Iroffer with mIRC-style DCC Server Protocol that might allow sends through firewalls without reconfigurations (and some more extra features)
HTTP Tunnel that works with ANY HTTP proxy: no CONNECT method required! You can use the port redirector or Socks 4/4a/5 to connect outside your (restricted) LAN. An external web server is required, to be used as gateway.
Implements a Windows NT VPN peer to Olaf Titz's CIPE VPN for Linux NOTE: The distribution must be downloaded from the home page
Netscreen Firewall Log Analyser which can analyse log files in Netscreen Log File format and copy data into Access Database. Developed by Specialists for Computer Systems (SCS)
Server and Client applications for testing network connectivity.
“Network Connection Test“ has two applications, one Server and one Client. The Server application listens on a TCP and/or UDP port and the Client application connects to these ports. Both applications display logs when the client connects and the data is being sent and received. This is a useful tool when configuring network routers or firewalls. The source code is a demonstration of sockets and multithreading programming using C#.
C#/.NET SNMP V1+2+3 framework with fully functioning BER/ASN.1 Decoders and Encoders
web rules is an powerfully filtering HTTP proxy, and rules how to access the web. high-performance multiple-channels are support. work on windows, mac and unix-like.
CallingHome is a small tool that allows you to gain control over a firewalled and thus directly unreachable PC (e.g. your PC at work). It achieves this by actively maintaining a SSH connection from within the firewall to a SSH server of your choice.
ANDURAS SurfProtect is a PHP application that can be used for virus-scanning withing the application-layer (ISO/OSI) Either http and ftp protocols are already supported within the beta version.
A simple SIP and RTP NAT friendly proxy for SIP based VoIP
Actim is an application written in python that allows sending/receiving files and calling command lines via email. (under GPL license) For example, if your home PC does not have any access to your office workstation which is behind the company firewall.
BMHT is a method of target tracking that allows decisions to be adjusted and refined until enough data has been collected to ensure a level of confidence.
This project seeks nothing less than a total change in perimeter defense. This project will provide applications to create millions of virtual hosts (aka honeyhet) tied to an IDS/IPS system(s), permitting dynamic network camouflage and defense.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
Push button activation of application firewall profiles for broadband routers.
DFA library is a regular expression library capable of the classic RE syntax (i.e. - without any perl extension). Unlike many other libraries with similar functionality, a deterministic finite automata (DFA) is used. DFA was formerly called npcre, wh
Un Fail2Ban pour windows
ATTENTION VERSION :proof of concept Outils qui examine les logs systeme de windows pour créer dynamiquement des règles de blocages (temporaire ou permanent) dans le firewall windows lors de tentatives raté de connexions (MSSQL pour le moment mais SSH et autre après).
We launched the Firedraw project in order to make a free graphical interface for the Linux Firewall Netfilter(iptables, Kernel 2.4).
This socks proxy allow you to use connection on port that is blocked in your company firewall. It use a local sock proxy that connect to a server outside your firewal that act as a bridge for your connection. Provides authentication and bandwidth control
this project is being developed for parsing, maintaining and verify new firewalls rules for pf. In the future the aim is to add support for iptables as well.
Enable servers behind a firewall to export services to the external networks with the assistance from an externel host as proxy (Jumppoint). The firewall tunnel consists of two parts: a frontend as "Jumppoint" and a backend running behind the firewall
Ghost Personal Firewall (formerly KerioKlone) aims to be a Windows 95/98/XP/2000 rule based firewall written in C/C++ with similar design and simplicity to but an improvement of Kerio Personal Firewall 2.15, a phased out closed source product.
GoSafe is a collection of pre built packages and enhanced documentation use for the purpose of spreading awareness and education of the importance of Information Security. This package is aimed at the general user running on the Windows platform.
An XML firewall for web services. This firewall will provide a means of adding security to any webservice of any platform. Standards such as SAML and WS-Security will be implemented.
Internet Abuse Tracker(c) aka IA Tracker(c) is a companion project for SecurityStalker(c), developed by the same group. This software will track/analyze and report to users/admins of Internet abuse associated network/email activity and take action.