Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done with a single command takes ~3 minutes. It will create a VPC with proper security groups. It spins up a tagged ec2 instance and configures OpenVPN software. Once instance is configured an OpenVPN configuration file is downloaded and ready to use. There is also functionality to see which instances are running in which region and ability to terminate the instance when done. Additional functionality includes specifying instance type, generate ssh keypairs, specify custom ami, change login user and more to come.
Dependencies: boto and paramiko (python packages) and aws .credentials file on system
autoVPN alternatives and similar tools
Based on the "Security" category.
Alternatively, view autoVPN alternatives based on common mentions on social networks and blogs.
OSQuery9.3 9.0 L2 autoVPN VS OSQuerySQL powered operating system instrumentation, monitoring, and analytics.
lynis8.5 1.7 autoVPN VS lynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Fail2Ban8.2 7.0 L2 autoVPN VS Fail2BanDaemon to ban hosts that cause multiple authentication errors
Wazuh7.7 9.9 autoVPN VS WazuhWazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Blackbox7.6 4.7 autoVPN VS BlackboxSafely store secrets in Git/Mercurial/Subversion
pfSense7.6 9.8 L2 autoVPN VS pfSenseMain repository for pfSense
CrowdSec7.5 8.9 autoVPN VS CrowdSecCrowdSec - the open-source and participative IPS able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.
OSSEC7.4 0.0 L2 autoVPN VS OSSECOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Suricata7.2 9.9 autoVPN VS SuricataSuricata git repository maintained by the OISF
Snort6.0 8.9 L1 autoVPN VS SnortSnort++
Kippo5.6 0.0 L4 autoVPN VS KippoKippo - SSH Honeypot
Password Pusher5.2 6.5 autoVPN VS Password Pusher🔐 An application to securely communicate passwords over the web. Passwords automatically expire after a certain number of views and/or time has passed. Track who, what and when.
fwknop4.9 0.0 L3 autoVPN VS fwknopSingle Packet Authorization > Port Knocking
Glastopf4.5 0.0 L5 autoVPN VS GlastopfWeb Application Honeypot
Denyhosts4.5 1.0 L3 autoVPN VS DenyhostsAutomated host blocking from SSH brute force attacks
Pen Test Tools4.4 0.0 L5 autoVPN VS Pen Test ToolsHomebrew Tap - Pen Test Tools
SpamAssassin3.4 4.7 L3 autoVPN VS SpamAssassinRead-only mirror of Apache SpamAssassin. Submit patches to https://bz.apache.org/SpamAssassin/. Do not send pull requests
SOCless2.8 3.2 autoVPN VS SOClessThe SOCless automation framework
Access the most powerful time series database as a service
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of autoVPN or a related project?
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done with a single command takes ~3 minutes. It will create the proper security groups. It spins up a tagged ec2 instance and configures OpenVPN software. Once instance is configured an OpenVPN configuration file is downloaded and ready to use. There is also functionality to see which instances are running in which region and ability to terminate the instance when done. Additional functionality includes specifying instance type, generate ssh keypairs, specify custom ami, change login user and more to come.
- Create on demand OpenVPN Endpoints in AWS that can easily be destroyed after done only pay for what you use.
Create a virtualenv:
mkvirtualenv -p python3 env/ source env/bin/activate
Install dependencies by running
pip install -r requirements.txt
Ensure that you have an AWS .credentials file by running:
Then type in the following and add your keys (remove parenthesis):
[default] aws_access_key_id = (your_access_key_here) aws_secret_access_key = (your_secret_key_here)
Install OpenVPN client (if needed)
- Ensure dependencies are all installed.
- Clone repo to system.
git clone https://github.com/ttlequals0/autovpn.git
- To create SSH keypair execute autovpn with -G and -r options for AWS region of choice. (optional)
NOTE: Make sure to add new key to your ssh-agent.
./autovpn -G -r us-east-1
- Execute autovpn with -C -k and -r options to deploy to AWS:
./autovpn -C -r us-east-1 -k us-east-1_vpnkey
- OpenVPN config files are downloaded to current working directory.
- Import the OpenVPN config file and connect:
sudo openvpn us-east-1_aws_vpn.ovpn
DESCRIPTION: autovpn - On Demand AWS OpenVPN Endpoint Deployment Tool. Project found at https://github.com/ttlequals0/autovpn USAGE: ACTION [OPTIONS] -C Create VPN endpoint. -D Delete keypair from region. -G Generate new keypair. -S Get all running instances in a given region. -T Terminate a OpenVPN endpoint. -d Specify custom DNS server. (ex. 184.108.40.206) -h Displays this message. -i AWS Instance type (Optional, Default is t2.micro) t2.nano t2.micro t2.small t2.medium t2.large.** -k Specify the name of AWS keypair (Required) -m Allow multiple connections to same endpoint. -r Specify AWS Region (Required) us-east-1 us-west-1 us-east-2 us-west-2 eu-west-1 eu-west-2 eu-west-3 eu-central-1 eu-north-1 ap-southeast-1 ap-northeast-1 ap-northeast-2 ap-northeast-3 ap-southeast-2 sa-east-1 ap-east-1 ca-central-1 me-south-1 -p Specify custom OpenVPN UDP port -u Specify custom ssh user.*** -y Skip confirmations -z Specify instance id. EXAMPLES: Create OpenVPN endpoint: autovpn -C -r us-east-1 -k us-east-1_vpnkey Generate keypair in a region. autovpn -G -r us-east-1 Get running instances autovpn -S -r us-east-1 Terminate OpenVPN endpoint autovpn -T -r us-east-1 -z i-b933e00c Using custom options autovpn -C -r us-east-1 -k us-east-1_vpnkey -a ami-fce3c696 -u ec2_user -i m3.medium NOTES: * - Custom AMI may be needed if changing instance type. ** - Any instance size can be given but the t2.micro is more than enough. *** - Custom user might be need if using a custom ami. **** - AWS IAM user must have EC2 or Administrator permissions set.
- Continue to update documentation
- Add deletion of Securoty Group if it is no longer in use.
- Add ability to create more client configs for one endpoint.
- Pull Requests are welcome.