The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆97Apr 22, 2024Updated last year
Alternatives and similar repositories for AIVPN
Users that are interested in AIVPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Mar 17, 2026Updated last week
- Scanner which is capable of scanning multiple hosts or multiple subnets on an SSL port and output a CSV file with the certificate details…☆14Nov 29, 2013Updated 12 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in…☆19Dec 1, 2017Updated 8 years ago
- Cryptomator .AppImage for Linux☆14Sep 6, 2021Updated 4 years ago
- Some confusing protocol☆24Sep 14, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 10 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated last month
- Obfs4-openvpn Obfuscate your openvpn traffic through obfs4.☆26Sep 20, 2022Updated 3 years ago
- LevelUp project website☆32Aug 10, 2024Updated last year
- ☆100Nov 10, 2021Updated 4 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Landing page for Global Privacy Control (GPC)☆14Mar 18, 2026Updated last week
- Security Analytics Engine - Anomaly Detection in Web Traffic☆31Sep 18, 2025Updated 6 months ago
- ☆17Mar 21, 2019Updated 7 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Moved to https://github.com/refraction-networking/gotapdance☆31Aug 15, 2019Updated 6 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated last month
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆17Jan 20, 2023Updated 3 years ago