[go: up one dir, main page]

Showing 94 open source projects for "firewall log"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • The #1 AI-Powered eLearning Platform Icon
    The #1 AI-Powered eLearning Platform

    For users seeking a platform to generate online courses using AI

    Transform your content into engaging eLearning experiences with Coursebox, the #1 AI-powered eLearning authoring tool. Our platform automates the course creation process, allowing you to design a structured course in seconds. Simply make edits, add any missing elements, and your course is ready to go. Whether you want to publish privately, share publicly, sell your course, or export it to your LMS, Coursebox has you covered.
    Learn More
  • 1
    WAF package for Laravel

    WAF package for Laravel

    Web Application Firewall (WAF) package for Laravel

    This package intends to protect your Laravel app from different type of attacks such as XSS, SQLi, RFI, LFI, User Agent, and a lot more. It will also block repeated attacks and send notifications via email and/or slack when an attack is detected. Furthermore, it will log failed logins and block the IP after a number of attempts. Some middleware classes (i.e. Xss) are empty as the Middleware abstract class that they extend does all of the job, dynamically. In short, they all work.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    IPBan

    IPBan

    IPBan is a trusted, free security software to block hackers

    Since 2011, IPBan is the world's most trusted, free security software to block hackers and botnets. With both Windows and Linux support, IPBan has your dedicated or cloud server protected. Upgrade to IPBan Pro today and get a discount. Auto-ban ip addresses by detecting failed logins from event viewer and/or log files. On Linux, SSH is watched by default. On Windows, RDP, OpenSSH, VNC, MySQL, SQL Server, Exchange, SmarterMail, and MailEnable are watched. More applications can easily be added...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 3

    Web-based Firewall Log Analyzer

    Firewall log analyzer

    Flexible web-based firewall log analyzer, supporting netfilter and ipfilter, ipfw, ipchains, cisco routers and Windows XP system logs, and mysql or postgresql database logs using the iptables ULOG or NFLOG target of netfilter others mapped to the ulogd format with a view. Fully supports IPv6 for database logs, and netfilter and ipfilter system file logs.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Fail2Ban

    Fail2Ban

    Daemon to ban hosts that cause multiple authentication errors

    Fail2Ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, courier, ssh, etc).
    Downloads: 12 This Week
    Last Update:
    See Project
  • Securing the Cloud Made Easy Icon
    Securing the Cloud Made Easy

    Multi-cloud security delivered — now and in the future.

    Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.
    Learn More
  • 5
    V2Ray

    V2Ray

    Shell script that aims to make installing and managing V2Ray

    This repository offers an interactive, one-command script that installs and manages a V2Ray-based proxy service on common Linux distributions. It automates routine but error-prone steps such as fetching the latest binaries, generating credentials (for example, UUIDs), writing JSON config files, opening firewall ports, and setting up a systemd service for automatic start. The script includes a menu-driven manager to modify ports, protocols, and users, restart the service, or view logs without...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 6
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge">
    Downloads: 136 This Week
    Last Update:
    See Project
  • 7
    MyPublicWiFi

    MyPublicWiFi

    Turn your computer into a WiFi Access Point or individual Hotspot.

    MyPublicWiFi Turn your computer into a Wi-Fi Access Point or Multifunctional Hotspot. This is also an ideal solution for setting up a temporary Access Point in a hotel room,meeting room,at home or the like. The MyPblicWiFi-Firewall can be used to restrict user access to specific servers. You can also prevent the use of certain Internet services (e.g. file sharing programs) or block the use of social media networks (e.g. Facebook). MyPublicWiFi turn your PC into an Adblock Router....
    Leader badge">
    Downloads: 108 This Week
    Last Update:
    See Project
  • 8
    MyHotspot

    MyHotspot

    Wireless-LAN for Hotels ,Cafés and Shools

    Give your customers the flexibility and extra mobility with Wireless Internet Access MyHotspot is a professional Wireless LAN Free software solution for providing internet access to your customers. Customers will be redirected to your login page to authenticate with user account or a prepaid-code before getting the Internet access. The PayPal payment option allows your customers to create and pay for network access directly. The software controls download, upload, data transfer, time usage,...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 9
    Spock slaf

    Spock slaf

    Spock SLAF is a Shared Library Application Firewall "SLAF".

    Spock SLAF is a Shared Library Application Firewall "SLAF". It has the purpose to protect any service that uses the OpenSSL library. The SLAF inserts hooking to intercept all communication to detect security anomalies and block and log attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smarter Packing Decisions for Retailers and 3PLs Icon
    Smarter Packing Decisions for Retailers and 3PLs

    Paccurate is an API-first cartonization solution.

