Endian Firewall Community (EFW)

Endian Firewall Community (EFW) is a “turn-key” linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible.

The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering for email traffic (POP and SMTP), content filtering of Web traffic and a “hassle free” VPN solution (based on both OpenVPN and IPsec). The freshly released EFW 2.5.1 also features support for most modern UMTS/3G USB dongles, new configurable widgets for the dashboard, additional gateway options and several performance improvements.


  • Network Security
  • Web security
  • Mail security
  • Virtual Private Neworking
  • High Availability
  • Multi-WAN with Failover
  • Routing
  • Network Address Translation (NAT)
  • Logging and Reporting
  • Connectivity – Support for most modern UMTS/3G USB dongles
  • System – Performance improvements
  • Contentfilter – Configurable update intervals
  • Dashboard – Customizable through configurable widgets
  • Logging – Trusted timestamping
  • Routing – Additional gateway options

Download In here
Read more right here : http://www.endian.com/en/community/


DeXSS provides a SAX2 Parser to help protect against Cross-site scripting (XSS) attacks. DeXSS uses TagSoup to parse potentially malformed input, followed by a SAX2 filter pipeline to remove JavaScript from HTML. You can use the DeXSS parser in place of your existing SAX2 parser, or you can use the DeXSS utility to provide a string-to-string conversion.
Release Notes 1.2 12 Jun 2012: This release adds a CSS sanitizer, uses the OSBCP CSS Parser, canonizes CSS in @style, and attempts to remove javascript: and expression(). Inline <style> CSS is still elided.


Download and read more in here : http://dexss.org/


The htmLawed PHP script makes HTML more secure and standards- & policy-compliant. The customizable HTML filter/purifier can balance tags, ensure proper nestings, neutralize XSS, restrict HTML, beautify code like Tidy, implement anti-spam measures, etc.


  • The 5th June 2012 release of new htmLawed version 1.1.11 has: Fix for possible problem with handling of multi-byte characters in attribute values in an mbstring.func_overload enviroment; ‘$config[“hook_tag”]’, if specified, now receives names of elements in closing tags.

Download on here

Read more In Here and test Online right here

Easy Web Firewall

Easy Web Firewall is a lightweight iptables-based firewall solution to mitigate problems resulting from hacked websites in shared virtual hosting servers. In such servers, vulnerable web applications are usually exploited by “hackers” to either:

  • Scan for additional vulnerabilities, both in the local server and remote ones.
  • Send spam mails through a cgi that avoids using the system mailer.

Since this actions do not directly prevent the server from operating normally, sysadmins do not usually notice that their server is infected until other servers start taking counter-measures against it. This is, their e-mails begin being rejected as comming from a spam source or their connections get blocked as vulnerability scanners.

Easy Web Firewall prevents these issues by easily allowing the system administrator to maintain a whitelist of allowed outgoing connections, using two different mechanisms:

First, EWF allows iptables blocking based on combinations of user, destination, and port. Hence, it blocks everything that is not whitelisted, promptly notifying the system administrator whenever this happens. Thereafter, sysadmins can quickly discover infected websites and take appropiate measures, or extend the whitelist if the connection attempt was legit. Additionally, since malicious connections are being blocked locally, the server’s reputation will remain intact. This is, it will not be suddently listed in any rbls or similar blacklists affecting the whole server’s user base.

Second, EWF also integrates with tinyproxy, to provide better detection of blocked remote websites. Because iptables is a low level firewall, it only knows about destination IP and port of the connections. However, when local websites try to open remote URLs, the administrator needs to know the actual URL to decide if that was a legit attempt, or one from a blocked website. Easy Web Firewall solves this issue by forcing local websites to make their HTTP(S) requests through a local tinyproxy installation. Thereafter, EWF combines the logs generated by iptables and tinyproxy to report both the local website that originated each blocked request, and its destination URL.


For Installation, Setup And Download In Here : 


Naxsi v-0.46 released

Naxsi is an open source, high performance, low rules maintenance, Web Application Firewall module for Nginx, the famous web server and reverse-proxy.

Its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local & Remote file inclusions.

The difference with most WAF (Web Application Firewalls) out there is that it does not rely upon signatures to detect and block attacks. It uses a simpler model where, instead of trying to detect “known” attacks, it detects unexpected characters in the HTTP requests/arguments.

