- wolfSSL is an embedded SSL/TLS software library designed for resource constrained environments. wolfSSL has implemented the Secure Sockets Layer (SSLv3 only) and Transport Layer Security (TLSv1,TLSv1.1, and TLSv1.2). wolfSSL will have support for TLSv1.3 shortly after the protocol is finalized. wolfSSL offers a highly configurable list of features. Dependant upon functionality and speed requirements, wolfSSL can take up as little as 21k on your device. wolfSSL's wolfCrypt module is FIPS certified if you need a FIPS solution.
- Xidel is a command line tool to query data from HTML/XML web pages, JSON-APIs and local files. It implements interpreters for XPath 2, XPath 3, XQuery 1, XQuery 3, JSONiq, CSS selectors and custom pattern matching. XPath and CSS selectors are the most efficient way to select certain elements from XML/HTML documents. JSONiq (with custom extensions) is an easy way to select data from JSON. XQuery is a Turing-complete superset of XPath and allows arbitrary data transformations and the creation of new documents. Pattern matching is for XML/HTML documents what regular expressions are for plaintext, i.e. pattern matching behaves like a regular expression over the space of tags, instead over the space of characters. Xidel implements a kind of internal pipes to pipe HTTP requests from one query to the next, so there is no need to distinguish selecting links and downloading the data referenced by them. Therefore arbitrary complex queries going over arbitrary many pages can be executed with a single call of Xidel.
- Zibawa integrates other open source software to create a full stack IoT system, including device management, mqtt message intepreter and enrichment, stack management and monitoring, test messaging and stack configuration. Works with mqtt, amqp and http protocols. Currently interfaces with rabbitmq, influxDB, Grafana dashboards, openLDAP.
- Zorp is a new generation proxy firewall suite and as such its core architecture is built around today's security demands: it uses application level proxies, it is modular and component based, it uses a script language to describe policy decisions, it makes it possible to monitor encrypted traffic, it let's you override client actions, it let's you protect your servers with its built in IDS capabilities... The list is endless. It gives you all the power you need to implement your local security policy.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.