Set up your own IPsec VPN server in just a few minutes, with IPsec/L2TP, Cisco IPsec and IKEv2. An IPsec VPN encrypts your network traffic, so that nobody between you and the VPN server can eavesdrop on your data as it travels via the Internet. This is especially useful when using unsecured networks, e.g. at coffee shops, airports or hotel rooms. We will use Libreswan as the IPsec server, and xl2tpd as the L2TP provider. Quick start: First, prepare your Linux server* with an install of Ubuntu, Debian or CentOS. Use this one-liner to set up an IPsec VPN server: wget https://get.vpnsetup.net -O vpn.sh && sudo sh vpn.sh. Your VPN login details will be randomly generated, and displayed when finished. Optional: Install WireGuard and/or OpenVPN on the same server. See the script in action (terminal recording). Note: This recording is for demo purposes only. VPN credentials in this recording are NOT valid.
FEATURES
SIMILAR TOOLS
A free DNS recursive service that blocks malicious host names and protects user privacy.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.