HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 50662,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=899",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=897",
"results": [
{
"name": "gloox",
"portdir": "net/gloox",
"version": "1.0.28",
"license": "(GPL-3 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://camaya.net/gloox",
"description": "C++ Jabber/XMPP library taking care of the low-level protocol",
"long_description": "gloox is a C++ Jabber/XMPP library which takes care of the low-level protocol stuff. Additionally, it offers high-level interfaces for interaction with an XMPP server.",
"active": true,
"categories": [
"devel",
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"gnutls",
"libgcrypt",
"libgpg-error",
"zlib",
"iksemel",
"libiconv",
"libidn2",
"gettext"
]
}
],
"depends_on": []
},
{
"name": "glider",
"portdir": "net/glider",
"version": "0.16.4",
"license": "GPL-3",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/nadoo/glider",
"description": "glider is a forward proxy with multiple protocols support, and also a dns/dhcp server with ipset management features(like dnsmasq).",
"long_description": "glider is a forward proxy with multiple protocols support, and also a dns/dhcp server with ipset management features(like dnsmasq).",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 652
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gkwebmon",
"portdir": "net/gkwebmon",
"version": "0.2.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://gkwebmon.sourceforge.net/",
"description": "Web monitor plugin for GKrellM",
"long_description": "Web monitor plugin for GKrellM",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"gkrellm"
]
}
],
"depends_on": []
},
{
"name": "gkrellm_snmp",
"portdir": "net/gkrellm_snmp",
"version": "1.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://triq.net/gkrellm_snmp.html",
"description": "A gkrellm SNMP Monitor",
"long_description": "A gkrellm SNMP Monitor",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"gkrellm"
]
}
],
"depends_on": []
},
{
"name": "gibberish",
"portdir": "net/gibberish",
"version": "0.2",
"license": "none",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.vanheusden.com/Linux/",
"description": "sends gibberish to a given host, port",
"long_description": "With this tool you can test if your tcp-server can handle gibberish. For example a webserver: with this tool you can test if your webserver can handle it if someone sends gibberish instead of an http-request.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "gftp",
"portdir": "net/gftp",
"version": "2.9.1b",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.gftp.org/",
"description": "GTK+ FTP client",
"long_description": "gFTP is a free multithreaded file transfer client for *NIX based machines.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"autoconf",
"automake",
"gettext",
"libtool",
"pkgconfig"
]
},
{
"type": "lib",
"ports": [
"readline",
"gtk2",
"openssl3",
"gettext-runtime",
"ncurses"
]
}
],
"depends_on": []
},
{
"name": "get_iplayer",
"portdir": "net/get_iplayer",
"version": "3.36",
"license": "GPL-3+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/get-iplayer/get_iplayer",
"description": "A utility for downloading TV and radio from BBC iPlayer",
"long_description": "A utility for downloading TV and radio from BBC iPlayer. \nThis port does not install the Web PVR Manager (get_iplayer.cgi).",
"active": true,
"categories": [
"net",
"multimedia"
],
"maintainers": [
{
"name": "davide.liessi",
"github": "dliessi",
"ports_count": 72
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
},
{
"type": "run",
"ports": [
"ffmpeg",
"perl5.34",
"p5.34-libwww-perl",
"AtomicParsley",
"p5.34-mojolicious",
"p5.34-xml-libxml",
"p5.34-lwp-protocol-https"
]
}
],
"depends_on": []
},
{
"name": "genders",
"portdir": "net/genders",
"version": "1.32",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/chaos/genders",
"description": "Cluster Configuration Database",
"long_description": "Genders is a static cluster configuration database used for cluster configuration management. It is used by a variety of tools and scripts for management of large clusters.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "ganglia-web",
"portdir": "net/ganglia-web",
"version": "3.7.5",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/ganglia/ganglia-web",
"description": "Web front end for Ganglia.",
"long_description": "Web front end for the Ganglia monitoring system for high-performance computing systems such as clusters and Grids.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
},
{
"type": "lib",
"ports": [
"ganglia"
]
},
{
"type": "run",
"ports": [
"apache2"
]
}
],
"depends_on": []
},
{
"name": "ganglia",
"portdir": "net/ganglia",
"version": "3.7.2",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://ganglia.sourceforge.net/",
"description": "Ganglia monitoring client",
"long_description": "Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"apr",
"gettext",
"libconfuse",
"pcre"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"ganglia-web"
]
}
]
},
{
"name": "gajim",
"portdir": "net/gajim",
"version": "1.9.5",
