RSS 25 projects tagged "Proxy"

Download Website Updated 28 Mar 2012 Astaro Security Gateway

Screenshot
Pop 1,382.62
Vit 34.41

Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.

No download Website Updated 27 May 2009 https2socks5

Screenshot
Pop 31.62
Vit 42.29

https2socks5 enables you to transparently proxy HTTPS traffic through a SOCKS 5 proxy server (e.g. Tor). It functions like a man in the middle.

No download Website Updated 30 May 2009 Birch Tunnel

Screenshot
Pop 33.08
Vit 42.26

Birch is a simple proxy or tunnel application with a filter mechanism for line based application protocols built on TCP. Initially it was written to add encryption in a transparent way to the IRC protocol but as the encryption mechanism is implemented in a modular way, it is not restricted to just supporting encryption. Filters can be supplied via Java's Service Provider mechanism. A CLI and a GUI are available.

Download No website Updated 01 Sep 2009 sshh

Screenshot
Pop 36.46
Vit 41.15

sshh is a set of two daemons that allows you to maintain a TCP connection if all you have available is an HTTP proxy. It is similar in functionality to httptunnel, but has a few more features. Once you have it set up, sshh will allow you to make connections forward through the proxy or backwards through it, so you can open connections in either direction.

Download Website Updated 08 Oct 2011 Mireka

Screenshot
Pop 66.14
Vit 2.99

Mireka is a mail server with SMTP, Mail Submission, and POP3 services. It can also be used as an SMTP proxy. As a proxy, it can help to prevent or diagnose mail problems, like outgoing backscatter spam. It provides detailed logging, basic mail traffic statistics, tarpit to prevent email harvesting, and loop detection. It can filter email by DNSBL, SPF, mail size, local domains, and recipients list. Local recipients can be specified using regular expressions. TLS is supported for incoming connections. Aliases, forward lists, and very simple mailing lists can be configured in XML. Custom filters and other components can be written in Java, and they can be easily implemented and installed.

No download Website Updated 04 Dec 2009 FWPTT

Screenshot
Pop 19.75
Vit 39.98

FWPTT (Fast Web Performance Test Tool) is a Web application for load testing Web applications. It can record normal and AJAX requests. It has been tested on ASP.NET applications, but it should work with JSP, PHP, or other technologies.

No download Website Updated 17 Apr 2010 gpgdecrypter

Screenshot
Pop 30.92
Vit 38.26

gpgdecrypter is a server which acts as an SMTP proxy to do automatic decryption of incoming GnuPG encrypted mail messages if the private key is available. Usage is intended as a proxy for Postfix. It uses gpg to decrypt mail messages and supports PGP/MIME and PGP/INLINE.

No download No website Updated 31 May 2010 squid_multi_ldap

Screenshot
Pop 14.63
Vit 37.69

squid_multi_ldap is a Squid LDAP auth helper that supports several LDAP servers. If you have more than one LDAP server, each with a different set of users, squid_multi_ldap authenticates the users agaisnt the right LDAP server based on a username suffix.

Download No website Updated 09 Feb 2013 amms

Screenshot
Pop 30.94
Vit 3.01

Amms is a high-performance traffic accounting system for SQUID.

Download No website Updated 10 Apr 2014 OWASP Zed Attack Proxy

Screenshot
Pop 384.12
Vit 45.36

OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Screenshot

Project Spotlight

Echofish

Log monitoring made easy.

Screenshot

Project Spotlight

SHA_HTTP_Auth

A Mod_Perl HTTP Authentication module using salted SHA2.