RSS 82 projects tagged "Perl"

Download Website Updated 14 Apr 2014 fwknop

Screenshot
Pop 502.95
Vit 160.22

fwknop implements an authorization scheme called Single Packet Authorization that requires only a single encrypted packet to communicate various pieces of information, including desired access through an iptables, ipfw, or pf firewall policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap. Also supported is a robust port knocking implementation based around iptables log messages.

Download Website Updated 05 Apr 2014 CGIProxy

Screenshot
Pop 1,066.45
Vit 128.38

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. The user is kept as anonymous as possible from any servers. HTTP and FTP are supported, and optionally SSL. Common uses include censorship circumvention, VPN-like setups, anonymous proxies, personal proxies, and others. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, access restriction by server, encoded target URLs and cookies, configuration by end user, and much more (currently over 70 config options). Javascript and Flash are fully supported. Messages are in 12 languages so far. Can be installed as a CGI script, a mod_perl script, a FastCGI script, or with its own embedded secure HTTP server. An online demo is available.

Download No website Updated 05 Nov 2001 Firewall-1 Response

Screenshot
Pop 25.38
Vit 67.44

Firewall-1 Response is a Perl script for performing simple active responses based on 'trigger rules' in a Checkpoint Firewall-1. It is good for closing off your network against people who do port scans or network sweeps.

Download Website Updated 19 Jan 2002 LogHog

Screenshot
Pop 25.81
Vit 66.88

Loghog was designed to take a proactive stance on snort output. It supports multilog processing and is optimized for high volume traffic. It responds to events by conducting actions such as various forms of email notification and blocking via ipchains, iptables, or ipfw.

Download Website Updated 09 Nov 2003 Perl Advanced TCP Hijacking

Screenshot
Pop 35.33
Vit 64.46

Perl Advanced TCP Hijacking is a collection of tools for inspecting and hijacking network connections written in Perl. It consists of a packet generator, an RST daemon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool, and an automatic hijacking daemon for plain protocols, and features both GUI and terminal interfaces.

No download Website Updated 30 Jan 2006 Lokiwall

Screenshot
Pop 21.35
Vit 54.79

Lokiwall is a firewall script for Linux. In addition to the standard function of easily limiting network traffic, it features dual routing (using two Internet connections simultaniously), connection fail-over, load balancing, traffic control, advanced masquerading, advanced DNAT, and advanced marking (to direct specific traffic to a certain interface). The advanced features require some kernel patches. The standard features will work on a default Linux system with iptables and iproute2.

No download Website Updated 17 Oct 2006 Monolith mSuite

Screenshot
Pop 19.75
Vit 52.36

mSuite is a solution for enterprise-wide infrastructure management. This solution uses Monolith Event Manager (Event/Fault), Action Manager (E&N), and Reporter (Historical Reporting). Monolith integrates with a variety of availability and performance tools based upon a client's needs. mSuite can monitor syslogs, SNMP traps, and NT event logs.

No download Website Updated 03 Jan 2007 SpotSec Network Gateway

Screenshot
Pop 9.54
Vit 51.61

SpotSec Network Gateway is an all in one Linux firewall and gateway distribution that features a Web-based management console. It is designed to be a unified threat management system to protect and defend a network. Common features include intrusion detection and prevention and HTTP, SMTP, and POP3 proxies with content filtering and virus scanning. The design of the Web interface is centered around the definition of networks, services, users, and time events, which allows easier modification of packet filter rules.

No download Website Updated 19 Aug 2007 Swan

Screenshot
Pop 15.97
Vit 49.35

Swan is a bandwidth manager and Internet gateway that effectively controls and manages the collective bandwidth of an organization. As an Internet gateway it includes a transparent proxy, caching engine, access control lists, caching DNS server, logging and monitoring tools, an authentication mechanism, bandwidth clubbing, and policy management. It is ideal for ISPs, corporations, schools, colleges, etc. Both GUI and console-based interfaces are available for controlling the software. Installation is through a bootable CD that automatically formats the system.

Download Website Updated 05 Feb 2014 fwsnort

Screenshot
Pop 723.74
Vit 36.86

fwsnort translates snort rules into an equivalent iptables ruleset. By making use of the iptables string match module, fwsnort can detect application layer signatures which exist in many snort rules. fwsnort adds a --hex-string option to iptables, which allows snort rules that contain hex characters to be input directly into iptables rulesets without modification. In addition, fwsnort makes use of the IPTables::Parse Perl module in order to (optionally) restrict the snort rule translation to only those rules that specify traffic that could potentially be allowed through an existing iptables policy.

Screenshot

Project Spotlight

PHP Email address validation component

PHP class to verify if a e-mail address is valid.

Screenshot

Project Spotlight

JS-Collider

An event-driven Java network (NIO) framework.