NordVPN is a commercial virtual private network (VPN) service that encrypts internet connections and masks user IP addresses through a network of over 8,100 servers across 164 locations worldwide. The service creates encrypted tunnels between user devices and VPN servers using various encryption protocols, including AES-256 encryption. Users can connect up to 10 devices simultaneously under one account across multiple operating systems and browsers. Key features include: - Threat Protection Pro integrated anti-malware tool that blocks malicious downloads, phishing sites, ads, and trackers - Dark Web Monitor that scans for personal data leaks and credential breaches - Kill Switch functionality that disables internet access if VPN connection drops - Obfuscated servers for use in regions with VPN restrictions - No-logs policy regarding user bandwidth, traffic logs, IP addresses, and browsing data - Quick Connect feature for automatic server selection The service supports streaming, provides unlimited bandwidth, and includes router installation options for network-wide protection. NordVPN operates under a subscription model with various pricing tiers and offers a 30-day money-back guarantee.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
A free DNS recursive service that blocks malicious host names and protects user privacy.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.