The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆96Apr 22, 2024Updated last year
Alternatives and similar repositories for AIVPN
Users that are interested in AIVPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A resource for anyone helping journalists and newsrooms step up their security practices.☆39Aug 16, 2023Updated 2 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 9 years ago
- eBPF Sockmap Proxy☆16Mar 5, 2022Updated 4 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Apr 8, 2026Updated last week
- Submit a description of your app, integration, project, or ideas here.☆11Oct 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- My attempt at creating an open-source licence that works on good faith, specifically crafted for adblock filterlist maintainers.☆15Dec 2, 2021Updated 4 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆15Jun 8, 2021Updated 4 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An open source software directory and release tracker.☆25Updated this week
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 10 years ago
- Network Tools☆34Nov 28, 2023Updated 2 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated last month
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- LevelUp project website☆32Aug 10, 2024Updated last year
- DEDSEC_GHOSTMAILER is a Linux-based tool ability to send emails without the need to disclose user's real identity☆10Aug 26, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆100Nov 10, 2021Updated 4 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Cross-platform registry browser for raw Windows registry files☆116Apr 15, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Moved to https://github.com/refraction-networking/gotapdance☆31Aug 15, 2019Updated 6 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated 2 months ago