Set up your own IPsec VPN server in just a few minutes, with IPsec/L2TP, Cisco IPsec and IKEv2. An IPsec VPN encrypts your network traffic, so that nobody between you and the VPN server can eavesdrop on your data as it travels via the Internet. This is especially useful when using unsecured networks, e.g. at coffee shops, airports or hotel rooms. We will use Libreswan as the IPsec server, and xl2tpd as the L2TP provider. Quick start: First, prepare your Linux server* with an install of Ubuntu, Debian or CentOS. Use this one-liner to set up an IPsec VPN server: wget https://get.vpnsetup.net -O vpn.sh && sudo sh vpn.sh. Your VPN login details will be randomly generated, and displayed when finished. Optional: Install WireGuard and/or OpenVPN on the same server. See the script in action (terminal recording). Note: This recording is for demo purposes only. VPN credentials in this recording are NOT valid.
FEATURES
ALTERNATIVES
Fast, smart, effective port scanner with extensive extendability and adaptive learning.
Azure DDoS Protection and Mitigation Services by Microsoft Azure for secure cloud solutions.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
AWS Network Firewall provides fine-grained control over network traffic and enables easy deployment of firewall security.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.