"license": "GPL-3",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://dev.gajim.org/gajim/gajim",
"description": "A full featured and easy to use Jabber client.",
"long_description": "The goal of Gajim is to provide a full featured and easy to use Jabber client. Gajim works nicely with GNOME, but does not require it to run.",
"active": true,
"categories": [
"net",
"x11",
"chat"
],
"maintainers": [],
"variants": [
"python310",
"python311",
"python312"
],
"dependencies": [
{
"type": "build",
"ports": [
"gettext",
"libtool",
"pkgconfig",
"intltool",
"clang-17",
"py312-build",
"py312-installer",
"py312-setuptools",
"py312-wheel"
]
},
{
"type": "lib",
"ports": [
"py312-keyring",
"py312-qrcode",
"py312-sqlalchemy",
"py312-pypng",
"py312-css-parser",
"py312-emoji",
"py312-nbxmpp",
"py312-omemo-dr",
"adwaita-icon-theme",
"gtk3",
"gtksourceview4",
"libsoup",
"librsvg",
"python312",
"py312-certifi",
"py312-idna",
"py312-Pillow"
]
},
{
"type": "run",
"ports": [
"py312-pyobjc",
"libayatana-appindicator"
]
}
],
"depends_on": []
},
{
"name": "gWakeOnLAN",
"portdir": "net/gWakeOnLAN",
"version": "0.8.6",
"license": "GPL-3+",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.muflone.com/gwakeonlan",
"description": "wake machines on your network using Wake-on-LAN",
"long_description": "gWakeOnLAN is a GTK+ GUI for waking machines on your network using Wake-on-LAN.",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 1827
}
],
"variants": [
"x11",
"quartz"
],
"dependencies": [
{
"type": "build",
"ports": [
"py313-wheel",
"clang-18",
"py313-build",
"py313-installer",
"py313-setuptools",
"gettext",
"makeicns"
]
},
{
"type": "lib",
"ports": [
"python313",
"py313-gobject3",
"py313-pyxdg",
"gtk3"
]
}
],
"depends_on": []
},
{
"name": "fwknop-client",
"portdir": "net/fwknop-client",
"version": "2.6.10",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cipherdyne.org/fwknop/",
"description": "'FireWall KNock OPerator': a port knocker to Linux servers",
"long_description": "fwknop stands for the 'FireWall KNock OPerator', and implements an authorization scheme called Single Packet Authorization (SPA) that is based around Netfilter and libpcap. SPA requires only a single encrypted packet in order to communicate various pieces of information including desired access through a Netfilter policy and/or complete commands to execute on the target system. By using Netfilter to maintain a 'default drop' stance, the main application of this program is to protect services such as OpenSSH with an additional layer of security in order to make the exploitation of vulnerabilities (both 0-day and unpatched code) much more difficult. The authorization server passively monitors authorization packets via libcap and hence there is no 'server' to which to connect in the traditional sense. Access to a protected service is only granted after a valid encrypted and non-replayed packet is monitored. This port installs the client side script that you run to gain access to a Linux box.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "blair",
"github": "blair",
"ports_count": 26
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gnupg2",
"wget",
"gpgme"
]
}
],
"depends_on": []
},
{
"name": "fwknop",
"portdir": "net/fwknop",
"version": "1.9.12",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cipherdyne.org/fwknop/",
"description": "'FireWall KNock OPerator': a port knocker to Linux servers",
"long_description": "fwknop stands for the 'FireWall KNock OPerator', and implements an authorization scheme called Single Packet Authorization (SPA) that is based around Netfilter and libpcap. SPA requires only a single encrypted packet in order to communicate various pieces of information including desired access through a Netfilter policy and/or complete commands to execute on the target system. By using Netfilter to maintain a 'default drop' stance, the main application of this program is to protect services such as OpenSSH with an additional layer of security in order to make the exploitation of vulnerabilities (both 0-day and unpatched code) much more difficult. The authorization server passively monitors authorization packets via libcap and hence there is no 'server' to which to connect in the traditional sense. Access to a protected service is only granted after a valid encrypted and non-replayed packet is monitored. This port installs the client side script that you run to gain access to a Linux box.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "blair",
"github": "blair",
"ports_count": 26
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "lib",
"ports": [
"p5.34-crypt-rijndael",
"p5.34-digest-sha",
"p5.34-gnupg-interface",
"p5.34-crypt-cbc",
"p5.34-net-ping-external",
"p5.34-term-readkey",
"p5.34-unix-syslog",
"p5.34-net-ipv4addr"
]
}
],
"depends_on": []
},
{
"name": "ftpsync",
"portdir": "net/ftpsync",
"version": "1.3.06",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://confluence.clazzes.org/display/FTPSYNC",
"description": "Synchronizes a local and a remote ftp directory tree",
"long_description": "Synchronizes a local and a remote ftp directory tree",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "lib",
