{"id":46354778,"url":"https://github.com/hookprobe/hookprobe","last_synced_at":"2026-03-05T00:03:10.001Z","repository":{"id":245614996,"uuid":"818765314","full_name":"hookprobe/hookprobe","owner":"hookprobe","description":"🛡️ Free AI that blocks hackers while you sleep. Runs on cheap hardware. When someone in Tokyo gets attacked, you're protected in 30 seconds. No fees. No experts needed. Just protection. One node's detection → everyone's protection.","archived":false,"fork":false,"pushed_at":"2026-03-02T08:43:07.000Z","size":48334,"stargazers_count":12,"open_issues_count":0,"forks_count":2,"subscribers_count":1,"default_branch":"main","last_synced_at":"2026-03-02T12:37:33.741Z","etag":null,"topics":["ai-security","automated-mitigation","autonomous-threat-response","cybersecurity","ids","iot-security","ips","n8n","open-source-security","qsecbit","siem","small-business","soar","sql-injection-prevention","threat-detection","threat-intelligence","vxlan","vxlan-interface","waf","zero-trust"],"latest_commit_sha":null,"homepage":"https://hookprobe.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/hookprobe.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"docs/CONTRIBUTING.md","funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"docs/SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"github":"hookprobe"}},"created_at":"2024-06-22T19:52:52.000Z","updated_at":"2026-03-02T10:22:04.000Z","dependencies_parsed_at":null,"dependency_job_id":"b6c9f51f-708d-4c6c-9958-d08566a053ce","html_url":"https://github.com/hookprobe/hookprobe","commit_stats":null,"previous_names":["hookprobe/hookprobe"],"tags_count":2,"template":false,"template_full_name":null,"purl":"pkg:github/hookprobe/hookprobe","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hookprobe%2Fhookprobe","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hookprobe%2Fhookprobe/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hookprobe%2Fhookprobe/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hookprobe%2Fhookprobe/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/hookprobe","download_url":"https://codeload.github.com/hookprobe/hookprobe/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hookprobe%2Fhookprobe/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30101691,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-04T23:59:36.199Z","status":"ssl_error","status_checked_at":"2026-03-04T23:56:48.556Z","response_time":59,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ai-security","automated-mitigation","autonomous-threat-response","cybersecurity","ids","iot-security","ips","n8n","open-source-security","qsecbit","siem","small-business","soar","sql-injection-prevention","threat-detection","threat-intelligence","vxlan","vxlan-interface","waf","zero-trust"],"created_at":"2026-03-05T00:03:08.899Z","updated_at":"2026-03-05T00:03:09.958Z","avatar_url":"https://github.com/hookprobe.png","language":"Python","readme":"\u003cp align=\"center\"\u003e\n  \u003cimg src=\"assets/hookprobe-logo.svg\" alt=\"HookProbe Logo\" width=\"400\"/\u003e\n\u003c/p\u003e\n\n\u003ch1 align=\"center\"\u003eOne Node's Detection → Everyone's Protection\u003c/h1\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cstrong\u003e🛡️ A Family of Protectors Building the Future of Collective Defense 🛡️\u003c/strong\u003e\u003cbr\u003e\n  \u003cem\u003eEnterprise-grade AI security on a $75 Raspberry Pi. No vendor lock-in. No black boxes. No BS.\u003c/em\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://img.shields.io/badge/Version-5.1_Neural-00e5ff?style=flat-square\" alt=\"Version 5.1 Neural\"/\u003e\n  \u003cimg src=\"https://img.shields.io/badge/License-AGPL_v3.0_+_Commercial-blue?style=flat-square\" alt=\"Dual License\"/\u003e\n  \u003cimg src=\"https://img.shields.io/badge/Python-3.9+-3776ab?style=flat-square\u0026logo=python\u0026logoColor=white\" alt=\"Python 3.9+\"/\u003e\n  \u003cimg src=\"https://img.shields.io/badge/Platform-Linux-FCC624?style=flat-square\u0026logo=linux\u0026logoColor=black\" alt=\"Linux\"/\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://img.shields.io/badge/🔓_Open_Source-Auditable_Code-00ff88?style=flat-square\" alt=\"Open Source\"/\u003e\n  \u003cimg src=\"https://img.shields.io/badge/🔒_Privacy-Data_Never_Leaves_Edge-ff6b6b?style=flat-square\" alt=\"Privacy First\"/\u003e\n  \u003cimg src=\"https://img.shields.io/badge/🤝_Collective-Mesh_Intelligence-ffaa00?style=flat-square\" alt=\"Collective Defense\"/\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"https://mssp.hookprobe.com/?site=demo-site\"\u003e\u003cstrong\u003e🎯 Live Demo\u003c/strong\u003e\u003c/a\u003e •\n  \u003ca href=\"https://hookprobe.com\"\u003e🌐 Website\u003c/a\u003e •\n  \u003ca href=\"#-quick-start\"\u003e⚡ Quick Start\u003c/a\u003e •\n  \u003ca href=\"MANIFESTO.md\"\u003e📜 Our Manifesto\u003c/a\u003e •\n  \u003ca href=\"#-join-the-family\"\u003e🤝 Join The Family\u003c/a\u003e •\n  \u003ca href=\"docs/CONTRIBUTING.md\"\u003e🛠️ Contribute\u003c/a\u003e\n\u003c/p\u003e\n\n---\n\n## 💡 The Vision\n\n\u003e *\"In a world where attackers share everything, defenders must too.