Showing 996 open source projects for "firewall"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    WhatWaf?

    WhatWaf?

    Detect and bypass web application firewalls and protection systems

    WhatWaf is an advanced firewall detection tool who's goal is to give you the idea of "There's a WAF?". WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hardened Linux is a secured and minimalized distribution based on Slackware. It is designed to run as firewall, IDS host, authentication system and VPN gateway. PaX and SSP is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An iptables based firewall for systems running the Linux 2.4 or later kernel. Very flexible configuration allows the firewall to be used in a wide variety of firewall/gateway/router and VPN environments.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    OWASP ModSecurity CRS

    OWASP ModSecurity CRS

    OWASP ModSecurity Core Rule Set (CRS) Project

    The OWASP ModSecurity Core Rule Set (CRS) is a curated, generic Web Application Firewall rule set that detects and blocks common attack categories across most web apps. It focuses on broad protection—SQL injection, cross-site scripting, local/remote file inclusion, command injection, and protocol violations—without requiring app-specific knowledge. Rules are organized into paranoia levels so operators can tune detection aggressiveness and balance false positives against coverage. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    HTTP Proxy Injector

    HTTP Proxy Injector

    Custom HTTP Proxy Header Injection Application

    HTTP Proxy Injector Custom HTTP Proxy Header Injection Application HTTP Proxy Injector is a simple but powerful tool to modify http proxy header requests and respons, to use with SSH or VPN on Windows OS. Access blocked websites behind firewall and many other functions. Free to use for everyone. Want to help HTTP Proxy Injector keep in existence and get better ? Please visit and share our Patreon, Google Sites or Facebook Page :) You can help HTTP Proxy Injector on or using : Patreon : https://www.patreon.com/httpproxyinjector KitaBisa : https://kitabisa.com/campaign/httpproxyinjector PayPal : https://paypal.me/co2thunderboy HTTP Proxy Injector support pages : Google Sites : https://hpi.co2thunderboy.net/ Facebook Page : https://www.facebook.com/co2thunderboy.net A-Developer1412 Page : https://www.facebook.com/A.Developer1412 Best Regards, co2thunderboy™ zone www.co2thunderboy.net
    Leader badge
    Downloads: 201 This Week
    Last Update:
    See Project
  • 6

    iptables_script

    Bash script to enable the firewall on startup of your Ubuntu server.

    iptables_script Bash script to enable the firewall on startup of your Ubuntu server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    debian10autoconfig

    A set of scrips for interactive Debian 10 configuration

    This is a set of scripts to make clear Debian 10 install a well equipped and protected computer class machine. Scripts provide: - easy network configuring and protection (ip, static arp entries, firewall rules, etc) - easy GRUB protection - interactive one button software installations - configuring DE and providing settings restorations and directory cleaning - automatic shutting down at night and much more Of course you may use not the whole script set, but only needed scripts. All set is written for Debian 10 and tested on it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    blocklist

    blocklists for openbsd,freebsd,linux,iptables,bsd pf,pf,ipfilter

    blocklists for openbsd,freebsd,linux,iptables,bsd pf,pf,ipfilter,pfsense,opnsense
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Spot-On
    Seriously entertaining dolphins on echo networks. The official source repository is located at https://github.com/textbrowser/spot-on. Downloads are located at https://github.com/textbrowser/spot-on/releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    ...If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was only accessible from the compromised machine. If the compromised host is behind a Firewall / NAT and isn't directly accessible from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on the compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessible from the compromised machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Veronica Security Suite

    The Veronica Security Suite

    Veronica Security Suite

    In 2007 I was greatly interested in using biometrics (fingerprints, etc.) to unlock my encrypted partition. After scouring the web searching for something that could accomplish this and finding nothing (even in 2017), my frustration had finally led me to start this project. Its my first cross-platform project and my first ever LINUX project. This project aims to provide a unique security layer for both Linux and Windows. It is written completely in C and aims to be simple and easily...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Maratona Linux Images

    Maratona Linux Images

    Imagens para o Maratona Linux

    Imagens de Instalação, Boot (pendrive) e VM do Maratona Linux
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OPNsense

    OPNsense

    OPNsense is an open source, easy to use firewall and routing platform

    OPNsense is an open source, easy to use and easy to build FreeBSD based firewall and routing platform. OPNsense includes most of the features available in expensive commercial firewalls, and more in many cases. Mission statement of the project: "Give users, developers and businesses a friendly, stable and transparent environment. Make OPNsense the most widely used open source security platform."
    Downloads: 65 This Week
    Last Update:
    See Project
  • 14

    lxcm

    Lightweight and secure container and firewall manager.

    Simplified container management system with shared compressed templates, backups, firewall management, and secure defaults.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Librefox

    Librefox

    Firefox with privacy enhancements

    ...Librefox uses more than 500 privacy/security/performance settings, patches, Librefox-Addons (optional) and a cleaned bundle of Firefox (updater, crashreporter and Firefox's integrated addons that don't respect privacy are removed). Updated browser: because this project is not a fork, it is kept updated with the latest Firefox version. Limit internet access for extensions (firewall-test-feature). IJWY (I Just Want You To Shut Up): embedded server links and other calling home functions are removed (zero unauthorized connection by default). Settings protection: important settings are enforced/locked within mozilla.cfg and policies.json, those settings cannot be changed by addons/updates/Firefox or unwanted/accidental manipulation; To change those settings you can easily do it by editing mozilla.cfg and policies.json.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    Vuurmuur
    Vuurmuur is a powerful firewall manager for Linux/iptables. Vuurmuur supports traffic shaping and live monitoring. It has an easy to learn configuration that allows both simple and complex configurations, and can be fully configured through the Ncurses GUI. Vuurmuur supports NAT, Port Forwarding and has IPv6 support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Free SOCKS proxy server for Linux, macos and FreeBSD
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    ipset_list

    ipset set listing wrapper script

    ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The result can be saved as shell script and in ipset save, or xml format.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Devil-Linux
    Devil-Linux is a special Linux distribution, which is used for Firewalls / Routers. The goal of Devil-Linux is to have a small, customizable and secure (what is secure in the internet?) Linux.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    ARP AntiSpoofer
    A utility for detecting and resisting BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is as well a handy helper for gateways which don't work well with ARP.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 22
    BEE-KEEN-OS

    BEE-KEEN-OS

    BEE KEEN OS

    Bee Keen OS - Arch KDE v18.12 Welcome to Bee Keen OS, a professional and user-friendly Linux distribution driven by a dedicated and hardworking community. This OS is based of Arch Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Pathephone

    Pathephone

    Distributed audio player

    ...You are free to share and listen vinyl quality music if you wish. Any music shared by others is available to you, any music shared by you is available to others. No regional limits, works even behind Great Chinese Firewall. There is no one in control, and no one will ever charge a fee. Bugfixes and new features are implemented online.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tiny Alien

    Tiny Alien

    Tiny Alien - Micro Serving on a Shoestring

    .... ;) This is not for the faint of heart as you will be required to understand shell commands throughout to get the best from this Tiny Alien platform. This is as minimal as it gets so please do not expect to see a firewall, user accounts, etc as they do not exist on this platform as they are simply not needed. Tiny Alien turns this on its head simply because the attack vectors found in regular systems do not exist here. Don't take my word for it, find out for yourself. Cheers. Alien
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB