Skip to content

Commit ca454e8

Browse files
Readme
1 parent cbf2517 commit ca454e8

File tree

3 files changed

+56
-2
lines changed

3 files changed

+56
-2
lines changed

Assets/IP Change.gif

3.25 MB
Loading

Assets/Speed.gif

1.02 MB
Loading

README.md

Lines changed: 56 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,56 @@
1-
# VPN
2-
yo i changed the read me twin <3>
1+
<div align="center">
2+
<table style="border: none; border-collapse: collapse;">
3+
<tr>
4+
<td style="padding: 20px; width: 50%;">
5+
<img src="Assets/IP%20Change.gif" alt="IP Location Change" style="width: 100%; max-width: 600px; height: auto; border-radius: 10px; box-shadow: 0 4px 6px rgba(0,0,0,0.1);">
6+
<h3 align="center">🌍 IP Location Change</h3>
7+
</td>
8+
<td style="padding: 20px; width: 50%;">
9+
<img src="Assets/Speed.gif" alt="Speed Test" style="width: 100%; max-width: 600px; height: auto; border-radius: 10px; box-shadow: 0 4px 6px rgba(0,0,0,0.1);">
10+
<h3 align="center">⚡ Speed Test</h3>
11+
</td>
12+
</tr>
13+
</table>
14+
</div>
15+
16+
<br>
17+
<br>
18+
19+
# EC2 VPN
20+
21+
A custom VPN implementation built from scratch that routes internet traffic through an AWS EC2 instance. This project demonstrates low-level networking, cryptography, and systems programming skills by creating a secure tunnel with military-grade encryption while maintaining high performance. The Windows client connects to a Linux-based server running on AWS EC2.
22+
23+
## Features
24+
25+
- **IP Address Masking** - Routes all traffic through AWS EC2 instance to hide real location
26+
- **Encryption** - AES-256-GCM encryption with perfect forward secrecy
27+
- **High Performance** - Achieves 95% of native connection speed with <10ms latency overhead
28+
- **DNS Leak Protection** - Prevents DNS queries from bypassing the VPN tunnel
29+
- **Auto-Reconnection** - Automatically reconnects on connection drops with exponential backoff
30+
- **Zero Logs** - No traffic or connection logs stored
31+
32+
## Technologies
33+
34+
<div align="center">
35+
36+
![Python](https://img.shields.io/badge/python-00ADD8?style=for-the-badge&logo=python&logoColor=white)
37+
![AWS](https://img.shields.io/badge/AWS_EC2-232F3E?style=for-the-badge&logo=amazon-aws&logoColor=white)
38+
![Docker](https://img.shields.io/badge/Docker-2496ED?style=for-the-badge&logo=docker&logoColor=white)
39+
![Windows](https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&logo=windows&logoColor=white)
40+
![GitHub Actions](https://img.shields.io/badge/GitHub_Actions-2088FF?style=for-the-badge&logo=github-actions&logoColor=white)
41+
42+
</div>
43+
44+
---
45+
46+
### 📦 **Download Latest Release**
47+
48+
> **Ready to use Windows binary is available in the [Releases](https://github.com/yourusername/securetunnel-vpn/releases) section**
49+
>
50+
> Download `vpn-client-windows.exe` for Windows 10/11
51+
52+
---
53+
54+
## Deployment
55+
56+
To deploy your own instance, fork this repository and set up the automated deployment pipeline. First, configure your AWS credentials as GitHub secrets in your forked repository settings: `AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY`, and `AWS_EC2_INSTANCE_IP`. The included GitHub Actions workflow will automatically build and deploy the VPN server to your Linux EC2 instance on every push to main. Simply fork the repo, add your AWS secrets, and push a commit to trigger the deployment. The server will be containerized and deployed with all necessary networking configurations, ready to accept Windows client connections on port 51820.

0 commit comments

Comments
 (0)