Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope.

Features

* Configure Firewall
* Configure Hostname
* Configure Interface(s)

Also Read – LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

Supported Operating Systems

* Redhat/CentOS
* Windows configuration can be generated but not executed.

Commandline

* bluewall -c config/example.ini
** See example configuration

Utils

* Enumerate – Identify live hosts inside your network (coming soon)

Symantecs

* Target Host – Outbound communication
* Trusted Host – Bidirectional communication
* No Strike – Devices your computer should not communicate with

Setup

#BUILT FOR PYTHON 2.x
sudo python setup.py install
sudo bluewall -h (for help)

Getting Started

#Setup Initial Environment using Configuration
sudo bluewall -c config/hostconfig.ini

#Export optional windows configuration
sudo bluewall -c config/hostconfig.ini -w autoconfig.ps1

#Add additional inbound host or ranges
sudo bluewall -ih 192.168.0.3,192.168.1.0/24

#Exclude host to communicate with
sudo bluewall -eh 192.168.1.1

#Super easy wizard mode
sudo bluewall –wizard

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

7 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

7 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

1 week ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago