Red Hat Ansible Automation Platform on Microsoft Azure
Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.
Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
Learn More
Free CRM Software With Something for Everyone
216,000+ customers in over 135 countries grow their businesses with HubSpot
Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
mipclasses : a program which has as input a series of IP prefixes and create an output compatible with iptables-restore. It concatenates the IP prefixes and creates a tree of MARK rules in order to save CPU.
Drivers and daemon for using iSCSI (SCSI over IP) on Linux. For Linux kernels 2.6.11 and above, use open-iscsi.org. For the 2.6.9 and 2.4 kernels, use the RHEL4 and RHEL3 CDs respectively. The 4.0.2 version here will work on the 2.6.10 kernel only.
Packet Auth. Sniffer (or Sequence) Allows you to set on your server this little daemon (pasmal) monitoring tcp/ip & icmp, and on the exact good sequence (the one you only know) run processes (a firewall) - such as access list update, iptables,ipchains.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Traceproto is a traceroute replacement written in c that allows the user to specify the protocol and port to trace to. It currently supports tcp, udp, and icmp traces with the possibility of others in the future. A network server version is also planned.
"Source Hardware address Translation" provides an Ethernet to IP gateway. Ideally, any Ethernet network client can communicate through the gateway with the IP world on the other side regardless of what the client network stack is configured as.
See the project website for how it works.
The project has been dormant since 2006 but I would spend some efforts to round and hone edges if there is public interest.
Simple-to-use, dynamic, rule-based firewall addition. Uses QUEUE/userspace to dynamically approve or drop packets based on custom rules. With frequency caching, friend/foe indication, loose IP matching, and customizable logging.
IP accounting tools package based on Berkeley Packet Filer mechanism. Continue from BPFT by V.Vorobyev, TRAFD by V.Belekhov & S.Svirid.
Use the PCAP library to implement connection to bpf kernel pseudo-device.
Save hundreds of developer hours with components built for SaaS applications.
The #1 Embedded Analytics Solution for SaaS Teams.
Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
Bounzor is a fully configurable TCP/UDP bouncer. It can also encapsulates and decapsulates TCP packets in UDP and vice-versa. Bounzors are consequently cascadables. Useful when a specific protocol is disabled in part of your network for exemple.
A Linux 2.6 kernel module for the Datagram Control and Congestion Protocol (DCCP). DCCP intends to provide a datagram service with TCP-like or TCP-friendly rate control.
"Traffic" is ethernet/ip traffic generator. The tool consists of server and GUI application.
Typical configuration is to have at least 2 servers and 1 or more client machines, where the servers are controlled and results are displayed.
Passive Autoconfiguration for Mobile Ad hoc Networks (PACMAN) is an efficient and robust distributed solution to the IP address autoconfiguration problem. Address conflict detection is based on anomalies in the routing protocol traffic.
The LYS Monitor is a linksys monitoring/logging application with the following features.
- Network Connection Logging to file (with filters).
- DNS service updates (IP address changes).
- Email Notifications (with filters).
- Highly configura
General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
Protect your Server/Network against spammers.
fw_spam queries a DNS-based Spam Database to detect spam listed ip-addresses.
It is a userspace daemon, wich gets the packets from the iptables QUEUE target.
You can configure the dns server, the firewall
sysprofd is a system profiling daemon that can report results through a tcp connection to a remote client. sysprofd profiles cpu, memory, and swap usage statistics, process status statistics e.t.c. Imagine using it to easily monitor lots of linux boxes
RTL-lwIP is the porting of the lwIP TCP/IP stack to RTLinux-GPL.
It allows the RT-Tasks to use a socket-like API to send and receive
TCP/UDP messages through an Ethernet network.
Two Ethernet cards are supported:
- 3Com905C-X
- Realtek8139
The Nemesis Project is designed to be a command line based, portable human
IP stack for UNIX-like and Windows systems. The suite is broken down by
protocol, and should allow for useful scripting of injected packets from
simple shell scripts.
MOCKS is a small, easy configurable, RFC1928 compliant SOCKS 5 server for Linux and Linux-like systems. MOCKS supports upstream proxy and IP-based client filtering rules.