"ports": [
"perl5.34"
]
},
{
"type": "run",
"ports": [
"p5.34-file-listing",
"p5.34-net"
]
}
],
"depends_on": []
},
{
"name": "ftpmap",
"portdir": "net/ftpmap",
"version": "0.4",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://web.archive.org/web/20031008221224/http://www.jedi.claranet.fr/",
"description": "Scans remote FTP servers to see what ftpd is used",
"long_description": "Ftpmap uses program-specific fingerprints to discover the name of the software even when banners have been changed or removed, or when some featureshave been disabled. IPv6 is fully supported.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "fspclient",
"portdir": "net/fspclient",
"version": "0.93.1",
"license": "(BSD or MIT)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://fspclient.sourceforge.net/",
"description": "command line client for the fsp protocol",
"long_description": "FSP Client is FTP-like interface for File Service Protocol. It look exactly like classic FTP does, but uses different transfer protocol.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"scons",
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "fsp",
"portdir": "net/fsp",
"version": "2.8.1b29",
"license": "BSD and Permissive and BSD-old",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://fsp.sourceforge.net/",
"description": "udp based alternate protocol for ftp, server and tools",
"long_description": "FSP stands for File Service Protocol. It is a very lightweight UDP based protocol for transferring files. FSP has many benefits over FTP, mainly for running anonymous archives. FSP protocol is valuable in all kinds of environments because it is one of the only TCP/IP protocols that is not aggressive about bandwidth, while still being sufficiently fault tolerant.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"flex",
"scons",
"clang-14"
]
}
],
"depends_on": []
},
{
"name": "fsh",
"portdir": "net/fsh",
"version": "1.2",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.lysator.liu.se/fsh/",
"description": "Fast remote command execution",
"long_description": "fsh is a drop-in rsh-compatible replacement for ssh that automatically resuses ssh tunnels.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "fragrouter",
"portdir": "net/fragrouter",
"version": "1.6",
"license": "unknown",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://web.archive.org/web/20010411002242/http://www.anzen.com/research/nidsbench/fragrouter.html",
"description": "Tool for testing network IDS implementations",
"long_description": "Fragrouter is a program for routing network traffic in such a way as to elude most network intrusion detection systems. The attacks implemented correspond to those listed in the Secure Networks ``Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January, 1998. See also net/fragroute.",
"active": false,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0",
"libnet",
"libpcap"
]
}
],
"depends_on": []
},
{
"name": "fragroute",
"portdir": "net/fragroute",
"version": "1.2",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://monkey.org/~dugsong/fragroute/",
"description": "intercept, modify, and rewrite egress traffic",
"long_description": "fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection paper of January 1998.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libevent",
"libdnet",
"libpcap"
]
}
],
"depends_on": []
},
{
"name": "fprobe",
"portdir": "net/fprobe",
"version": "1.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://fprobe.sourceforge.net/",
"description": "collects network traffic data",
"long_description": "libpcap-based tool that collect network traffic data and emit it as NetFlow flows towards the specified collector.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libpcap"
]
}
],
"depends_on": []
},
{
"name": "fping",
"portdir": "net/fping",
"version": "5.3",
"license": "X11",
"platforms": "darwin",
"epoch": 1,
"replaced_by": null,
"homepage": "https://fping.org/",
"description": "A scriptable ping program to check if multiple hosts are up",
"long_description": "fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"nagios-plugins"
]
},
{
"type": "lib",
"ports": [
"smokeping",
"nedi",
"xymon-client",
"xymon-server",
"argus-monitor"
]
},
{
"type": "run",
"ports": [
"zabbix3",
"zabbix4",
"zabbix44",
"zabbix42",
"zabbix5",
"shmux"
]
}
]
},
{
"name": "fortio",
"portdir": "net/fortio",
"version": "1.60.2",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://fortio.org",
"description": "Fortio is a load testing library, command line tool, advanced echo server and web UI in go (golang).",
"long_description": "Fortio is a load testing library, command line tool, advanced echo server and web UI in go (golang). Allows to specify a set query-per-second load and record latency histograms and other useful stats. Fortio runs at a specified query per second (qps) and records an histogram of execution time and calculates percentiles (e.g. p99 ie the response time such as 99% of the requests take less than that number (in seconds, SI unit)). It can run for a set duration, for a fixed number of calls, or until interrupted (at a constant target QPS, or max speed/load per connection/thread).",
