'NTLM Authorization Proxy Server' (APS) is a proxy software that allows you to authenticate via an MS Proxy Server using the proprietary NTLM protocol. APS has the ability to behave as a standalone proxy server and authenticate HTTP clients at Web servers using the NTLM protocol. It can change arbitrary values in your client's request headers so that those requests will look like they were created by MS IE. It is written in Python 1.5.2.
Dr.Morena is a tool to confirm the rule configuration of a firewall. It inspects all the firewall rules that are currently in effect, and tests these rules by sending various kinds of test packets through the firewall. This allows you to confirm that the rules that you intend to be in effect are actually in effect.
Viralator enhances your network's squid proxy server with a virus scanner. Before a user can download a file, the proxy passes the file to the Viralator script which, in turn, uses a virus scanner to scan, disinfect, or delete the download. Future enhancements will include other types of antivirus scanners, speed improvements, and limiting downloads to approved users. Support has now been added for Inoculate AntiVir, AVP, RAV, McAfee, Trend, and Sophos antivirus scanners, password-protected sites, and filenames with spaces and special characters.
NetCallback is a Java application permitting the export of TCP and UDP ports behind a firewall to hosts outside the firewall. This may be useful in some special cases, for example, centralized control of test (demo) networks, or connection to applets running in browsers. NetCallback consists of a public and a private server. The public server executes on a host outside the firewall and is responsible for receiving port forwarding requests. The private server is run on a host behind the firewall and is responsible for contacting the public server and connecting the protected TCP and/or UDP service to the public server clients. The connection between public and private servers may optionally be encrypted using SSL.
TransConnect is an implementation of function interposing to allow users on *nix platforms to transparenly tunnel all networking applications over an HTTPS proxy. It has been extensively tested with telnet, SSH, fetchmail, IRC, whois, Pine, Netscape, Mozilla, Evolution, etc. over squid proxy.
SLIS is a TCP/IP gateway for schools. It provides advanced functions to students and teachers, such as a filtering proxy/cache, email addresses, access control, Web replication, Web mirroring, an intranet Web server with PHP and PostgreSQL, user management, DHCP, remote monitoring of a global set of SLIS servers, live update, etc. All of this is provided by an easy-to-use Web interface. All of the project is in French, but work is in progress to make it international.
Harm acts as a four-way socket redirector that allows you to effectively make a TCP connection from the Internet to a host behind a Linux masquerade-style firewall. The server (behind the firewall) makes connections to the client (on the Internet). After a successful connection, it will bounce packets from a telnet client (Windows and Linux) to the Harm client, to the Harm server (Linux only), or to the telnet daemon behind the firewall.