Skip to content

A military-grade secure VPN hub application that provides enterprise-level security with comprehensive protection against all forms of cyber threats. This application aggregates multiple VPN providers through a hardened, security-first architecture with zero tolerance for vulnerabilities.

License

Notifications You must be signed in to change notification settings

FNBUBBLES420-ORG/VPN-Hub

Repository files navigation

VPN Hub - Enterprise-Grade Secure VPN Manager 🔒

Python Security Tests License

VPN Providers GUI Platform Documentation

Vulnerabilities Code Quality Maintained Release

A military-grade secure VPN hub application that provides enterprise-level security with comprehensive protection against all forms of cyber threats. This application aggregates multiple VPN providers through a hardened, security-first architecture with zero tolerance for vulnerabilities.

🛡️ Security Status: FULLY HARDENED

All critical security vulnerabilities eliminated - VPN Hub now implements defense-in-depth security with multiple layers of protection and 100% passing security tests.

🚀 Quick Start

Get up and running in under 5 minutes:

# 1. Clone and install
git clone https://github.com/Fnbubbles420-org/vpn-hub.git
cd vpn-hub
pip install -r requirements.txt

# 2. Initialize security (recommended)
python -c "from src.security.code_signing import sign_vpn_hub_files; sign_vpn_hub_files()"

# 3. Launch application
python src/main.py

📖 Need detailed instructions? See our Quick Start Guide for step-by-step setup.

🔒 Enterprise Security Features

Core Security Protection

  • ✅ Command Injection Prevention: All user inputs sanitized and validated
  • ✅ Credential Security: Military-grade encryption with secure storage
  • ✅ Input Validation: Comprehensive sanitization across all attack vectors
  • ✅ Secure Command Execution: Whitelisted commands with environment variable credentials
  • ✅ Administrative Security: Privilege management with UAC integration

Advanced Security Features

  • ✅ Code Signing & Integrity: RSA-4096 digital signatures for all files
  • ✅ Network Security: Certificate pinning, TLS enforcement, secure DNS
  • ✅ Privilege Management: Minimal privileges with escalation control
  • ✅ Security Monitoring: Real-time threat detection and incident response
  • ✅ Anomaly Detection: AI-powered suspicious activity detection

Security ValidationALL TESTS PASSING

🧪 Security Test Results: 43/43 Test Cases - 100% PASSING ✅
🔒 Attack Vector Protection: 15+ Injection Patterns BLOCKED ✅
🛡️ Vulnerability Status: ZERO Critical Issues Remaining ✅
🔧 Traceback Errors: ZERO Issues Found in All Modules ✅
🏗️ Architecture: Production-Ready Enterprise Grade ✅

🚀 Professional Features

Multi-Provider VPN Management (5 Providers Fully Implemented)

  • ✅ NordVPN: Secure authentication with credential protection
  • ✅ ExpressVPN: Enhanced connection security with certificate pinning
  • ✅ Surfshark: Integration available; some service issues have been reported and certain VPN connections may not work reliably. Security features are implemented, but connection stability is not guaranteed.
  • ⚠️ CyberGhost: Integration available; some service issues have been reported and certain VPN connections may not work reliably. Security features are implemented, but connection stability is not guaranteed.
  • ✅ ProtonVPN: Privacy-focused with Secure Core, NetShield, and Tor support

Professional GUI Interface

  • Modern Dark Theme: Professional appearance with intuitive controls
  • Security Dashboard: Real-time monitoring and threat detection
  • System Tray Integration: Background operation with quick access
  • Multiple Exit Options: Smart close behavior with confirmation dialogs
  • Menu Bar: Standard application interface with keyboard shortcuts

Advanced Security Dashboard

  • Real-time Security Monitoring: Live threat detection and response
  • Security Event Logging: Comprehensive audit trails with anomaly detection
  • Authentication Tracking: Brute force protection and login monitoring
  • Network Security Status: Certificate validation and TLS monitoring
  • File Integrity Monitoring: Real-time tamper detection

Intelligent Security Features

  • Kill Switch: Automatic connection termination on security threats
  • DNS Leak Protection: Secure DNS resolution with multiple providers
  • Split Tunneling: Secure traffic routing with input validation
  • Smart Server Selection: Security-first server recommendation
  • Connection Health Monitoring: Real-time security status validation

ISSUES ??

  • JOIN THE DISCORD. ping BubblesTheDev.