"active": true,
"categories": [
"net",
"www"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "flowd",
"portdir": "net/flowd",
"version": "0.9.1",
"license": "Permissive and BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/flowd/",
"description": "flowd is a small, fast and secure NetFlow collector.",
"long_description": "flowd is a small, fast and secure NetFlow collector.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"byacc",
"clang-12"
]
}
],
"depends_on": []
},
{
"name": "flow-tools",
"portdir": "net/flow-tools",
"version": "0.68.5.1",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/adsr/flow-tools",
"description": "Suite of tools and library to work with netflow data",
"long_description": "Suite of tools and library to work with netflow data",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"mysql57",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"automake",
"pkgconfig",
"clang-17",
"autoconf",
"libtool"
]
},
{
"type": "lib",
"ports": [
"openssl10",
"zlib"
]
}
],
"depends_on": []
},
{
"name": "ffsend",
"portdir": "net/ffsend",
"version": "0.2.77",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://gitlab.com/timvisee/ffsend",
"description": "Easily and securely share files from the command line. A fully featured Firefox Send client.",
"long_description": "Easily and securely share files and directories from the command line through a safe, private and encrypted link using a single simple command. Files are shared using the Send service and may be up to 1GB. Others are able to download these files with this tool, or through their web browser.",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cargo",
"legacy-support",
"rust",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"libunwind"
]
}
],
"depends_on": []
},
{
"name": "ffp",
"portdir": "net/ffp",
"version": "0.0.8",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.thc.org/thc-ffp/",
"description": "generates fuzzy fingerprints to facilitate MiM attacks",
"long_description": "ffp is a tool that generates fuzzy fingerprints. Fuzzy fingerprinting is a technique that extends common man-in-the-middle attacks by generating fingerprints that closely resemble the target's public key fingerprint.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"coreutils",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl10"
]
}
],
"depends_on": []
},
{
"name": "fetch",
"portdir": "net/fetch",
"version": "9.0.0-RELEASE",
"license": "BSD",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.freebsd.org/",
"description": "FreeBSD file fetching utility",
"long_description": "Fetch provides a command-line interface to the fetch(3) library. Its purpose is to retrieve the file(s) pointed to by the URL(s) on the command line.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"bsdmake",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl",
"libfetch"
]
}
],
"depends_on": []
},
{
"name": "fauxident",
"portdir": "net/fauxident",
"version": "1.2.1",
"license": "GPL-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.alcyone.com/software/fauxident/",
"description": "small extremely naive ident server",
"long_description": "fauxident is a small Python script that will act as an extremely naive ident server, answering all ident requests with a consistent response -- either an ERROR or a USERID response.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"python27"
]
}
],
"depends_on": []
},
{
"name": "fargate-cli",
"portdir": "net/fargate-cli",
"version": "0.3.2",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/awslabs/fargatecli",
"description": "CLI for AWS Fargate",
"long_description": "CLI for AWS Fargate. AWS Fargate is a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS). Fargate makes it easy for you to focus on building your applications. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design.",
"active": true,
"categories": [
"devel",
"sysutils",
"net"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "ez-ipupdate",
"portdir": "net/ez-ipupdate",
"version": "3.0.11b7",
"license": "GPL-2+",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.ez-ipupdate.com",
"description": "dynamic dns client",
"long_description": "ez-ipupdate is a small utility for updating your host name at one of the dynamic DNS services. The daemon mode is currently not working under Darwin/OS-X.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "exabgp",
"portdir": "net/exabgp",
"version": "5.0.1",
"license": "BSD",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Exa-Networks/exabgp",
"description": "BGP swiss army knife",
"long_description": "Control your network using BGP from any commodity servers and reap the benefit of software defined networking without OpenFlow. Receive parsed BGP updates in friendly form (plain text or JSON) and manipulate them with simple scripts.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py313-build",
"py313-installer",
"py313-setuptools",
"py313-wheel"
]
},
{
"type": "lib",
"ports": [
"python313"
]
}
],
"depends_on": []
},
{
"name": "ettercap",
"portdir": "net/ettercap",
"version": "0.8.3.1",
