OSI-Approved Open Source (280)
- GNU General Public License version 2.0 (197)
- BSD License (30)
- GNU Library or Lesser General Public License version 2.0 (20)
- GNU General Public License version 3.0 (16)
- Apache License V2.0 (6)
- GNU Library or Lesser General Public License version 3.0 (6)
- MIT License (4)
- zlib/libpng License (3)
- Common Public License 1.0 (2)
- Open Software License 3.0 (2)
- Academic Free License (1)
- Adaptive Public License (1)
- Apache Software License (1)
- Artistic License (1)
- Attribution Assurance License (1)
- Public Domain (9)
- Other License (6)
- Creative Commons Attribution License (5)
- Linux (241)
Grouping and Descriptive Categories (213)
- OS Independent (87)
- All 32-bit MS Windows (79)
- All POSIX (68)
- 32-bit MS Windows (46)
- All BSD Platforms (19)
- 32-bit MS Windows (17)
- OS Portable (17)
- 64-bit MS Windows (14)
- Project is an Operating System Distribution (7)
- Project is OS Distribution-Specific (5)
- Project is an Operating System Kernel (1)
- Mac (196)
- Modern (102)
- Android (79)
- BSD (61)
- Other Operating Systems (19)
- OS: Windows ×
Vopos gives you a visual representation of FW1 objects. It will be able to dump objects to a db or file and perform some simple checks against an internal DNS. It is useful to check consistence of configuration across a network.1 weekly downloads
WarpTunnel is a porting of http tunnel 3.3 from C into .NET C# platform. WarpTunnel creates a bidirectional virtual data path tunnelled in HTTP requests through firewall or proxy servers.Support DIGEST proxy & SOCKS4/4a/5.Client for Compact Framework 2.01 weekly downloads
web rules is an powerfully filtering HTTP proxy, and rules how to access the web. high-performance multiple-channels are support. work on windows, mac and unix-like.1 weekly downloads
Create and delete advanced block rules for the Windows firewall1 weekly downloads
This application is designed to centralize the management of your network. Various features are coming. Developed in VB. Net1 weekly downloads
c# tool for generate wipfw batch script configurator1 weekly downloads
yafig is a LAMP-based firewall rule generator.1 weekly downloads
flex-fw is a small and fast console frontend to iptables1 weekly downloads
none1 weekly downloads
A Java implementation of a NAT-PMP client. At the project's inception, there was not a well-known NAT-PMP client library for Java. This project intends to fill the gap.1 weekly downloads
It's a non-complicated free patch that allows you to access websites which are censored by sublime(!) authorities like schools, offices, governments.1 weekly downloads
myNetWatchman Perl Agent is a program that is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com.1 weekly downloads
Pablesticky is a PHP script that provides a web interface to a growing amount of features of OpenBSD's PF.1 weekly downloads
readlog is a pair of scripts for reviewing iptables firewall logs via a handy web interface using a MySQL backend.1 weekly downloads
TunnelTools is a set of perl scripts to allow anonymous rsync and CVS access from machines inside a firewall by tunneling over an ssh connection to a host outside the firewall.1 weekly downloads
3ff aims to provide a full features gateway for home or small office use. This distro is totaly modular and try to be secure as possible.
zeroconfig IPv6 tunnel
Application to display, as well as interpret, firewall information from a database to serve a variety of users needs. The application is online and cross-platform, written using PHP.
Next generation Linux Operating System for the enterprise and public. Reliable solutions for the internet, datacenter, security, office and entertainement.
Its a free antivirus that will have all the features of a commercial antivirus software.
The Basic Analysis and Security Engine is based on the code from the BASE 1.x and Analysis Console for Intrusion Databases projects. This application provides a web front-end to query and analyze the alerts coming from a Snort or Suricata IDS system.
A kit of batch files to help you be anonymous while hacking/cracking. Comes with directions and extras.
BMHT is a method of target tracking that allows decisions to be adjusted and refined until enough data has been collected to ensure a level of confidence.
This project seeks nothing less than a total change in perimeter defense. This project will provide applications to create millions of virtual hosts (aka honeyhet) tied to an IDS/IPS system(s), permitting dynamic network camouflage and defense.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.