Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
34a59934180dc4ec202e6e77747f7e92b07457fb6a80ea09fb608137ac914095
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
0a7304f718d69a449db303760bf7828fbc60565ec5725a46d02733fc0191ed21
This is a tool that generates a Linux kernel module for custom rules with Netfilter hooking to block ports, run in hidden mode, perform rootkit functions, etc.
d0dc6f8136db21f01228d49ad0aaf1fb756fbd13cbc46d39483563c187f9fd7c
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
80fb69bd26cf7d8895d8f7c1f088a02b1182321ded9c054d2e2b9523ced723d1
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
447b1f123430d2d4378832b337fca556aa9a009f7c6863f5382f9844a50bcc42
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
39030481d50134c2c14624899787ca277f1583f87c984029cec27e80922fade0
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
e124a10f5e1cc12f366263958aeaf678bc45ef125e7d80430afc2808ac8cf4a5
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
923cdb6e5ca88b6f0ebaca62f650819c0d9b6ac5c4bdc58835f40a6a364af04c
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
a37959fdaf2f95ce8625c170bf8f4582b5b3e15970f56150eb45599ccfb0bf90
fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.
784c667fc4b2cb45a551290aa31e176a98eedf87686e8f45e5e50794aa951c79
Zorp is a proxy firewall suite with its core architecture built around today's security demands. It uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.
22a9cc9e08d042d3967fdb9db22d919d77e53a58a2f493552f7a49ea9b170782
Zorp is a proxy firewall suite with its core architecture built around today's security demands. It uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.
05c0dd91dd29762f5e296d14459621c31954abd49ee245eed81ed44d3cf305ae
fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.
da806dbaaa56fdfd36a208b15bfeccaa0531f0789ad1355e43c047523ea60a48
Zorp is a proxy firewall suite with its core architecture built around today's security demands. It uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.
fa7153f409e721608f962300415cd744516afae4772594ad9b060ca5a0cf7718
This shell script is to find unused service objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused services both in service groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can run the script in a bash environment.
f364e2e1c181a703d1339e2b608e9304e51fd8f57b139fc754785772749f7da3
This shell script is to find unused objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused objects both in object groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can also run the script in a bash environment.
3f04eebb14bcb24142a45260f523afa2976af233ae6bfa598b42a59b3e34c637
fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.
37fdfb49085fc7871b2bda30c4f334732cc552c1451aede94d96976e9122a92c
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
dcdbd2708f2c2e12467e8290427000123747df8a0fffb5c31fdecd194bc1d79d
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
72a518658d17a8e88988867f00b4bfd8e5da11e3ca2bcff97091c5f435a13b7e
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
d7921610a1c045c8557dd0c719ad17b1d94b9c5e227409d9e07e53621c7025d8
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
6173ebb132981a6b9577f4c7fb9a2c6062201f118d17f69e3a0d67f623d50f1d
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
cf12ce6bcfb033023ea362ef845359396d2950db9f8665a51557eb125631e5ac
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
877b7e9b725720cd726819e5c02975055cb56ed9c064fc11b6e503f648519c32
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
df87a29a9da4aa20b8fc277fbdf009f20d20d8332d10a64317067a8834645835
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
b021ec2243ab8d6fc5baceb99145f3e0cd58a59ae27b772416fd30d174d5fed2