\"*\n\n**The security industry is broken.** Enterprise protection costs $50,000/year. Small businesses get ransomed. Individuals are left defenseless. Meanwhile, the bad guys collaborate in forums and marketplaces while the good guys fight alone.\n\n**We're building the resistance.**\n\nHookProbe is a **decentralized security mesh** where every node protects every other node. When a Guardian in Tokyo blocks a zero-day, a Sentinel in São Paulo is protected in seconds. When a Fortress in Berlin identifies ransomware, the entire mesh learns instantly.\n\n**⭐ Star this repo** if you believe security should be accessible to everyone. Stars help others discover protection.\n\n---\n\n## 🚀 Why HookProbe?\n\n| The Problem | Our Answer |\n|-------------|------------|\n| 💰 Security costs $50K+/year | **$75 hardware, $0 software** |\n| 🔒 Black-box algorithms | **Every decision is explainable** |\n| 🏢 Enterprise-only protection | **Same AI for everyone** |\n| 🤐 Vendors own your data | **Your data never leaves your edge** |\n| 😰 Constant manual work | **Set it and forget it** |\n| 😔 Fighting alone | **Collective mesh defense** |\n\n---\n\n## The HookProbe Promise\n\n**Transparency creates trust. Trust enables achievement.**\n\nHookProbe is built on a simple belief: security technology should empower people, not create dependency. When you can see exactly how your protection works, audit every line of code, and understand every decision the system makes, you're free to focus on what matters - building, creating, and achieving more.\n\nWe reject the security industry's black-box approach. Our code is open. Our algorithms are documented. Our data handling is verifiable. When one HookProbe node anywhere in the world detects a threat, every node learns instantly - without anyone's private data ever leaving their control.\n\n**This is security that works *for* you, not security that works *on* you.**\n\n---\n\n## Why Transparency Matters\n\n| Black-Box Security | HookProbe (Transparent) |\n|-------------------|-------------------------|\n| \"Trust us, we're protecting you\" | Audit the code yourself |\n| Your data sent to vendor clouds | Your data never leaves your edge |\n| Opaque threat scoring | See exactly why decisions are made |\n| Vendor lock-in | Open standards, your choice |\n| Security creates dependency | Security enables independence |\n| Complex interfaces hide complexity | Simple interfaces, documented complexity |\n\n**The difference:** Black boxes ask for trust. Transparency earns it.\n\n---\n\n## How HookProbe Helps You Achieve More\n\n### 1. Reclaim Your Time\n\nTraditional security demands constant attention - alerts to investigate, logs to review, updates to manage. HookProbe handles this automatically so you can focus on your actual work.\n\n- **Automated threat response** - No manual investigation needed\n- **Self-learning baselines** - Adapts to your environment\n- **Collective intelligence** - Benefits from global threat detection without effort\n\n### 2. Protect Without Complexity\n\nEnterprise security typically requires dedicated teams. HookProbe brings the same protection to anyone, regardless of technical background.\n\n```bash\n# That's it. You're protected.\n./install.sh --tier guardian\n```\n\n### 3. Scale Without Cost\n\nFrom a single Raspberry Pi to a global mesh of thousands of nodes - same technology, same transparency, scaling to your needs.\n\n| Your Situation | Solution | Investment |\n|----------------|----------|------------|\n| Home network | Guardian | $75 hardware, $0 software |\n| Small business | Fortress | $200 hardware, $0 software |\n| Growing company | Nexus | $2000 hardware, $0 software |\n\n### 4. Own Your Security Data\n\nEvery security decision, every threat detection, every response action - it's all yours. Export it. Analyze it. Verify it. No vendor has access unless you grant it.\n\n---\n\n## The Collective Defense Mesh\n\nHookProbe's most powerful feature isn't code - it's community.