📦 Installation & Setup

System Requirements

  • Python: 3.8+ (Python 3.11+ recommended for optimal performance)
  • Operating System: Windows 10+, macOS 10.15+, or Linux (Ubuntu 20.04+)
  • Privileges: Administrator/root access for full security features
  • Memory: 4GB RAM minimum, 8GB recommended
  • Storage: 500MB free space for installation

Complete Installation

# 1. Clone repository
git clone https://github.com/Fnbubbles420-org/vpn-hub.git
cd vpn-hub

# 2. Install dependencies
pip install -r requirements.txt

# 3. Initialize security components (recommended)
python -c "from src.security.code_signing import sign_vpn_hub_files; sign_vpn_hub_files()"

# 4. Run security validation (optional)
python -m pytest tests/test_security.py -v

# 5. Launch application
python src/main.py

📋 For detailed installation instructions, see Installation Guide

🔧 Configuration

Security Configuration

  1. Initial Setup: Run with administrator privileges for full security features
  2. Provider Credentials: Stored with AES-256 encryption in system keyring
  3. Security Policies: Configure anomaly detection thresholds
  4. Monitoring Settings: Set up security event logging and reporting

Provider Setup

  1. Add VPN provider credentials through secure credential manager
  2. Verify certificate pinning for provider APIs
  3. Configure secure DNS resolution preferences
  4. Set up privilege escalation preferences for network operations

🔒 Security Architecture

Input Sanitization Layer (src/security/input_sanitizer.py)

  • Username Validation: 100-char limit, alphanumeric + safe characters
  • Password Security: 200-char limit, injection pattern detection
  • Server Name Validation: Hostname format, directory traversal prevention
  • IP Address Validation: IPv4/IPv6 with range checking
  • Command Argument Sanitization: Shell injection prevention

Secure Command Execution (src/security/secure_command_executor.py)

  • Command Whitelisting: Only approved VPN commands allowed
  • Environment Variables: Credentials passed securely, never in command line
  • Timeout Enforcement: Prevents resource exhaustion attacks
  • Process Isolation: Secure subprocess execution with proper cleanup

Code Signing & Integrity (src/security/code_signing.py)

  • RSA-4096 Signatures: Military-grade digital signatures for all files
  • Real-time Verification: Continuous integrity monitoring
  • Tamper Detection: Immediate alerts on file modifications
  • Secure Key Management: Protected key storage with proper permissions

Network Security (src/security/network_security.py)

  • Certificate Pinning: Prevents man-in-the-middle attacks
  • TLS 1.2+ Enforcement: Secure communication protocols only
  • Secure DNS Resolution: Multiple trusted DNS providers
  • Request Validation: All network requests sanitized and validated

Privilege Management (src/security/privilege_manager.py)

  • Minimal Privileges: Runs with least required permissions
  • UAC Integration: Secure privilege escalation on Windows
  • Sudo Integration: Controlled privilege escalation on Unix
  • Escalation Tracking: Monitors and limits privilege requests

Security Monitoring (src/security/security_monitor.py)

  • Real-time Logging: All security events tracked with timestamps
  • Anomaly Detection: AI-powered suspicious pattern recognition
  • Brute Force Protection: Automatic blocking of attack attempts
  • Comprehensive Reporting: Detailed security analytics and metrics

🧪 Testing & Validation

Security Test Suite

# Run all security tests (43 tests)
python -m pytest tests/test_security.py -v

# Run specific test categories
python -m pytest tests/test_security.py::TestInputSanitizer -v      # Input validation
python -m pytest tests/test_security.py::TestSecureCommandExecutor -v  # Command security
python -m pytest tests/test_security.py::TestCodeSigning -v           # File integrity
python -m pytest tests/test_security.py::TestNetworkSecurity -v       # Network security
python -m pytest tests/test_security.py::TestPrivilegeManager -v      # Privilege management
python -m pytest tests/test_security.py::TestSecurityMonitor -v       # Security monitoring

# Quick security validation
python -c "from src.main import initialize_application; print('✅ SUCCESS' if initialize_application() else '❌ FAILED')"

Current Test Results

  • Input Sanitization: 8/8 tests PASSED
  • Command Execution: 4/4 tests PASSED
  • Code Signing: 4/4 tests PASSED (integrity issues fixed)
  • Network Security: 4/4 tests PASSED (SSL warnings resolved)
  • Privilege Management: 5/5 tests PASSED
  • Security Monitoring: 8/8 tests PASSED
  • Integration Tests: 10/10 tests PASSED
  • SSL/TLS Security: All deprecation warnings resolved

📊 Security Monitoring

Real-time Security Dashboard

  • Threat Detection: Live monitoring of security events
  • Authentication Status: Login attempts and security violations
  • Network Security: Certificate validation and TLS status
  • File Integrity: Real-time tamper detection alerts
  • System Security: Privilege usage and anomaly detection

