Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.
SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.
Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
DAXFi is a Python package that helps configure several different kinds of firewalls in a consistent way. The rules are described in XML. It comes with a Python package, useful to build other applications and includes some useful example programs.
Allows use of the same port for both a SSH server and SSL (https) server, without needing changes to clients. Incoming connections will be proxied to a SSH or SSL server depending on the protocol spoken by the client. Handy if your home box runs a secure
IpTables Extension and Kernel Modul ipt_PORTNETSCAN English Detection of PORTSCAN's, NETSCAN's and COMBINEDSCAN's using quotas. Deutsch: PORTSCAN, NETSCAN und COMBINEDSCAN Erkennung auf Basis von IpTables_Regeln. Für die Erkennung können verschieden
Q5 is a complete fully open linux based router / network appliance, including hardware. It supports up to four wireless minipci cards and two 10/100 Mbps NICs. The hardware is build around AMD's AU1500 MIPS processor, running at 264 MHz.
From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.
With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
really simple (minimal) implemention for client only igd from upnp, contains just enough to allow you to open/delete ports on a upnp router. uses libcurl, libxml2 and libxslt
Collection of open source security tools that enhance the ability of people and companies to secure their environment. These tools will build upon the foundation laid by the security community.
Enable Linux firewall to support connection tracking and NAT of H.323 protocol. It supports RAS, Fast Start, H.245 Tunnelling, Call Forwarding, Signal Proxy/Softswitch, RTP/RTCP and T.120 based audio, video, fax, chat, whiteboard, file transfer, etc.
ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.
When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
RTelnet is a reverse Telnet, it's increadably useful to get behind firewalls and NAT's or routers running ip masqurading.
very useful for remotely admin someones PC remotely when they don't know how to do anything like opening their firewall.
TRAP is a very innovative and advanced transparent proxy that verifies the integrity of your network communication. It offers a custom scripting language that allows the user full control over the decision making process.
pptp-proxy is a proxy for the Point-to-Point Tunneling Procotol. It handles multiple tunnels on a nat-box driven by pf. pptp-proxy relies on Niels Provos's libevent.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
l2tpknock is an add-on plugin for l2tpns servers or clusters and is intended to perform the rule of the port knocking idea, but with l2tp vpns, specifically, the l2tpns project.
A Port Knocking C-based server & client. Stealth mode by closed ports, strong encryption (ARC4 & BlowFish), Daemon mode, compresed sequence, MD5 digest log check, user passwords and user privelege system, action triggers... GPL license.
ip-session gets info of network trafic, such as sip, dip, sport, dport, etc. from linux kernel; gets account info of each traffic, such as in/out bytes/pkgs, etc.; else, gives session management function, such as query/del, etc.
brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
This is a Host based Intrusion Detection system, it consists of 4 components viz.Port scan detector,Policy Enforcer,Network Statistics,and Vulnerability detector. The backend programs are written in C, the front end is made using Qt Designer and Glade.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
TuxGuardian is an application-based firewall with a graphical interface. It's main task is to control and forbid transmission & reception of data by unauthorized applications; it can be thought as the Linux equivalent to apps such as ZoneAlarm and Kerio
CRYPT extension for Netfilter/Iptables allows you to create an encrypted communication using stream and block ciphers. It also authenticates the packets.