\n\n```\nNode A (Singapore)     Detects zero-day attack\n        │\n        ▼\nMesh Intelligence      Validates pattern, creates signature\n        │\n        ├──────────────────────────────────────┐\n        ▼                                      ▼\nNode B (London)        Node C (New York)       Node D (Berlin)\nProtected in \u003c30s      Protected in \u003c30s        Protected in \u003c30s\n```\n\n**How it works:**\n1. **Detection** - Any node detects a new threat pattern\n2. **Validation** - Mesh consensus confirms it's legitimate\n3. **Distribution** - Anonymized signature shared instantly\n4. **Protection** - All nodes block the threat\n\n**What we never share:**\n- Your raw traffic data\n- Your IP addresses\n- Your internal network details\n- Any personally identifiable information\n\n**What we share:**\n- Anonymized threat signatures\n- Attack patterns (source removed)\n- Model weight updates (federated learning)\n\nThis is collective defense that respects individual privacy.\n\n---\n\n## The HTP-DSM-NEURO-QSECBIT-NSE Security Stack\n\nHookProbe's core innovation is the integrated security stack that provides end-to-end protection from detection to response to mesh propagation.\n\n```\n┌─────────────────────────────────────────────────────────────────────────────────┐\n│                    HTP-DSM-NEURO-QSECBIT-NSE SECURITY STACK                     │\n│                  \"One node's detection → Everyone's protection\"                  │\n├─────────────────────────────────────────────────────────────────────────────────┤\n│                                                                                  │\n│  ┌─────────────┐    ┌─────────────┐    ┌─────────────┐    ┌─────────────┐      │\n│  │     HTP     │───▶│     DSM     │───▶│    NEURO    │───▶│   QSECBIT   │      │\n│  │  Transport  │    │  Consensus  │    │  Resonance  │    │   Scoring   │      │\n│  └─────────────┘    └─────────────┘    └─────────────┘    └─────────────┘      │\n│         │                  │                  │                  │              │\n│         └──────────────────┴──────────────────┴──────────────────┘              │\n│                                     │                                            │\n│                              ┌──────▼──────┐                                    │\n│                              │     NSE     │                                    │\n│                              │  Encryption │                                    │\n│                              │ (Neural AI) │                                    │\n│                              └─────────────┘                                    │\n│                                                                                  │\n│  \"Nobody knows the key - the AI communicates via neural synapses\"               │\n│                                                                                  │\n└─────────────────────────────────────────────────────────────────────────────────┘\n```\n\n### Stack Components\n\n| Component | Purpose | Innovation |\n|-----------|---------|------------|\n| **HTP** | HookProbe Transport Protocol | Post-quantum Kyber KEM, keyless authentication |\n| **DSM** | Decentralized Security Mesh | Byzantine fault-tolerant consensus, 2/3 quorum |\n| **NEURO** | Neural Resonance Protocol | Device fingerprinting via weight evolution |\n| **QSECBIT** | Quantified Security Metric | Real-time RAG scoring (GREEN/AMBER/RED) |\n| **NSE** | Neural Synaptic Encryption | Keys emerge from neural state - nobody knows the password |\n| **NAPSE** | Neural Adaptive Packet Synthesis Engine | AI-native IDS/NSM/IPS with L2-L7 deep packet analysis |\n| **AEGIS** | Autonomous AI Orchestrator | 8 specialized agents, principle-guided autonomous defense |\n\n### The NSE Innovation\n\nTraditional encryption requires sharing secrets. NSE eliminates this:\n\n```\nTraditional: \"Do you know the password?\"\nNSE:         \"Can your neural state produce the matching key?\"\n\nKeys are DERIVED from:\n├── Neural weight state (unique per device)\n├── Resonance Drift Vector (temporal)\n├── Qsecbit score (security context)\n└── Collective entropy (mesh participation)\n\nResult: Encryption where nobody knows the key\n```\n\n### E2E Security Flow\n\nWhen an attack is detected, the entire stack activates:\n\n```\n1. DETECTION   → NAPSE identifies threat (AI-native, L2-L7)\n2. SCORING     → Qsecbit RAG status (GREEN/AMBER/RED)\n3. RESPONSE    → AEGIS orchestrates defense (8 AI agents)\n4. PROPAGATION → Mesh consciousness spreads intelligence\n5. CONSENSUS   → DSM validates across validator network\n6. PROTECTION  → All nodes protected in \u003c30 seconds\n```\n\n### Adversarial Security Testing\n\nHookProbe includes AI vs AI testing - our Red Team AI attacks the stack while our Blue Team AI defends:\n\n- **9 Attack Vectors**: TER replay, timing, entropy poisoning, weight prediction, etc.