SkillAgentSearch skills...

Openppp2

Next-generation security network access technology, providing high-performance Virtual Ethernet tunneling service.

Install / Use

/learn @liulilittle/Openppp2
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<img src="https://img.icons8.com/color/48/000000/vpn.png" width="30" height="30"> PPP PRIVATE NETWORK™ 2

Enterprise-grade Virtual Ethernet VPN Solution
Next-generation security network access technology, providing high-performance Virtual Ethernet tunneling service.

<div align="right" style="margin-top:-40px;"> <kbd> <a href="README_CN.md">简体中文</a> </kbd> <kbd style="background:#0366d6;"> <strong>English</strong> </kbd> </div>

<img src="https://img.icons8.com/color/48/000000/features-list.png" width="30" height="30"> Core Technology Features

<div style="display: grid; grid-template-columns: repeat(2, 1fr); gap: 12px;"> <div>
  • <img src="https://img.icons8.com/color/24/000000/processor.png" width="20" height="20"> Synchronous Hyper-threaded IO Technology
  • <img src="https://media.istockphoto.com/id/1469980757/vector/cloud-multi-threading-icon-in-vector-logotype.jpg?s=612x612&w=0&k=20&c=SgJXI9dkgy1l__U4m4H7Y2SJuCEJk53VpZvwxYqQqDg=" width="20" height="20"> Full Coroutine + Multithread Architecture
  • <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTIHdQXotRNOMUnypnmpRRAMGiTmgtnvmaEOw&s" width="20" height="20"> Supports Printable Plain Text Transmission
  • <img src="https://img.ixintu.com/download/jpg/20201107/570f5ecbfba462cec0568a98693aa8cc_512_321.jpg!con" width="20" height="20"> Full Duplex/Half Duplex Tunnels
  • <img src="https://img.icons8.com/color/24/000000/network.png" width="20" height="20"> VPN Virtual Subnet
  • <img src="https://img.icons8.com/color/24/000000/port.png" width="20" height="20"> Port Mapping to Public Network P-NAT2
  • <img src="https://cdn-icons-png.flaticon.com/512/7349/7349720.png" width="20" height="20"> Forward Proxy Support
  • <img src="https://img.icons8.com/color/24/000000/firewall.png" width="20" height="20"> Virtual Firewall
  • <img src="https://img.icons8.com/color/24/000000/route.png" width="20" height="20"> Virtual BGP Multi-line Diversion
  • <img src="https://img.icons8.com/color/24/000000/domain.png" width="20" height="20"> Domain Name Query Diversion
  • <img src="https://img.icons8.com/color/24/000000/router.png" width="20" height="20"> Native Support for Soft Routers
  • <img src="https://img.icons8.com/color/24/000000/airplane-mode-on.png" width="20" height="20"> PaperAirplane Layering Technology
</div> <div>
  • <img src="https://img.icons8.com/color/24/000000/network-card.png" width="20" height="20"> Dual Network Protocol Stack Support
  • <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTjxlVdSXIeMvmISIN0dupsU60ISjdSyxN7xw&s" width="20" height="20"> Broadcast Support (Non-Unicast)
  • <img src="https://www.shutterstock.com/image-vector/tunnel-sign-multi-series-style-260nw-2440158425.jpg" width="20" height="20"> Support for Multiple Tunnel Protocols
  • <img src="https://img.icons8.com/color/24/000000/merge.png" width="20" height="20"> MUX Multiplexing
  • <img src="https://img.icons8.com/color/24/000000/dns.png" width="20" height="20"> DNS Caching
  • <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSyLWW0UbSGujy4OkGa0oHvN1Ad1_YXmZGIgSHlpHz1K0-u6a_mYbw84I_aZJA8IzB-jLg&usqp=CAU" width="20" height="20"> Dedicated Virtual Memory
  • <img src="https://cdn-icons-png.flaticon.com/512/10988/10988147.png" width="20" height="20"> CDN Forwarding Support
  • <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS8vZjAno4KJAxr9K97IzoIGQiJ1ajH9FQOyA&s" width="20" height="20"> VPN Turbo
  • <img src="https://img.icons8.com/color/24/000000/fast-forward.png" width="20" height="20"> TCP Fast Open
  • <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQ2LHYDgAPNDQrrF-Es68XphlSUJ1XBbqKdpw&s" width="20" height="20"> Fixed Window Size Setting
  • <img src="https://img.icons8.com/color/24/000000/forward.png" width="20" height="20"> VPN Server Proxy Forwarding
  • <img src="https://play-lh.googleusercontent.com/Ac2LuYFUdHoiSZOVDwnlp0ozwCBMqBC7GALSUevSsQxEtq6eMVCSEGxa7FuEqXnjlw" width="20" height="20"> UDP Multi-line Bandwidth Aggregation
</div> </div>

<img src="https://img.icons8.com/color/48/000000/globe.png" width="30" height="30"> Platform Support

  • <img src="https://img.icons8.com/color/24/000000/windows8.png" width="20" height="20"> Windows
  • <img src="https://img.icons8.com/color/24/000000/linux.png" width="20" height="20"> Linux
  • <img src="https://img.icons8.com/color/24/000000/mac-logo.png" width="20" height="20"> macOS
  • <img src="https://img.icons8.com/color/24/000000/android-os.png" width="20" height="20"> Android