"license": "GPL-2+",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://ettercap.github.io/ettercap/",
"description": "multipurpose sniffer/interceptor/logger for switched LAN",
"long_description": "Ettercap is a multi-functional packet sniffer/interceptor/logger that works on switched LANs. It allows the active and passive dissection of numerous protocols, including ciphered ones, such as SSH1, and includes features for network and host analysis. Four modes are available: IP Based, MAC Address Based, ARP Based, and PublicARP Based.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"debug",
"gtk",
"plugins",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"ncurses",
"openssl",
"pcre",
"zlib",
"curl",
"libnet",
"libpcap",
"gtk3",
"libgeoip",
"libtool"
]
}
],
"depends_on": []
},
{
"name": "ethr",
"portdir": "net/ethr",
"version": "1.0.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/microsoft/ethr",
"description": "Ethr is a Network Performance Measurement Tool for TCP, UDP & HTTP.",
"long_description": "Ethr is a cross platform network performance measurement tool written in golang. The goal of this project is to provide a native tool for comprehensive network performance measurements of bandwidth, connections/s, packets/s, latency, loss & jitter, across multiple protocols such as TCP, UDP, HTTP, HTTPS, and across multiple platforms such as Windows, Linux and other Unix systems.",
"active": true,
"categories": [
"sysutils",
"net",
"www"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "etherape",
"portdir": "net/etherape",
"version": "0.9.20",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://etherape.sourceforge.net",
"description": "graphical network monitor",
"long_description": "EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, ip and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, FDDI, Token Ring, ISDN, PPP and SLIP devices. It can filter traffic to be shown, and can read traffic from a file as well as live from the network.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"gnome-doc-utils",
"itstool",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"libgnomeui",
"c-ares",
"glib2",
"rarian",
"libpcap",
"desktop-file-utils",
"goocanvas2",
"libglade2"
]
}
],
"depends_on": []
},
{
"name": "et",
"portdir": "net/et",
"version": "6.2.11",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/MisterTea/EternalTerminal",
"description": "a remote shell that automatically reconnects without interrupting the session",
"long_description": "Eternal Terminal (ET) is a remote shell that automatically reconnects without interrupting the session.",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"clang-20"
]
},
{
"type": "lib",
"ports": [
"zlib",
"libsodium",
"openssl",
"protobuf3-cpp"
]
}
],
"depends_on": []
},
{
"name": "esniper",
"portdir": "net/esniper",
"version": "2.35.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://esniper.sourceforge.net/",
"description": "esniper is a simple, lightweight tool for sniping ebay auctions.",
"long_description": "esniper is a simple, lightweight tool for sniping ebay auctions.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
},
{
"type": "lib",
"ports": [
"zlib",
"openssl",
"curl"
]
}
],
"depends_on": []
},
{
"name": "ergo",
"portdir": "net/ergo",
"version": "0.4.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/cristianoliveira/ergo",
"description": "A flexible reverse proxy which extends the well-known /etc/hosts declaration",
"long_description": "A flexible reverse proxy which extends the well-known /etc/hosts declaration",
"active": true,
"categories": [
"devel",
"net",
"www"
],
"maintainers": [
{
"name": "amake",
"github": "amake",
"ports_count": 163
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "elhttp",
"portdir": "net/elhttp",
"version": "0.22",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cr0.net:8040/code/network/",
"description": "the extra-light http proxy server",
"long_description": "the extra-light http proxy server",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "ejabberd",
"portdir": "net/ejabberd",
"version": "24.02",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.process-one.net/en/ejabberd/",
"description": "ejabberd is an XMPP application server.",
"long_description": "ejabberd is an XMPP application server. ejabberd stands for Erlang Jabber Daemon",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "ciserlohn",
"github": "ci42",
"ports_count": 35
}
],
"variants": [
"odbc"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"git",
"clang-16"
]
},
{
"type": "lib",
"ports": [
"expat",
"zlib",
"libiconv",
"libyaml",
"openssl",
"erlang"
]
}
],
"depends_on": []
},
{
"name": "eibd",
"portdir": "net/eibd",
"version": "0.0.5",
"license": "unknown",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.auto.tuwien.ac.at/~mkoegler/index.php/eibd",
"description": "eibd provides an interface to the EIB / KNX bus",
"long_description": "Eibd provides over a TCP/IP and/or unix domain sockets access to the EIB bus using a simple protocol. It provides access at layer 4 as well as to high level mangement function. Multiple concurrent users are supported. A special bus monitor mode call vBusmonitor is implemented, which delivers all traffic, which eibd passes, but not disturbs send activities.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"argp-standalone",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"pthsem",
