No download Website Updated 16 Aug 2006 Packetflow Firewall Generator

Pop 22.91
Vit 1.72

PacketFlow Firewall Generator is an XML-based firewall generator. It takes an XML configuration file that defines the firewall policy and generates a list of iptables commands to implement this policy. It is primarily intended for use on dedicated firewalls, but it can be used in other scenarios. It makes dealing with many interfaces easy. PacketFlow works on the concept of interface "security levels." New connections are allowed to flow down hill from interfaces with a high security level to interfaces with a low security level. This approach tends to make rule sets much shorter, even with many interfaces. Access lists allow you to override the default behavior of the security levels. Access lists are defined between interfaces. There is also support for incoming, outgoing, and wildcard access lists. Wildcard access lists allow you to easily allow new connections to a particular service from any interface.

Download Website Updated 04 Nov 2003 TrafficWatch

Pop 36.18
Vit 1.00

TrafficWatch is a system for accounting Internet traffic in a residential college or school type of environment. It consists of a set of scripts and Web pages for accounting for each user's Internet usage by volume, and is currently capable of accounting for both Squid proxy traffic and direct IPv4 traffic.


Project Spotlight


A rules-based utility that notices files and perform actions on them.


Project Spotlight


A .NET library that provides domain business entities.