Showing 25 open source projects for "windows router"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid Icon
    Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid

    Leverage the email service that customer-first brands trust for reliable inbox delivery at scale.

    Email is the backbone of your customer engagement. The Twilio SendGrid Email API is the email service trusted by developers and marketers for time-savings, scalability, and delivery expertise. Our flexible Email API and proprietary Mail Transfer Agent (MTA), intuitive console, powerful features, and email experts make it easy to ensure all your email gets delivered in seconds and without interruption.
  • 1
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    openWrt-snort

    openWrt-snort

    Image of OpenWrt OS, with snort community featured in.

    Image of OpenWrt OS, with snort community featured in, for Raspberry Pi 4/ 4B+ and 400, basically for Processor BCM2711. Installed Snort Community Model to Intrusion Detection system. Prevention system not installed. eth0 used as output/ LAN socket, to run internet and access router. eth1, which can be USB -> Ethernet port, is used as WAN port, to connect Pi board to Internet IP. to flash img file, you can restore in SD card, or use Balena Etcher to flash. or you can use DD commend...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    SIPVicious

    SIPVicious

    Security tools that can be used to audit SIP based VoIP systems

    ... using pip3 install sipvicious or follow the instructions for further options. Available on any platform that supports Python 3. Made a change to your phone system or SIP router? Test it automatically using SIPVicious OSS to perform a smoke test for security robustness. The next generation is SIPVicious PRO, a complete new code base and overhaul of the concepts found in SIPVicious OSS. As a toolset it includes more and targets RTC.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box. KeexyBox...
    Downloads: 14 This Week
    Last Update:
    See Project
  • Real Time Accounts Payable Automation. Icon
    Real Time Accounts Payable Automation.

    Invoice capture and automation seamlessly integrated with your accounting software

    Yooz provides the smartest, most powerful, and easiest-to-use cloud-based E-invoicing and Purchase-to-Pay automation solution. It delivers unmatched savings, speed, and security with affordable zero-risk subscriptions to more than 5,000 customers and 300,000 users worldwide.
  • 5
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    ...-based box or router to proxy all TCP traffic transparently, which is handy if you use an OpenWRT-powered router. Although shadowsocks-libev can handle thousands of concurrent connections nicely, we still recommend setting up your server's firewall rules to limit connections from each user. We strongly encourage you to install shadowsocks-libev from jessie-backports-sloppy.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    NetCutter

    NetCutter

    Control your Network by Disconnect/Connected Devices from your router

    NetCutter is a Powerful Program working on Wi-Fi,it Disconnect And Reconnect Connected Devices by Cutting ON/OFF Network from Choosen Interfaces and protect your network from hackers. NetCutter is Just For Windows now, Support the project for Android Port This Program is in Early Stages , So bugs will appear feel free to Contact us to fix it. Thanks. * Download Requirements To install this Program you need : - .NET Framework 4.0 or Higher - WinPcap 4.1.3 For WinXP...
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7
    waircut

    waircut

    WPS wireless protocol audit software for Windows

    Wireless Air Cut is a WPS wireless, portable and free network audit software for Ms Windows. It is used to check the security of our wps wireless networks and to detect possible security breaches. You can check if the router has a generic and known wps pin set, if it is vulnerable to a brute-force attack or is vulnerable to a Pixie-Dust attack. You can see the Installation instructions on Wiki. ------- Wireless Air Cut es un software de auditoria del protocolo WPS en redes wireless...
    Leader badge
    Downloads: 6,752 This Week
    Last Update:
    See Project
  • 8
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ... clients safely from a wireless network. Because these management packets are unencrypted, you just need the MAC to address of the Wi-Fi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range. With the 802.11w-2009 updated standards, management frames are encrypted by default.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 9
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options...
    Leader badge
    Downloads: 262 This Week
    Last Update:
    See Project
  • Component Content Management System for Software Documentation Icon
    Component Content Management System for Software Documentation

    Great tool for serious technical writers

    Paligo is an end-to-end Component Content Management System (CCMS) solution for technical documentation, policies and procedures, knowledge management, and more.
  • 10

    Networking Tools

    This Program Contains Many Useful Network Tools

    This programs contains the following programs: ------------------------------------------------------------------ 1-Wi-Fi Connector : Connects To Available Wi-Fi Network. 2-Router Password Cracker : To Crack Router's Gateway Password. 3-IP Trace : Trace The IP Address For Any Website. 4-IP Tracker : Gets Your WAN IP Address. 5-Lan Messenger : Chat Between Computers On Same LAN Network. 6-Email Sender : For Sending E-mails Using SMTP Server. 7-Email Viewer : For Receiving E-mails Using...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    The BRST - Border Router Security Tool is a web based utility for generating secure configuration files for Cisco routers in a border configuration. The administrator fills out a web form, clicks submit, and receives a router config file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Browser for Tor with Onion Router

    Browser for Tor with Onion Router

    Browser for Tor based on Dooble & Vidalia as integrated Addon

    Tor now plugs into the Browser. Dooble Web Browser, a secure open source userfriendly tool to explore the web secure over Tor. Steer Tor in the Browser (in Settings/Proxy/Tor) with an Add-On based on Vidalia. Just start the Add-On "Tor" in the Browser Add-On-Menu and in Settings/Proxy.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14
    romanHunter

    romanHunter

    ROuter MAN HUNTER detects wireless attackers and captures their MAC

    romanHunter (router man Hunter) is a wireless honeypot or closer to a sinkhole that will bait a cracker, capture the MAC address, reset the WIFI password (effectively destroying their connection) and wait for the next authorized connection. The password changes happen on a round robin basis from entries in the password file (pw_list.txt).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    UFOWardriving

    UFOWardriving

    UFO Wardriving è un software studiato per trovare le password wifi

    UFO Wardriving homepage: www.thc-scripting.it La versione per Windows è possibile trovarla nella homepage o su softonic UFO Wardriving è un software che contiene gli algoritmi di generazione della password dei router: *Alice *DLink *Fastweb *Huawei *Infostrada *Jazztel_ *WLAN_ *Speedtouch *Thomson *INFINITUM *Discus- *Discus-- *BBox *BTHomeHub *Otenet *Sapo *Dmax *Orange *Cyta *Privat *BigPond *Meo *O2Wireless *TeleTu...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 16
    SmartRouter Project
    SmartRouter Project A GNU/Linux Router, Firewall and Proxy Server
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    VPN MultiConnect

    VPN MultiConnect

    Generates VPN configuration files for some Routers/Clients

    'VPN MultiConnect' erstellt Konfigurationsdateien zur Einrichtung einer VPN-Verbindung zwischen Routern und verschiedenen Gegenstellen. Zur Zeit werden unterstützt: LANCOM Router, AVM Fritz!Box, Shrew VPN-Client. Weitere Informationen: siehe MediaWiki.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    Hyenae
    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge
    Downloads: 161 This Week
    Last Update:
    See Project
  • 19
    Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Cisco Router Rommon Password Recovery
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Frankenwall is a bash shell script intended to create a highly secure IPTables based linux firewall/router with QOS/traffic shaping/bandwidth management. Be certain you know EXACTLY what your network needs before using Frankenwall. Wimps need not apply.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Netpoison is a tool, written in perl, which can poison a whole network. It can trick the router into redirecting the traffic to a specific MAC address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next