Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope.

Features

* Configure Firewall
* Configure Hostname
* Configure Interface(s)

Also Read – LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

Supported Operating Systems

* Redhat/CentOS
* Windows configuration can be generated but not executed.

Commandline

* bluewall -c config/example.ini
** See example configuration

Utils

* Enumerate – Identify live hosts inside your network (coming soon)

Symantecs

* Target Host – Outbound communication
* Trusted Host – Bidirectional communication
* No Strike – Devices your computer should not communicate with

Setup

#BUILT FOR PYTHON 2.x
sudo python setup.py install
sudo bluewall -h (for help)

Getting Started

#Setup Initial Environment using Configuration
sudo bluewall -c config/hostconfig.ini

#Export optional windows configuration
sudo bluewall -c config/hostconfig.ini -w autoconfig.ps1

#Add additional inbound host or ranges
sudo bluewall -ih 192.168.0.3,192.168.1.0/24

#Exclude host to communicate with
sudo bluewall -eh 192.168.1.1

#Super easy wizard mode
sudo bluewall –wizard

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

3 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

3 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

3 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

4 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

4 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

4 weeks ago