The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆97Apr 22, 2024Updated 2 years ago
Alternatives and similar repositories for AIVPN
Users that are interested in AIVPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆32Nov 13, 2024Updated last year
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆870Apr 30, 2026Updated last week
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆43Jan 30, 2022Updated 4 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27May 13, 2024Updated last year
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆15Jun 8, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 9 months ago
- Small, dependency-free, fast Nim package and CLI tool for removing tracking fields from URLs.☆11Mar 2, 2022Updated 4 years ago
- Python library for the Gemini Exchange API☆17Oct 31, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in…☆19Dec 1, 2017Updated 8 years ago
- An open source software directory and release tracker.☆25Updated this week
- https://hackaday.io/project/26823-lameboy-another-esp12-handheld☆20Sep 8, 2024Updated last year
- A Cyber Range to learn hacking (both attacking & defending) techniques locally in your computer☆132Mar 22, 2026Updated last month
- historical packet sniffer and monitoring tool☆14Sep 23, 2025Updated 7 months ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 10 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 7 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Netkeeper keeps your huawei router connected☆14Nov 15, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated 2 months ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Obfs4-openvpn Obfuscate your openvpn traffic through obfs4.☆26Sep 20, 2022Updated 3 years ago
- LevelUp project website☆32Apr 19, 2026Updated 2 weeks ago
- ☆100Nov 10, 2021Updated 4 years ago
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 6 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mobile Church of Robotron☆22Nov 22, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Jun 30, 2019Updated 6 years ago
- Cross-platform registry browser for raw Windows registry files☆117Apr 15, 2023Updated 3 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Go-based IP packet proxy☆12Jan 27, 2025Updated last year