A private network system that uses WireGuard under the hood. innernet aims to take advantage of existing networking concepts like CIDRs and the security properties of WireGuard to turn your computer's basic IP networking into more powerful ACL primitives. It is not an official WireGuard project and should be considered experimental software at this early point in its lifetime. To create a coordination server for an innernet network, use 'sudo innernet-server new' and follow the init wizard to set up your network with reasonable defaults.
FEATURES
ALTERNATIVES
Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.
An open source platform for secure remote access management with granular access control and fast speeds.
A service for better visibility on networking issues in Kubernetes clusters by detecting traffic denied by iptables.
Open source software for leveraging insights from flow and packet analysis to identify potential security threats or attacks.
A technique to associate applications with TLS parameters for identifying malware and vulnerable applications.
Passive Network Audit Framework (PNAF) v0.1.2 provides passive network auditing capabilities and is now a project of COSMIC-Chapter of The Honeynet Project.
Normalize, index, enrich, and visualize network capture data using Potiron.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.