Showing 13 open source projects for "MCT Version Control"

View related business solutions
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    simplewall

    simplewall

    Simple tool to configure Windows Filtering Platform (WFP)

    simplewall is an open-source Windows application that provides a user-friendly firewall control interface powered by Windows Filtering Platform (WFP), enabling users to block or allow outgoing and incoming network connections without diving into complex OS settings or command-line tools. The app presents a clean, intuitive UI where users can define rules based on process names, IP addresses, ports, and protocols, making it possible to restrict apps from accessing the internet or control...
    Downloads: 58 This Week
    Last Update:
    See Project
  • 2
    FireHOL

    FireHOL

    A firewall for humans.

    FireHOL is a language (and a program to run it) that builds secure, stateful firewalls from easy-to-understand, human-readable configurations. The configurations stay readable even for very complex setups. FireQOS is a program that sets up traffic shaping from an easy-to-understand and flexible configuration file. Both programs abstract away the differences between IPv4 and IPv6. so you can concentrate on the rules you want. You can apply rules for IPv4 or IPv6, or both, as you need.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Netdeep Secure Firewall

    Netdeep Secure Firewall

    Next Generation Open Source Firewall

    Netdeep Secure is a Linux distribution with focus on network security. Is a Next Generation Open Source Firewall, which provides virtually all perimeter security features that your company may need. It offers Web content filters, ensuring better performance of the network, allowing users to use the service efficiently and securely, providing a deep control of the use of the Web access service, blocking access to unwanted websites, Virus, Spam, Applications and intrusion attempts. Its...
    Leader badge
    Downloads: 18 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    GEMS IoT

    IoT Device, Gateway, Server platform

    Bi-directional Wireless Sensor Line Protocol(Bi-WSLP) is a sensor network communication protocol based on a line topology, which is common in outdoor monitoring cases for IoT(Internet of Things). Bi-WSLP runs fast and provides a response rapidly, yet it takes a small code size occupies small memory. Bi-WSLP can be easily ported to various hardware platforms because it is coded in C, which is the most popular programming language for embedded systems. In addition, Bi-WSLP allows transmission...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Crowd Control is an small, cross-platform HTTP proxy (a fork of the elhttp project) designed for systems with little RAM, such as a home router. It can filter URLs using SquidGuard blocklists, and has the unique ability to filter HTTPS domains as well.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    TunnelTools is a set of perl scripts to allow anonymous rsync and CVS access from machines inside a firewall by tunneling over an ssh connection to a host outside the firewall.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    CallingHome is a small tool that allows you to gain control over a firewalled and thus directly unreachable PC (e.g. your PC at work). It achieves this by actively maintaining a SSH connection from within the firewall to a SSH server of your choice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Internet Control Firewall Intrusion Detection and Logger for Inbound and Outbound Traffic. Watches Files and Directories, Drive and Memory Protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB