The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆97Apr 22, 2024Updated last year
Alternatives and similar repositories for AIVPN
Users that are interested in AIVPN are comparing it to the libraries listed below
Sorting:
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆858Updated this week
- A resource for anyone helping journalists and newsrooms step up their security practices.☆39Aug 16, 2023Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Landing page for Global Privacy Control (GPC)☆12Feb 1, 2026Updated last month
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆14Jun 8, 2021Updated 4 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- My attempt at creating an open-source licence that works on good faith, specifically crafted for adblock filterlist maintainers.☆15Dec 2, 2021Updated 4 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Python library for the Gemini Exchange API☆17Oct 31, 2019Updated 6 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated last month
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- log for articles and info in android for every developer☆15Apr 27, 2021Updated 4 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Jan 20, 2023Updated 3 years ago
- Cryptomator .AppImage for Linux☆14Sep 6, 2021Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 9 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 3 weeks ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- Extract crypt database from Google Drive and decrypt it.☆20Jul 12, 2021Updated 4 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆58Sep 24, 2023Updated 2 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Cross-platform registry browser for raw Windows registry files☆113Apr 15, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Serverless Optimized MODules - A Serverless Framework to create reusable micro apps☆18Jul 7, 2025Updated 8 months ago