AutoVpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate.
First clone the repo and cd
into the directory:
$ git clone https://github.com/adtac/autovpn
$ cd autovpn
Then run this to generate the executable:
$ go build autovpn.go
Also Read BurpBounty – Active and Passive Scan Check Builder
This requires.openvpn
To install this on a yum
-based distro:
$ sudo dnf install openvpn
If you’re on a apt
-based distro:
$ sudo apt-get install openvpn
Tested and works on Fedora 23. Dunno about Windows. Patches welcome.
Simply run:
$ ./autovpn
and you’re done. You’ll be connected to a server in the US. Welcome to the US!
You can give a country if you want. For example, if you want to connect to a server in Japan:
$ ./autovpn JP
You may need superuser privileges. Don’t worry, I’m not running underneathrm -rf --no-preserve-root /
. It’s for.openvpn
autovpn – simple automatic VPN in a country of your choice Copyright (C) 2017 Adhityaa Chandrasekar This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…