11/12 free views
Tool
Tool
Identity & Access Management (IAM)

opennhp

by OpenNHP

13.7Kstars
2.5Kforks
832watchers
Updated 3 months ago
About

OpenNHP is a lightweight, cryptography-powered open-source toolkit that enforces Zero Trust security by hiding network infrastructure and securing data in AI-driven environments.

A lightweight, cryptography-powered, open-source toolkit built to enforce Zero Trust security for infrastructure, applications, and data in the AI-driven world.

Primary Use Case

OpenNHP is designed for organizations and security professionals aiming to protect their infrastructure, applications, and data from AI-driven cyber threats by implementing Zero Trust principles. It is particularly useful for hiding server ports, IP addresses, and domain names to prevent unauthorized access, as well as encrypting data to maintain privacy and usability without exposure.

Key Features
  • Network-infrastructure Hiding Protocol (NHP) to conceal server ports, IPs, and domains
  • Data-object Hiding Protocol (DHP) for encrypted, confidential computing of data
  • Lightweight and cryptography-powered toolkit
  • Open-source with multi-language documentation support
  • Reduces attack surface by resource obfuscation
  • Designed to counter AI-driven Autonomous Vulnerability Exploitation (AVE)
  • Supports Zero Trust security enforcement for infrastructure and applications

Usage

>_ Access protected server at https://acdemo.opennhp.org

Demonstrates how OpenNHP hides application server ports making the server invisible to unauthenticated users

Security Frameworks
Defense Evasion
Initial Access
Reconnaissance
Credential Access
Impact
Usage Insights
  • Leverages cryptographic obfuscation to reduce attack surface against AI-driven autonomous scanning and exploitation.
  • Can be integrated with existing IAM and network security stacks to enforce Zero Trust policies dynamically.
  • Ideal for blue teams to harden infrastructure visibility and prevent reconnaissance phases of attacks.
  • Supports purple team exercises by simulating advanced evasion techniques and testing detection capabilities.
  • Recommended to combine with AI-powered threat intelligence feeds to adaptively update hiding protocols against evolving AVE threats.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about opennhp. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team80%
Blue Team60%
Purple Team70%
Details
LicenseApache License 2.0
LanguageGo
Open Issues14
Topics
cybersecurity
zero-trust
zero-trust-network-access
zero-trust-security