untangle / ngfw_src
NGFW src
โ20Updated this week
Related projects: โ
- ๐ Don't let threats reach your machines โ USB Mass Storage Gatewayโ17Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP serversโ34Updated 6 years ago
- Our publicly available blacklists and country IP CIDR blocks.โ19Updated 3 years ago
- Application Layer IDS/IPS with iptablesโ73Updated 5 years ago
- DNS passive monitoring toolโ16Updated 6 years ago
- Domain Controller - Drop-in DC replacementโ59Updated 2 months ago
- Docker details and examples for the Lynis projectโ23Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part oโฆโ15Updated 5 years ago
- pfSense Captive portal self registration in one single stepโ26Updated 3 years ago
- Geppetto - Virtual machine and infrastructure orchestrationโ14Updated 6 months ago
- OPNsense IDS/IPS rulesโ71Updated 9 months ago
- Pritunl DNS mapping serviceโ29Updated 7 months ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service ofโฆโ29Updated 2 months ago
- TOR Server Docker imageโ39Updated 4 years ago
- โ12Updated this week
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)โ12Updated 6 years ago
- โ90Updated this week
- โ12Updated this week
- Malice VirusTotal Pluginโ12Updated 5 years ago
- BruteForceBlocker is a perl script, that works along with pf firewall. Its main purpose is to block SSH bruteforce attacks via firewall.โ20Updated 3 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archiveโ19Updated 4 months ago
- SillyProxy - Dynamic SNI based TLS proxy for terminating TLS (>=1.1) HTTP connections to multiple domains.โ22Updated 3 years ago
- The Zonemaster GUI - part of the Zonemaster projectโ14Updated 2 months ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.โ20Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.โ13Updated 6 years ago
- โ11Updated this week
- Source for https://install.zerotier.com curl|bash installerโ62Updated 3 weeks ago
- ๐ monitoring, alerting and threat analysis for ELK stackโ11Updated 7 years ago
- Certificate Revocation List monitorโ37Updated last month
- โ58Updated 2 years ago