Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Netflow analyzing tools :
JXColl - collector for Netflow (or XML specified) data
Analyzer - front-end application for providing an user interface and output (graphs, statistics, etc.)
multihomed is a perl script which can detect when your primary Internet uplink
goes down and switch to a backup uplink. It's smarter than many similar scripts: it continuosly ping
several hosts using both uplinks and elects the best one as primary.
Bounzor is a fully configurable TCP/UDP bouncer. It can also encapsulates and decapsulates TCP packets in UDP and vice-versa. Bounzors are consequently cascadables. Useful when a specific protocol is disabled in part of your network for exemple.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
marping (Multi-ARp-PING) is a (tiny) commandline utility for *nix operating
systems used to discover systems in local network and gather their
MAC addresses.
It's designed to perform rather massive scans very fast.
Minimal HTTP proxy written in Python. Mostly useful as debugging tool for HTTP traffic inspection. Asynchat-based, handles multiple connections in single thread.
phc -- proxy hunter customed -- for validation of free SOCKS 4/5 or HTTP proxies.
It is highly customed. Current first release 1.0 validate http proxies from a file with CONNECT or GET method bypass a basic auth http tunnel. Delay is recorded, too.
Systeminfo is a shell cript used to generate Your Linux System Informations on File System Information, System Routing Table, Disk Information and etc. Report generation based on text format and html format. Automation will be easy with web-server.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Bash script that uses iproute2 and shapecfg (shaper.o) to limit incoming and outgoing traffic on a linux router. Also haves option for supporting more than 100 shapers via kernel patch.
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
Automated script that continues to try all detected WLANs APs according to signal quality until it establishes a valid WWW/network connection verified by pinging a user-defined host. Also supports user-preferred APs, WEP keys, timeouts, blacklist & AP MAC
A program that relays a stream of JPGs (simulating video) from a client to a server, and then replicates bandwidth on the server end, making the JPGs available via HTTP. Used when incoming connections aren't possible, ie. wifi hotspots w/ webcam.
ZSRep (Zaurus Synchronization Repository) is a project whose main goal is to provide a professional cross-platform solution for synchronizing one's Sharp Zaurus with any Desktop PIM software on the Linux or Mac OS X operating system.
A simple port-relaying program written in Java; sits on specified ports for either TCP or UDP, re-sends packets to the given IP. Doesn't forward packets, actually receives and re-sends them. Could be handy to learn Java Sockets/networking. Public Domain.
netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
A replacement firmware distribution for the 3com 3CRADSL72 a.k.a 3com wireless 11g (distributed by Ya.com) and its identical twin, the SMC7804WBRA, with an ucLinux kernel based system and associated system tools.
Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
PacLang is a language for programming Network Processors. It aims to make it easy to write high performance networking applications that are portable across a range of target platforms.
A dynamic Firewall (using the iptables netfilter) which can alter its is rules on detection of certain attacks/events. Very easily modified and expendable, with mySQL back-end and dynamically loaded user-space filters.
Simplified object-oriented Python extension module for the ethreal's WireTap library. You can use this module to read any format of the captured file which supported by ethreal, like libpcap, tcpdump, etc.
A java based network and firewall simulator that allows users to set and test the effectiveness of firewall rules using either a commandline interface or graphical user interface.