(Page 3 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Network Utilities » Tunneling

HTun
Added 2002-08-14
by Moshe Jacobson
HTun is a VPN (Virtual Private Network) interface that allows you to create a fully bidirectional IP-layer VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any IP-based service you desire.

Zebedee
Added 2002-05-15
by Neil Winton, zebedee@winton.org.uk
Zebedee is a simple program to establish an encrypted, compressed tunnel for TCP/IP or UDP data transfer between two systems. This allows traffic such as telnet, FTP, and X to be protected from snooping as well as potentially gaining performance over low-bandwidth networks from compression.

IP Sorcery
Added 2002-05-06
by DatastreamCowboy
IP Sorcery is a TCP/IP packet generator. It has the ability to send TCP, UDP, and ICMP packets with a GTK+ interface.

Bouncer
Added 2002-04-26
by Chris Mason
Bouncer is a network tool which allows you to bypass proxy restrictions and obtain outside connections from an internal LAN. It uses SSL tunneling, which allows you to obtain a constant streaming connection out of a proxy. If you are restricted behind a proxy and can access secure online ordering sites, then you can get out to whatever host on whatever port you want. It also supports a lot of other features including socks 5, basic authentication, access control lists, and Web-based administration, and will run on Windows, Linux, and FreeBSD.

Reliable SSH Tunnel
Added 2002-04-23
by Amram Bentolila
RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. It uses SSH to connect the two machines. This will setup a tunnel for you, and make sure that it's constantly running.

FPIPE
Added 2002-02-26
by Foundstone, Inc.
FPipe is a TCP source port forwarder/redirector. It can create a TCP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers.

TransConnect
Added 2001-12-28
by Dwivedi Ajay kumar
TransConnect is an implementation of function interposing to allow users on *nix platforms to transparenly tunnel all networking applications over an HTTPS proxy. It has been extensively tested with telnet, SSH, fetchmail, IRC, whois, Pine, Netscape, Mozilla, Evolution, etc. over squid proxy.

Linux VPN Masquerade
Added 2001-12-13
by John Hardin, jhardin@wolfenet.com
Linux VPN Masquerade allows you to use an IPSec or PPTP VPN host (client or server) behind a Linux masquerading firewall. No more hogging the cable modem when you need to connect to the office network.

Proxytunnel
Added 2001-12-13
by Jos Visser and Mark Janssen
Proxytunnel is a program that connects stdin and stdout to an origin server somewhere in the Internet through an industry standard HTTPS proxy.

Reverse Utilities
Added 2001-12-13
by Roy Keene, rkeene@suspend.net
Reverse Utilities is a set of utilities (written in TCL) that can be used to bypass firewalls (if you have, at some point, access to the firewalled host) with telnet, ssh, HTTP, etc.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus