C2 framework used to aid red teamers with post-exploitation
edit and replay captured network traffic
ICS Sensor Traffic Simulator
Free UTM appliance: firewall, VPN, WAF and antivirus in one ISO.
SKUDONET Open Source Load Balancer and Web Application Firewall
Klotsky class block slider puzzles.
OpenWrt Firewall CLI management tool
AS2 1.1 server implementation in Java
AI and semantic technology Web Application Firewall
Next Generation Open Source Firewall
INVISIX.IO - Corporate-grade privacy solution, out of the box.
Network Enumeration Tool for Host Exploration and Recon
Powerful framework for rogue access point attack
CIDRAM: Classless Inter-Domain Routing Access Manager.
Metlo is an open-source API security platform
Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic
Privaxy is the next generation tracker and advertisement blocker
Tranalyzer flow generator packet analyzer moved to: tranalyzer.com
A C2 post-exploitation framework
3D Network Traffic Visualisation
Lightweight, high-performance, powerful intranet penetration proxy
Extension that allows you to intercept and edit HTTP/HTTPS requests
A post exploitation framework designed to operate covertly