Nebula is a scalable overlay networking tool with a focus on performance, simplicity, and security. It allows seamless connection of computers worldwide, running on various platforms including Linux, OSX, Windows, iOS, and Android. Nebula incorporates encryption, security groups, certificates, and tunneling, bringing these concepts together to create a comprehensive solution.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Burp Suite extension that formats GraphQL requests for easier reading
Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.
6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.
A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.
A program to log login attempts on Telnet (port 23) and track the Mirai botnet
NBD is a user-space network protocol for sharing block devices over a network, allowing clients to access block devices on a server as if they were local.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
Automated signature creation using honeypots for network intrusion detection systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.