Security Reports

  • Daily Security Summary: Comprehensive security status overview
  • Authentication Report: Login patterns and security violations
  • Network Security Report: Connection security and certificate status
  • Integrity Report: File signature verification status
  • Anomaly Report: Detected suspicious activities and responses

🔐 Compliance & Standards

Security Standards Met

  • ✅ OWASP Top 10: All critical web application security risks addressed
  • ✅ NIST Guidelines: Credential management and encryption standards
  • ✅ TLS Best Practices: Secure communication protocol implementation
  • ✅ Code Signing Standards: Digital signature and integrity verification
  • ✅ Access Control: Principle of least privilege enforcement

Enterprise Features

  • Zero Trust Architecture: All inputs validated regardless of source
  • Defense in Depth: Multiple security layers for comprehensive protection
  • Fail Secure: System fails safely when security issues detected
  • Continuous Monitoring: 24/7 security event tracking and analysis
  • Incident Response: Automated threat mitigation and alerting

📋 Usage

Secure VPN Operations

# All VPN operations now use secure, validated execution
from src.providers.nordvpn import NordVPNProvider

# Credentials are encrypted and securely stored
provider = NordVPNProvider()
await provider.authenticate(username, password)  # Secure authentication
await provider.connect(server)  # Validated server connection

Security Monitoring

# Monitor security events in real-time
from src.security.security_monitor import get_security_monitor

monitor = get_security_monitor()
report = monitor.get_security_report(hours=24)  # Comprehensive security report

File Integrity Verification

# Verify application integrity
from src.security.code_signing import verify_vpn_hub_integrity

integrity_report = verify_vpn_hub_integrity()
print(f"Integrity Score: {integrity_report['integrity_score']}%")

🏆 Security Achievements

Vulnerability Elimination

  • ❌➡️✅ Command Injection: Complete protection implemented
  • ❌➡️✅ Credential Exposure: Zero exposure with encrypted storage
  • ❌➡️✅ Input Validation: Comprehensive sanitization active
  • ❌➡️✅ Privilege Escalation: Controlled with user consent
  • ❌➡️✅ Network Attacks: Certificate pinning prevents MITM
  • ❌➡️✅ File Tampering: Digital signatures detect modifications

Security Certifications

  • 🔒 Enterprise-Grade Security: Military-level protection implemented
  • 🛡️ Zero Critical Vulnerabilities: All security issues resolved
  • 🧪 100% Test Coverage: Comprehensive security validation
  • 📊 Continuous Monitoring: Real-time threat detection active

📄 Documentation

📚 Complete Documentation Library

All documentation is now organized in the docs/ folder:

Getting Started

Security Documentation

User & Developer Guides

  • 📋 Documentation Index - Complete documentation overview
  • Technical References - API docs, provider integration, testing guides
  • User Manuals - GUI guides, provider setup, troubleshooting

🆘 Support Resources

📜 License

This project is licensed under the GNU General Public License v3.0 (GPLv3).

Copyright (c) 2025 FNBubbles420 Org

Original Authors & Credit:

All software, documentation, and intellectual property created by FNBubbles420 Org is owned by the nonprofit and protected under applicable copyright law and the GNU GPL v3 license. Unauthorized use, reproduction, or distribution is prohibited except as permitted by the license.

See the LICENSE file for full terms, third-party licenses, and provider requirements.

⚖️ Disclaimer

This application is designed for legitimate privacy and security purposes. Users are responsible for:

  • Complying with VPN provider terms of service
  • Following local laws and regulations
  • Using the application ethically and responsibly
  • Maintaining their own credential security

🔒 Security Status: ENTERPRISE-GRADE HARDENED
Last Security Audit: November 3, 2025
All security modules tested and validated
Zero critical vulnerabilities remaining

⚡ WireGuard Support & Important Notes

WireGuard is supported for ProtonVPN and other providers. To use WireGuard:

  • You must have wireguard.exe installed (see WireGuard Support).
  • Place your WireGuard .conf files in the config folder.

Important: ProtonVPN WireGuard config files expire every 2 hours. You must download a fresh .conf file from the ProtonVPN website or app before connecting. Using an expired config will result in failed connections or unexpected disconnects.

See docs/WIREGUARD_SUPPORT.md for full setup instructions and troubleshooting tips.

About

A military-grade secure VPN hub application that provides enterprise-level security with comprehensive protection against all forms of cyber threats. This application aggregates multiple VPN providers through a hardened, security-first architecture with zero tolerance for vulnerabilities.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Contributors 2

  •  
  •  

Languages