Each kind of unusual character will increase the score of the request. If the request reaches a score considered “too high”, the request will be denied, and the user will be redirected to a “forbidden” page. Yes, it works somewhat like a spam system.

Release note version 0.46 : Naxsi 0.46 brings a new web interface and minor correction in naxsi core.
Why it is different?
Because it works on a learning mode (read white list). Set the module in learning mode, crawl your site, and it will generate the necessary white lists to avoid false positives! Naxsi doesn’t rely upon pre-defined signatures, so it should be capable to defeat complex/unknown/obfuscated attack patterns. $ make install-boot to install the necessary scripts to start up samhain every time you boot your machine (supported: Linux, FreeBSD, MacOS X, Solaris, HP-UX, AIX).
Download right here : http://code.google.com/p/naxsi/downloads/list
Read more in here :  http://code.google.com/p/naxsi/

EchoVNC V-2.0

EchoVNC is a secure, “firewall-friendly” remote-desktop tool with support for VNC, Remote Desktop, and RAdmin servers and viewers. With it, a Windows PC or OSX Mac can be remotely accessed regardless of firewall, router or web-proxy configuration

Platform : Windows
Download Version Latest : InstantVNC_2.0_src.zip (2.4 MB)
InstantVNC_2.0_bin.zip (603.2 KB)
Find Other Version |
Read more In here : http://echovnc.sourceforge.net/

Update Shoreline Firewall (Shorewall) 4.5.1

Changes in 4.5.1 Final

1) Update release documents.

Changes in 4.5.1 RC 1

1) Update release documents.

2) Don’t automatically install ‘isusable’

3) Clean up TOS handling

Changes in 4.5.1 Beta 3

1) Add support for packager’s config file

2) Implement run-time gateway variables.

3) Add /sbin/shorewall-init

4) Don’t copy non-default mark layout settings during update.

Changes in 4.5.1 Beta 2

1) Remove some cruft from the Zones module.

2) Collapse the three ‘dont_’ members of the chain table into a single
‘optflags’ member.

3) Add DSCP match and target support.

4) Rework install.sh scripts and .spec files.

5) Fix standard init files.

Changes in 4.5.1 Beta 1

1) Add IMQ support.

2) Remove requirement to supply a mark value on the default class.

3) New install script structure.

4) Give warning when opposite flag is used in an ipset invocation.

5) Add a SWITCH column to the masq file.

6) Correct a typo in the blrules files.

7) Eliminate compiler crash from unknown IPv6 interface.

Changes in 4.5.0 Final

1) Update release documents.

Changes in 4.5.0 RC 2

1) Correct ‘get_routed_networks()’ in lib.core.

2) Move Samples and Manpages under their corresponding product

Changes in 4.5.0 RC 1

1) Sort the routing table in ‘show_routing’.

2) Restore shorewall-init functionality.

3) Correct ‘ip -p route’ commands for Proxy NDP.

Changes in 4.5.0 Beta 4

1) Implement load=<load-factor>

2) Add STARTOPTIONS and RESTARTOPTIONS to /etc/default/shorweall*

3) Ensure a routing rule targeting the main table when

Changes in 4.5.0 Beta 3

1) Move lib.core from Shorewall-core to Shorewall.

2) Make ‘0’ equivalent to ‘-‘ in the IN_BANDWIDTH column.

3) Fix MARK_IN_FORWARD_CHAIN=Yes with $FW source

4) Allow runtime address variables in the SOURCE column of

5) Add a PROBABILITY column to the tcrules file.

6) Don’t rm /usr/share/shorewall/wait4ifup during Shorewall install.

7) Combine prog.footer and prog.footer6

Changes in 4.5.0 Beta 2

1) Move common routines from prog.header/prog.header6 to lib.core.

2) Unify install between Shorewall and Shorewall6.

2) Unify install between Shorewall-lite and Shorewall6-lite.

Changes in 4.5.0 Beta 1

1) Reorganize blacklist and interface option handling.

2) Allow <timeout> on safe- commands.

3) Add Shorewall Core package


Downloadshorewall- (378.2 kB)

Find other Version | Read More In here : http://www.shorewall.net/