Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
PRTG Network Monitor is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG Network Monitor optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more.
Highly scalable/configurable Messaging Platform allowing users in a domain to be distributed on multiple hosts, has multiple queues. Provides virtual domains/users in MySQL. Modern MSP class qmail replacement with ESMTP, POP3/IMAP, QMTP, QMQP support
PHP 404 pages to trap malicious web requests and report abusers
Catch bad visitors to your php website that are looking for admin access or exploitable web scripts, automatically lookup abuse information for their IP address and notify their network's administrators of their bad behavior. Most network operators provide abuse contact email addresses in their WHOIS information, and your webserver can immediately report malicious access attempts as they happen.
A large amount of bots that sniff around websites for unsecured standard web apps (like...
Is a simple utility written by Mark T. Vitt to grab ARIN IP Block information for admin research and security.
Its output includes basic WildCard, Netmask, and IP range information. Stores locally in MySql Table. Is currently being used by automated processes for research purposes.
Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses.
Refer to the following web sites for directly viewing training movies online.
http://yehg.net/lab/#training
http://core.yehg.net/lab/#training
Sign In App is a modern, enjoyable way to sign in visitors and staff, and book desks and meeting rooms.
Our visitor management system streamlines registration, check-in, and authorization processes, while our facility management tools streamline room booking, resource allocation, and asset management. We prioritize security with our advanced risk mitigation measures, including health and safety protocols, emergency messaging, and robust analytics for thorough auditing.
The project is supposed to be a helper tool for administrators in providing a centralized place to track your routes, view them on google maps, show abuse info, dns tracking, asn, blocklists etc'
This is an add-on for Firefox to report accusable content on websites anonymously to the INHOPE network member in germany. INHOPE in turn tries to notify the provider and let him takedown the criminal content, espacially child pornography.
This is a fork from PHProxy, which is no longer in development by its original creator. Private PHProxy adds user-level access control to prevent abuse by anonymous users.
TightURL is a templated, easily customizable PHP & MySQL based URL shortner / redirection service similar to TinyURL, Bit.ly, or SnipURL and produces short URLs. It includes extensive anti-abuse URI checks to protect against abuse.
PopServerInfo gives you an easy way to serve contact information to people how need to report abuse. They only need to know the ip address and then telnet to port 54. Fast and easy. It also holds latitude & longitude for the server.
Blackbox is an IRC Service which provides the following services preventing IRC Operator abuse, Anti Proxy System, Network Statistics and Web Based Management.
Another shoutbox for developers and users to include in their websites (with DB-backend) easily. It is hardened against SQL-injections and prevents abuse by using configurable buzzwords. As you have a CSS you may customize its appearance.
Protect bandwidth from abuse with bandwidth limiters and anti-leech token technology. Simple setup routine, Ready-to-go download display page. Does not use HTTP_REFERER or IP which can easily be spoofed or blocked. Includes a web-based Admin page.
Pix 6.3 Parser is a PERL-based utility for parsing the particular logging style of PIX OS 6.3 when you have object-groups tied to ACLs via access-groups. It outputs a detailed HTML page, an RSS feed and helps you compile and track network abuse reports.
Jaca - Java Against Code Abuse Project is a package with a set of files improving pages, classes and standard operations so you can copy, paste and edit them to avoid rebuild stuff that is already done. Save time !!!
Net Death is a hardware accelerated 2D multiplayer sidescroller in the spirit of Abuse, Soldat, and Stick Soldiers. Kee2D is the cross-platform engine, designed for polygons and "realistic" physics unlike traditional 2D engines which only use tiles.
NART (Net Abuse Reporting Tool) is a tool to gather information related to Net Abuse, create complaints, and forward those complaints to appropriate personnel.
yaspi is a POP3 mail-scanner that targets mailbox bombing originated by virusen.
It connects to the POP3 server and uses some heuristics to catch mails infected by Swen and similar virus. Then, it uses Ricochet to send abuse reports.
Mangler is a modularized network service management utility. Mangler is geared towards ISPs and large enterprise networks, providing data tracking and service management for Customers, IP adresses, DNS zones, and abuse incident tracking.
TLim (Transaction Limiter)
TLim is a patch that spam-hardens sendmail against both inbound and outbound abuse.
TLim counts the number of transactions an IP performs. Should the IP violate admin-defined limits, it is sanctioned via a null route.
WaterFall project was started as a proxy/filter/firewall solution for NNTP (Usenet News) abuse protection. Due to the similiarity, SMTP may be covered as time permits.