"libxml2"
]
}
],
"depends_on": []
},
{
"name": "echoping",
"portdir": "net/echoping",
"version": "6.0.2",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://framagit.org/bortzmeyer/echoping",
"description": "small program to test approximate network performance",
"long_description": "echoping is a small program to test (approximately) the performance of a remote host by sending it TCP packets using \"echo\" or another protocol.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"gnutls",
"ssl",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-14"
]
},
{
"type": "lib",
"ports": [
"openldap",
"openssl",
"popt",
"libidn"
]
}
],
"depends_on": []
},
{
"name": "ec2-ls-hosts",
"portdir": "net/ec2-ls-hosts",
"version": "0.3.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/ReSTARTR/ec2-ls-hosts",
"description": "A simple cli-tool for describing ec2 instances",
"long_description": "A simple cli-tool for describing ec2 instances",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "amake",
"github": "amake",
"ports_count": 163
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "dynamips",
"portdir": "net/dynamips",
"version": "0.2.23",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/GNS3/dynamips",
"description": "Cisco router emulator",
"long_description": "Dynamips emulates a variety of Cisco routers on a traditional PC. It supports the emulation of select 7200, 3600, 3700, and 2600 series routers. It uses real Cisco IOS images (which are not part of this package). Of course, this emulator cannot replace a real router. It is simply a complementary tool to real labs for administrators of Cisco networks or people wanting to pass their CCNA/CCNP/CCIE exams.",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "lasticppc",
"github": "lastic",
"ports_count": 3
}
],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"libelf",
"libpcap"
]
}
],
"depends_on": []
},
{
"name": "duck",
"portdir": "net/duck",
"version": "7.8.5.34493",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://duck.sh/",
"description": "CLI for Cyberduck (a multi-protocol file transfer tool)",
"long_description": "The universal file transfer tool 'duck' which runs in your shell on Linux and OS X or your Windows command line prompt. Edit files on remote servers, download, upload and copy between servers with FTP, SFTP or WebDAV plus support for cloud storage Amazon S3 & OpenStack Swift deployments.",
"active": true,
"categories": [
"net"
],
"maintainers": [
{
"name": "ijackson",
"github": "JacksonIsaac",
"ports_count": 44
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "dsocks",
"portdir": "net/dsocks",
"version": "1.7",
"license": "GPL-2",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://monkey.org/~dugsong/dsocks/",
"description": "SOCKS client wrapper for *BSD / Mac OS X",
"long_description": "dsocks supports just enough of SOCKS 4 and 5 to allow non-SOCKS-aware applications to connect through either a local OpenSSH or a local Tor SOCKS proxy.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"tor"
],
"dependencies": [
{
"type": "build",
"ports": [
"bsdmake",
"clang-9.0"
]
},
{
"type": "run",
"ports": [
"openssh"
]
}
],
"depends_on": []
},
{
"name": "dsniff",
"portdir": "net/dsniff",
"version": "2.4b1",
"license": "BSD and ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://monkey.org/~dugsong/dsniff/",
"description": "network auditing and penetration testing tools",
"long_description": "dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.",
"active": false,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl10",
"libnids",
"libpcap",
"xorg-libXmu"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"snoopy"
]
}
]
},
{
"name": "dsh",
"portdir": "net/dsh",
"version": "0.25.10",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.netfort.gr.jp/~dancer/software/dsh.html.en",
"description": "Distributed shell: runs a command through rsh or ssh on a cluster of machines.",
"long_description": "Dsh executes a command remotely on several different machines at the same time. A utility to effectively do the equivalent of \"for a in $(seq 1 10); do rsh $a command; done\" in Bourne shell.",
"active": true,
"categories": [
"net"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libdshconfig"
]
},
{
"type": "run",
"ports": [
"openssh"
]
}
],
"depends_on": []
},
{
"name": "doggo",
"portdir": "net/doggo",
"version": "1.1.3",
"license": "GPL-3",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/mr-karan/doggo",
"description": "Command-line DNS Client for Humans",
"long_description": "doggo is a modern command-line DNS client (like dig) written in Golang. It outputs information in a neat concise manner and supports protocols like DoH, DoT and DNSCrypt as well. It supports DNS over HTTP, DNS over TLS, DNS over TCP/UDP, DNS over DNSCrypt, as well as JSON output.",
"active": true,
"categories": [
"sysutils",
"net"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
}
]
}