RSS 86 projects tagged "GPLv2"

No download Website Updated 14 Apr 2014 nftables

Screenshot
Pop 245.56
Vit 10.09

nftables aims to replace the existing {ip,ip6,arp,eb}tables framework. It provides a new packet filtering framework, a new userspace utility, and a compatibility layer for {ip,ip6}tables. nftables is built upon the building blocks of the Netfilter infrastructure such as the existing hooks, the connection tracking system, the userspace queueing component, and the logging subsystem.

No download No website Updated 15 Dec 2013 SilverTunnel-NG

Screenshot
Pop 28.28
Vit 11.06

SilverTunnel-NG is a Java library that handles all the Tor connection work for easy integration into new or existing projects. You can connect to any server on the Internet anonymously; connect to a hidden service inside the Tor network; provide a hidden service; and more.

Download No website Updated 26 Jun 2013 ivepkg

Screenshot
Pop 27.87
Vit 17.16

ivepkg is a package manager with a focus on homebuilt distributions like Linux From Scratch. Therefore, ivepkg has no repository or network abilities, but is specialized on installing tarballs to a system. Its key features are an easy-to-use database (sqlite3) and a sha1 checksum of every installed file. These make it possible to know which files have been altered (for example, by a malicious attack).

Download Website Updated 23 Dec 2012 Username-Anarchy

Screenshot
Pop 16.55
Vit 21.91

Username-Anarchy is a commandline tool for the generation of usernames based on the users' real names. This is useful for user account/password brute force guessing and username enumeration when usernames are based on the users’ names. By attempting a few weak passwords across a large set of user accounts, user account lockout thresholds can be avoided. Common aliases (or self-chosen usernames) from forums are also included. Features include a plugin architecture, format string-style username formats, and substitutions. When only a first initial and lastname is known (LinkedIn lists users like this), it will attempt all possible first names, common first and last names from various countries (from Familypedia and PublicProfiler), and an exhaustive list of first and lastnames from Facebook. This also includes usernames scraped from forums, ordered by popularity.

Download Website Updated 06 Feb 2014 WAF-FLE

Screenshot
Pop 170.06
Vit 5.56

WAF-FLE is a console for ModSecurity. It allows modsec administrators to view and search events logged by mlogc or mlog2waffle. The dashboard shows a graphical view of events, and when combined with the powerful drill-down filter allows quick searching for relevant events. Events can be viewed in detail, whether sent by one or many sensors.

Download Website Updated 22 Sep 2012 WhoisUP

Screenshot
Pop 25.73
Vit 23.91

WhoisUP monitors hosts via ICMP and shows the status in a webpage. When a host is down, it can send mail, write a syslog message, open a popup message, or play a sound. It uses Nmap to check hosts continuously.

Download Website Updated 22 Apr 2012 Pyama

Screenshot
Pop 42.13
Vit 1.01

Pyama is a system and network monitoring application for desktop Linux users. It gives end users a broader view of what is happening on their systems. The basic idea is to give Linux users an application which can monitor systems like many commercial antivirus HIDS.

Download No website Updated 05 Feb 2012 sleepworker

Screenshot
Pop 44.18
Vit 2.22

sleepworker is a daemon that monitors your Unix machine for idle time. With the help of this daemon, you can execute commands or programs during idle time.

Download Website Updated 24 May 2011 MN Viewer

Screenshot
Pop 39.60
Vit 1.00

MN Viewer (Mobile Network Viewer) is a lightweight framework designed for system administrators who would like to be able to monitor many aspects of their network from their mobile phone. It allows for very simple expansion using simple PHP plugins. It is designed to integrate with other monitoring tools such as Cacti.

No download Website Updated 11 Mar 2011 Guardog

Screenshot
Pop 25.34
Vit 1.02

Guardog is a simple but powerful intrusion dectection system (IDS) that works by inspecting messages from log files, network packets, and other sources. It uses Perl regular expressions to check for any bad messages.

Screenshot

Project Spotlight

SQLObject

A object-relational mapper.

Screenshot

Project Spotlight

ZXTune

A portable cross-platform library and a set of applications for chiptunes playback.