Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.
Birch is a simple proxy or tunnel application with a filter mechanism for line based application protocols built on TCP. Initially it was written to add encryption in a transparent way to the IRC protocol but as the encryption mechanism is implemented in a modular way, it is not restricted to just supporting encryption. Filters can be supplied via Java's Service Provider mechanism. A CLI and a GUI are available.
sshh is a set of two daemons that allows you to maintain a TCP connection if all you have available is an HTTP proxy. It is similar in functionality to httptunnel, but has a few more features. Once you have it set up, sshh will allow you to make connections forward through the proxy or backwards through it, so you can open connections in either direction.
Mireka is a mail server with SMTP, Mail Submission, and POP3 services. It can also be used as an SMTP proxy. As a proxy, it can help to prevent or diagnose mail problems, like outgoing backscatter spam. It provides detailed logging, basic mail traffic statistics, tarpit to prevent email harvesting, and loop detection. It can filter email by DNSBL, SPF, mail size, local domains, and recipients list. Local recipients can be specified using regular expressions. TLS is supported for incoming connections. Aliases, forward lists, and very simple mailing lists can be configured in XML. Custom filters and other components can be written in Java, and they can be easily implemented and installed.
OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.