Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Bypass your ISP's firewalls and connect to the internet!
Source: https://github.com/AlizerUncaged/HTTP-Injector
respite is a SSH/openVPN client that allows you to connect to the internet with custom injected HTTP Proxy headers.
This application requires
Java (https://www.java.com/en/download/) and
.Net 4.5 (https://www.microsoft.com/en-ph/download/details.aspx?id=42642 .Net 4.5 is already preinstalled in Windows 10).
There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com
HTTP Proxy responses...
This is a simple Webinterface to ban or unban IPs with Fail2Ban. Written in PHP. Uses fail2ban-client operations on the local socket.
Questions? Contact me: steffen[at]simails.de
Update for Debian 13 Trixie and others running systemd:
To get the socket-permission fix working, do this:
1. systemctl edit fail2ban
[Service]
ExecStartPost=/bin/sh -c 'while [ !
A very simple to use java firewall testing tool. Ever wanted to verify that a TCP or UDP network path is actually open? This tool has both server and client modes so you can test network paths between any two computers that have the Jave JRE installed.
really simple (minimal) implemention for client only igd from upnp, contains just enough to allow you to open/delete ports on a upnp router. uses libcurl, libxml2 and libxslt
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.