Open Source Core v1.2.1

Multi-platform firewall analysis
that works offline, on purpose.

Transform firewall configs into actionable security intelligence. Parse OPNsense, pfSense, Cisco, Fortinet, and more. Compliance checks, dead rule detection, and audit-ready reports -- all from a single binary with zero external dependencies.

Zero Telemetry

No phone-home, no analytics, no tracking. Your configs never leave your machine.

Single Binary

Static Go binary. No runtime dependencies, no containers required, no database needed.

Airgap Ready

Designed for disconnected environments. Works identically on and off the network.

Open Source Core

All parsers Apache 2.0 licensed. Inspect the code, contribute, and trust what runs on your infra.

Platform parsers are always free.

Parsing is always free and open source. Paid tiers add analysis, compliance, and team features -- not platform support.

OPNsense

Available now

pfSense

In development

On the roadmap: Cisco ASA/IOS, FortiGate, Palo Alto, Juniper, MikroTik, Ubiquiti/UniFi

Available Today

Community Edition

Everything you need for single-config firewall analysis, audit reporting, and compliance checking. Free and open source under Apache 2.0.

Multi-Format Export

Parse firewall configs and export as structured Markdown, JSON, or YAML. Summary and comprehensive output modes.

opndossier convert -f markdown config.xml

Security Audit Reports

Three reporting perspectives: standard findings, blue team remediation priorities, and red team exploitable paths.

opndossier audit --mode red config.xml

Terminal Rendering

Rich terminal display with syntax highlighting and themed output. Review configs directly in your terminal.

opndossier display --theme dark config.xml

Compliance Checks

Built-in cybersecurity best practices, SANS firewall hardening checks, and NSA/CISA joint hardening guidelines. Plugin architecture for custom rulesets.

opndossier audit --plugins best-practices config.xml

Dead Rule Detection

Identify unused, shadowed, and redundant firewall rules. Clean up rule bloat and reduce your attack surface.

Config Diff

Compare two configs side-by-side. Track changes across backups and identify what moved between versions.

opndossier diff old.xml new.xml

Built for every operator.

From homelabbers to classified networks. Start free. Add compliance, topology, and team features as your scope grows.

Open Source

Community

Free forever

Single-config analysis for individual operators and homelabbers.

  • All platform parsers
  • Security findings & dead rule detection
  • Markdown, JSON, YAML export
  • Cybersecurity best practices checks
  • SANS firewall hardening checks
  • CISA/federal hardening guidelines
  • Config diff
  • Offline operation, zero telemetry
Get Started -- Free
Coming Soon
Individual License

Professional

TBD per major release

For consultants and red/blue teams doing multi-platform assessments.

  • Everything in Community
  • STIG compliance checks
  • Topology mapping & visualization
  • Attack path analysis
  • Red team & blue team report outputs
  • Desktop application
  • Local analysis history
Coming Soon
Site License

Enterprise

Contact Us

Centralized deployment for security teams managing network infrastructure.

  • Everything in Professional
  • Self-hosted server deployment
  • Multi-user with shared history
  • Persistent topology history
  • Custom rule authoring
  • API access
  • NIST 800-53/CSF mapping
Coming Soon
Custom

Federal & Restricted

Contact Us

For government agencies, government contractors, and enterprises with strict procurement or compliance requirements. Same software and entitlements as Enterprise -- we customize licensing and terms to meet your procurement process.

  • Everything in Enterprise
  • Offline license validation
  • Source-available for security review
  • Custom compliance frameworks
  • PO/invoice procurement
  • Commercial license option
In Development

What's coming in Pro.

The same operator-first design philosophy, applied to the hard problems. Topology mapping, attack path analysis, and compliance reporting for teams that need to close findings.

Topology Mapping

Ingest a directory of configs from multiple heterogeneous devices. Reconstruct the network topology as Mermaid diagrams, Graphviz DOT, or structured JSON/YAML. Identify trust boundaries, segmentation gaps, and implicit access paths.

Point-in-time analysis from exported configs -- not another monitoring tool. Built for red team pre-engagement recon and blue team segmentation validation.

Attack Path Analysis

Given an entry point, trace permitted paths through the reconstructed topology. Identify lateral movement opportunities and segmentation failures that exist in the config, before they exist on the wire.

Same analysis engine, two outputs: the red team report shows exploitable paths, the blue team report shows prioritized remediation.

STIG Compliance

Line-by-line STIG compliance checks against firewall configurations. STIGs define mandatory controls, not best practices -- opnDossier validates against them so you don't have to cross-reference manually.

Findings mapped to specific STIG IDs with remediation guidance. Built for the compliance workflow that gov/defense teams already follow.

Desktop Application

Native desktop app built with Wails (Go backend, native WebView). Interactive topology diagrams rendered with Mermaid JS. Local SQLite database for analysis history.

Single binary with embedded assets. Still offline, still zero dependencies, still your machine.

Get started in 30 seconds.

Install from your package manager, Homebrew, Docker, or grab the binary from GitHub Releases.

# Install via Homebrew
brew install evilbit-labs/tap/opndossier

# Analyze a config
opndossier audit config.xml

# Export to Markdown
opndossier convert -f markdown config.xml -o report.md

Ready to see what's in your firewall configs?

Start with the open source Community edition. When you need STIG compliance, topology mapping, or attack path analysis, Pro is on the way.