<img src="https://img.icons8.com/color/48/000000/processor.png" width="30" height="30"> Supported CPU Architectures

  • x86 Series
    i386 · x86_64
  • ARM Series
    armv7l · armv7a · aarch64
  • Other Architectures
    s390x · mipsel · ppc64el · riscv64

<img src="https://img.icons8.com/color/48/000000/warning-shield.png" width="30" height="30"> User License Agreement

✅ Authorized User Groups

<details open> <summary>Click to view authorized user categories</summary>
  1. 🎓 Academic Researchers
  2. 💻 Software Engineers
  3. 🌐 Network Engineers
  4. 🏢 Enterprise Users
  5. 🔬 Scientific and Technical Personnel
  6. 📦 Foreign Trade Users
  7. 🏛️ Government and Corporate Personnel
  8. 🎮 Gamers
  9. 🏬 Group Clients
  10. 🏣 Public Organizations
  11. ➰ Communication Technology
  12. ☁️ IT and Internet Users
  13. 🔒 Network Security Users
  14. 📝 Health Content Creators
  15. 🌍 Users outside Mainland China
</details>

⚠️ Usage Restrictions Warning
<img src="https://static-00.iconduck.com/assets.00/user-2-account-icon-256x256-k637t3vb.png" width="20" height="20"> Use by other users violates the agreement
<img src="https://img.icons8.com/color/24/000000/law.png" width="20" height="20"> Unauthorized use will bear legal responsibility</img>

⚠️ Eight Categories of Prohibited Behaviors and Legal Details

🚫 Classification and Legal Basis of Prohibited Behaviors

| Behavior Type | Specific Scenario | Legal Basis | Technical Features |
|-------------------|----------------------------------------|-------------------------------------------------------------------------------|----------------------------------|
| Political Security | Subverting the government/splitting | Article 105 of the Criminal Law (Subversion of State Power) | Communication via Tor dark web nodes/encrypted political channels |
| Pornography Crimes | Child pornography/cross-border prostitution | Article 364 of the Criminal Law (Dissemination of Obscene Materials) + US FOSTA Act | Hash value matching/specific payment patterns |
| Gambling Operations | Virtual currency casinos/money laundering | Article 303 of the Criminal Law (Gambling Crime) + Seychelles Gambling Act Article 45 | High-frequency small transfers/fixed odds interfaces |
| Drug Trafficking | Dark web drug markets/poison tutorials | Article 347 of the Criminal Law (Drug Crime) + US Controlled Substances Act §841 | I2P network traffic/Bitcoin mixers |
| Human Trafficking | Trafficking of labor/sexual exploitation | Article 240 of the Criminal Law (Trafficking in Women and Children) + UN Palermo Protocol | Fake recruitment websites/transnational communication groups |
| Financial Crimes | Virtual currency laundering/selling "Four Pieces" | Article 191 of the Criminal Law (Money Laundering) + US Bank Secrecy Act | Dispersed aggregate transactions/Multilevel shell wallets |
| Telecom Fraud | Impersonation of police/legal officers/scams | Article 38 of the Anti-Telecommunications Fraud Law + US FCC 47 CFR §64.1200 | VOIP spoofing/phishing page fingerprints |
| Illegal Transactions | Forgery of KYC/user privacy sale | Article 66 of the Personal Information Protection Law + EU GDPR Article 83 | Database breaches/batch identity authentication requests |

⚖️ Cross-Region Legal Supervision and Accountability Mechanism (Cross-border Judicial Enforcement Framework)

| Jurisdiction | Law Enforcement Body | Core Legal Tools | Sentencing Standards | Cross-national Cooperation Mechanism |
|-------------------|--------------------------|-----------------------|------------------------|----------------------------------------|
| Mainland China | Public Security Department Cybersecurity Bureau | Article 191 of the Criminal Law (Money Laundering) | - Money Laundering: 10 years imprisonment + 5 times involved amount fine<br>- Harm to State Security: Life imprisonment | Via Interpol Red Notices for extradition |
| USA | FBI Cyber Crime Division | Computer Fraud and Abuse Act (CFAA 18 U.S.C. §1030) | - Financial Crimes: Up to 20 years imprisonment<br>- Child Pornography: Minimum 25 years mandatory (mandatory sentencing) | Under the CLOUD Act for cross-border data requests |
| Seychelles | FIU Financial Intelligence Unit | Anti-Money Laundering Law 2020, Article 15 | - Illegal gambling: 5 years imprisonment + $100,000 fine<br>- Data crimes: Daily $10,000 progressive fines | Commonwealth judicial mutual assistance treaties for automatic enforcement |

🌐 Cross-border Investigation and Evidence Collection Process (GitHub Compatible Version)

⏱️ Forensics Timeline

| Step | Initiator | Receiver | Action | Legal Basis | Time Limit |
|-------|------------|----------|---------|--------------|------------|
| 1 | National Security Authority | FBI | Share crime evidence chain | MLAT judicial assistance agreement | 72 hours |
| 2 | FBI | Seychelles FIU | Issue freezing order for encrypted assets | Anti-Money Laundering Law 2020, Article

View on GitHub
GitHub Stars117
CategoryDevelopment
Updated1d ago
Forks30

Languages

C

Security Score

100/100

Audited on Mar 31, 2026

No findings