Who is jiggling the door of your SMC Barricade firewall? This
script will connect to one of those devices via the web interface,
authenticate, grab the event log and then re-write the output as a
simple HTML table.
1.68MB floppy using the 2.4.6 kernel which includes IPTABLES. Most if not all packages in this dist are out of date. I would recommend using LEAF at http://leaf-project.org/ which is more up to date.
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Actim is an application written in python that allows sending/receiving files and calling command lines via email. (under GPL license)
For example, if your home PC does not have any access to your office workstation which is behind the company firewall.
The PHP firewall generator is a simple PHP script that generates a firewall script for iptables based firewalls. Note that release 1.0 is for ipchains, and release 2.0 is for iptables.
YAFT is a frontend for iptables in the new linux 2.4.x kernels. It's purpose is to provide a more structured interface to the iptables firewalling system making it simpler for the firewall manager to add and remove rules. (And yes, it has man pages)
MRTA is the complete package for network traffic accounting across themultiple routers and clients.
It allows you to manage firewall accounting rules remotely and provides various traffic accounting reports
There are some scripts for cool firewall tune, based on ipchains and iptables. Scripts based on macro language m4. It allow you create firewall any difficult and net topology. It allow many firewall groups, hierarchy chain structure, dynamic rpc configur
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
PySocks - a platform independent SOCKS proxy written in Python
Do you share an DSL or cable connection between several computers? With PySocks you'll be able to use all features of ICQ, MIRC, Napster and such again!
jennifer is an educational (albiet oddly named) firewall/NAT script generator, written in python, targetted at linux+iptables systems. It is intended to both (a) generate practical and useful configurations, and (b) demonstrate the concepts involved in TO
macf is a MAC-based packet filter. It can be on a machine acting as a firewall, router, bridge, or even a server, and allows operators to "check out" MACs which may then be used for a period of time. Right now, it's on hold for lack of interest.
ADSL4Linux is a program to connect your Linux box via ADSL to the internet in as few steps as possible. This is all done in the easiest possible way.
Also contains two Firewalls (ipchains and iptables).
The RTSP Proxy Kit contains source code for a reference implementation of an
application-level RTSP proxy server for UNIX and Windows environments. The kit
provides all of the basic functionality for an RTSP proxy.
IPChains Logger aims at providing an useful utility to track bandwidth usage from workstations behind a firewall.
It works well for masqueraded machines.
Dave's Naughty Stuff Blocker. This is an open source solution to allow administrators to filter and redirect selected "inappropriate" sites based on a list of specific sites and/or strings.
LnxFire is a Linux & Gnome firewall tool for the small business owner. Use the firewall creation wizard to quickly create a basic firewall. Featuring dynamic rule modifiers, proactive monitoring, reporting, email alerts and auto lockout of port scanners.
Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.