    Paccurate is the only patented cartonization solution that optimizes for transportation costs directly. So you can have the right boxes, and control how they're packed.
    Learn More
  • 10
    Naxsi

    Naxsi

    Open-source, high performance, low rules maintenance WAF for NGINX

    ...Being very simple, those patterns may match legitimate queries, it is Naxsi's administrator duty to add specific rules that will whitelist legitimate behaviors. The administrator can either add whitelists manually by analyzing nginx's error log, or (recommended) start the project with an intensive auto-learning phase that will automatically generate whitelisting rules regarding a website's behavior. In short, Naxsi behaves like a DROP-by-default firewall, the only task is to add required ACCEPT rules for the target website to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12

    Simple Mikrotik Flow

    Simple Mikrotik Flow

    Mikrotik firewall log -> remote Rsyslog -> MySQL | parse script PHP | web GUI
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LumoGate

    LumoGate

    LumoGate is a Windows Wifi Hotspot Management Software

    ...LumoGate interrupts Internet access, lets any unauthorized user login, then Internet access is restored. LumoGate is based on Captive Portal Technology. LumoGate acts as a hotspot firewall and management software that control authentication, bandwidth management, session usage, internet traffic log . LumoGate is the simplest yet complete, intuitive tool to manage your public Wifi HotSpot in Internet Cafes, Schools, Hotels, Restaurants, etc Please donate to support this project. Cheers !!! License: Creative Commons Attribution-NonCommercial-NoDerivatives V4.0
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    UDPStressTest

    UDPStressTest

    A Desktop app for network stress testing, TCP-Ping and icmp ping.

    ...*Every action done on the app is logged in XML file as data source (only stress test + ping). *TCP-Ping is a perfect way to discover network devices which active firewall to ignore ping packets or you can use it as TCP port scanner to check your network security. *Stress test speed graph can be exported as image easily. *Searching log files for certain data is also integrated to app. *Exporting search results as static HTML page.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    log2table

    track log files, block intrusions, and much more

    Log2table allows you to continuously monitor your logfiles. You can trigger actions when a specific message comes in your audited logfiles or when a specific number of occurences are present.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    BotBlocks

    BotBlocks block malicious IP address in windows machine

    This is a Microsoft Windows Application,the purpose of this tool is to detect the botnet,normally when you have infected with a malware etc..they create a connection back to their command and control server, this tool will monitor the tcp traffic of your machine and it will let you know if you are knowingly or unknowingly contacting a malicious IP address, the tool will made this decision based on the database attached to it(I have collected these malicious IP address through various internet sources and from my personal exepreince, so there can be false positives but users can edit and update this db by using a sqlite db browser),as soon as the tool detect a malicious traffic it will pop up a window so user has a choice to either block it or whitelist it, if user choose block it will terminate the existing connection and create windows firewall rule to block ,if user choose whitelist it will ignore further communication to this IP address.It will also create a log file inside the "C:\
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6. Once the calls reaches its limit, the service immediately tells windows firewall to block the attacking IP by adding a denial inbound firewall rule. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    OpengateM

    A MAC address based user authentication system for campus-wide network

    This system restricts the network users and records usage log of the users. It is applicable to the campus wide network and is compatible to almost all network terminals. MAIN DEVELOPMENT SITE IS MOVED FROM here TO "https://osdn.jp/projects/opengatem/"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    w-o-f

    w-o-f

    Passive or learning mode of web application firewalls to evaluate WAF

    "Web application firewalls (WAF)" , The today's requirement to secure the web applications without changing the existing infrastructure.But at the same time, it is a big risk in case of WAF behavior and false positives (legitimate traffic blocking). This talk will demonstrates a new concept to evaluate any WAF without taking risk of putting any WAFs into inline mode.Everything will be in learning or in passive mode.This project describes concept of one special engine,which can be used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Free Web Application Firewall

    Free Web Application Firewall

    Free Web Application Firewall

    The FreeWAF provides specialized, layered application threat protection. It protects your web-based applications and internet-facing data from attack and data loss. Using advanced techniques to provide bidirectional protection against sophisticated threats like SQL injection and cross-site scripting, it helps you prevent identity theft, financial fraud and corporate espionage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    ghettovcbstarter

    Starts ghettovcb from a remote Windows host

    In case you have ESXi and dont want to mess around with cron,firewall and so on (ESXi resets to defaults after reboot), i wrote a script which allows to start the ghettovcb script from a Windows host. It will send email with log when finished. Tested with ESX5 and older version of ghettovcb. You will need to copy ghettovcb (from William Lam) to vmfs and allow ssh connection with user root.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Fail2Ban
    Fail2Ban monitors log files like /var/log/pwdfail or /var/log/apache/error_log and bans failure-prone addresses. It updates firewall rules to reject the IP address or executes user defined commands. Please see code and download from https://github.com/fail2ban/fail2ban . SF Fail2ban portal might not be up-to-date
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    lavender-firewall

    lavender-firewall

    Personal firewall for linux desktop and android phone

    This is extremely handy for Android Phones, as now most third-party Apps from mobile market is now close-sourced and it's hard to promise its security, but some of this functions may be tempting, so we have to install it and give it permissions what it want at installation stage, and then it may do something we don't like in the background, now with Lavender we can at least prevent from accessing network if we don't trust it. Both linux desktop and Android Phones are now...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next