AlienVault® Unified Security Management™ (USM™) is an innovative approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with everything they need for effective threat detection, incident response, and compliance management, in a single pane of glass.Advertisement
OSI-Approved Open Source (792)
- Academic Free License (1)
- Adaptive Public License (1)
- Affero GNU Public License (1)
- Apache License V2.0 (8)
- Apache Software License (2)
- Artistic License (5)
- Attribution Assurance License (1)
- BSD License (90)
- Common Development and Distribution License (2)
- Common Public License 1.0 (4)
- Eclipse Public License (1)
- GNU General Public License version 2.0 (604)
- GNU General Public License version 3.0 (46)
- GNU Library or Lesser General Public License version 2.0 (35)
- GNU Library or Lesser General Public License version 3.0 (8)
- Public Domain (24)
- Other License (13)
- Creative Commons Attribution License (8)
- Linux (744)
- Modern (549)
Grouping and Descriptive Categories (505)
- 32-bit MS Windows (95/98) (18)
- 32-bit MS Windows (NT/2000/XP) (46)
- 64-bit MS Windows (18)
- All 32-bit MS Windows (81)
- All BSD Platforms (69)
- All POSIX (343)
- OS Independent (87)
- OS Portable (19)
- Project is OS Distribution-Specific (8)
- Project is an Operating System Distribution (16)
- Project is an Operating System Kernel (3)
- BSD (380)
- Windows (312)
- Mac (257)
- Android (81)
Showing page 2 of 34.
The goal of the project is to build a framework to allow Astaro firewall users to install optional software packages on their firewalls. (Astaro is a Linux-based firewall available from www.astaro.com.) Such a framework includes a package-management syst
Here I'll release and maintain Asterisk package as an IPCop addon and IPCop ISO already containing Asterisk
Linux Authentication Gateway which allows to make dynamic firewall rules based on usernames.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Advertisement
Captive Portal to use with IPTables (with ip_set module). It's permit to control access from a sub-net to internet or to another sub-net. Uses unix account to validate users. It's an alternative to Natacl, Sphirewall, Zorp, Nocat, Nufw and others.1 weekly downloads
Authdefender is a filtering application that, in combination with iptables, blocks malicious users from accessing any aspect of the server in question. Malicious users are defined by brute force ssh/ftp attempts and blocked regardless of tcp wrappers.
Auto Proxy Filter Test (APFT) automates the testing of safe and unsafe URLs against a content filtering proxy (such as Dansguardian) and helps prevent regressions. APFT is useful to people who are designing filter rules.1 weekly downloads
ARS (Automagic Registration System) was a mature computer registration suite, that allowed network/system admins to setup appliances to control access to the network based on arbitrary registration criteria (such as centralized identity).
Program deploy a firewall, that is custom built, and is dynamic to the needs of the host. -- -- moved to www.siology.net
Azinix is a system for monitoring and controlling networks. Azinix implements access control, forwarding, queueing, as well as arbitrary user-defined actions. Key benefits area performance, scalability, flexibility, and ease-of-use.
The BACnet Firewall Router (BTR) is an application that combines BACnet routing capability with traffic management functions to carefully control access to building automation and control networks.2 weekly downloads
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.222 weekly downloads
BASE+ (Basic Analysis and Security Engine) is based on ACID project. This application provides a web front-end to query and analyze the alerts coming from various IDS systems (e.g. Snort).
The Basic Analysis and Security Engine is based on the code from the BASE 1.x and Analysis Console for Intrusion Databases projects. This application provides a web front-end to query and analyze the alerts coming from a Snort or Suricata IDS system.
BBStatus is an IP accounting and an SNMP and IP monitoring tool for Linux. It collects, summarizes, and displays the values from its database.
A great gateway for small or medium network company,with builtin firewall, mutil WANs supporting loadblancing and failover ,VPN , anti virus, anti spams, web proxy , ... Base on pfSense
Ferramenta Web para Administração de Firewall
this firewall is a union of lot of tool distributed free for the OS NetBSD, OpenBSD and FreeBSD, use web services with xml-rpc and soap, and a desktop too based on Gtk
BadTuxWall will help you to implement your own firewall on a Linux operating system using an efficient graphical user interface. It also allows you to generate iptables scripts, export them and share them with friends.
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.1 weekly downloads
Bandwidth Management Tools is a total bandwidth management solution for Linux and can be used for firewalling, traffic graphing, and shaping. It is not based on any currently-available bandwidth management software some ver advanced features.1 weekly downloads
Web-based bandwidth management tools based on tc and iptables for internet cafe or small to medium network administrators.
It's a little shell for managing networking processes under FreeBSD.
This tool locks down Linux and UNIX systems.42 weekly downloads
BastionX is a suite of bash scripts which provide a firewall system using netfilter on linux. Some of the supported features are flow control & QoS, local & WAN ip blacklists, dynamic trusted hosts, DMZ feature, auto detection of interfaces.
A kit of batch files to help you be anonymous while hacking/cracking. Comes with directions and extras.