Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
pfck - pf check - organizes flow information by host
pfck is a perl script that reads the state table of pf and reports back flows based on a supplied port number. pfck is very handy in ddos attacks to identify who's hitting a host or network on a particular port service, and who they are specifically hitting.
This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
A lightweight, compact, stand-alone, platform-independent application to forward TCP (over IPv4 or IPv6) connections to another host. Possible uses include - but not limited to - firewall hacking, tunneling, proxying, fortifying ADSL, creating multi-plat
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
adcfw-log is a tool for analyzing firewall logs in order to extract meaningful information and generate different kinds of reports, such as fully formatted reports of what had been logged, with summaries by source or destination host, the type of service
TunnelTools is a set of perl scripts to allow anonymous rsync and CVS access from machines inside a firewall by tunneling over an ssh connection to a host outside the firewall.
Enable servers behind a firewall to export services to the external networks with the assistance from an externel host as proxy (Jumppoint). The firewall tunnel consists of two parts: a frontend as "Jumppoint" and a backend running behind the firewall
The screening http gateway is designed to run on a bastion host and allow access to "internal" web servers from the outside. It filters out various attacks and should prevent some epxloits (unicode is not allowed, so all unicode exploits will be stoppe
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
ipflow package is intended to help network administartors log, analyze account and monitor traffic in their routing domain or particular host. Both plaintext and syslog facilities will be used for that as well as MySQL support. There will be PHP web inter