\n- **CVSS Scoring**: Vulnerability severity from 0.0-10.0\n- **Automated Mitigations**: AI-suggested code-level fixes\n- **Designer Alerts**: Multi-channel notifications for critical findings\n\n\u003e \"Know your vulnerabilities before someone else does\"\n\n---\n\n## Technical Foundation (Fully Documented)\n\nEvery component is documented. Every algorithm is explained. Nothing is hidden.\n\n### Qsecbit Engine - Transparent Threat Scoring\n\nTraditional security: \"This is bad\" (trust us)\nHookProbe: \"This scores 0.72 because drift=0.25, attack_probability=0.85, decay=0.12\"\n\n```python\n# The actual formula - no secrets\nQsecbit = α·drift + β·p_attack + γ·decay + δ·q_drift + ε·energy_anomaly\n\n# You can verify every calculation\n# See: core/qsecbit/qsecbit.py\n```\n\n| Protection | Status | What It Means |\n|------------|--------|---------------|\n| \u003e 55% | 🟢 GREEN | All clear · Protected |\n| 30-55% | 🟡 AMBER | Monitoring · Stay alert |\n| \u003c 30% | 🔴 RED | Under attack · Defending |\n\n### dnsXai - Explainable DNS Protection\n\nNot just \"blocked\" - but *why* it was blocked:\n\n```\nDomain: suspicious-tracker.com\nDecision: BLOCKED\nConfidence: 92%\nReason: High entropy (4.2), matches tracking pattern, CNAME resolves to known tracker\nCategory: ADVERTISING_TRACKER\n```\n\nEvery block is explainable. Every decision is auditable.\n\n### HTP Protocol - Verifiable Security\n\nPost-quantum cryptography you can inspect:\n- **Kyber KEM** - NIST-approved, implementation viewable\n- **ChaCha20-Poly1305** - Standard authenticated encryption\n- **Entropy-based authentication** - Novel but documented\n\n### XDP/eBPF - Kernel-Level, User-Auditable\n\nDDoS mitigation at the kernel level, but you can see exactly what rules are applied:\n\n```bash\n# View active XDP rules\n./hookprobe-ctl xdp show\n\n# Understand every decision\n./hookprobe-ctl xdp explain --ip 192.168.1.100\n```\n\n---\n\n## Who Benefits from HookProbe\n\n### Home Users \u0026 Prosumers\n\n**Achieve:** Secure home network without becoming a security expert\n**Transparency benefit:** Know exactly what's being blocked and why\n**Time saved:** Set and forget - system learns your patterns\n\n### Small \u0026 Medium Businesses\n\n**Achieve:** Enterprise-grade protection without enterprise costs\n**Transparency benefit:** Audit-ready logs, explainable decisions\n**Time saved:** No dedicated security team needed\n\n### Developers \u0026 Technical Users\n\n**Achieve:** Security that integrates with your workflow\n**Transparency benefit:** Full API access, source code available\n**Time saved:** Automated responses, scriptable interfaces\n\n### Managed Service Providers\n\n**Achieve:** Offer premium security services at scale\n**Transparency benefit:** Show clients exactly how they're protected\n**Time saved:** Centralized management, automated operations\n\nExplore the [MSSP platform](https://mssp.hookprobe.com) for multi-tenant management, or [try the demo](https://mssp.hookprobe.com/?site=demo-site) instantly.\n\n---\n\n## HookProbe Cortex - See Your Mesh\n\nTransparency isn't just about code - it's about visibility.\n\nCortex is a real-time 3D visualization of your entire defense network. Watch threats arrive from across the world and see them blocked in real-time.\n\n```\n┌─────────────────────────────────────────────────────────────────┐\n│                     HOOKPROBE CORTEX                             │\n│  ┌─────────────────────────────────────────────────────────────┐│\n│  │                                                             ││\n│  │           ⬡ Nexus (ML/AI)        Attack Arc →               ││\n│  │              ↓                        ↓                     ││\n│  │    ⬡ Guardian ←───── Mesh ─────→ ⬡ Fortress                 ││\n│  │              ↓                        ↓                     ││\n│  │         ⬡ Sentinel (IoT)      ← Repelled Arc                ││\n│  │                                                             ││\n│  │  [NODES: 1,247]  [ATTACKS: 89]  [REPELLED: 89]  [QSECBIT]  ││\n│  └─────────────────────────────────────────────────────────────┘│\n│         Real-time 3D globe with attack trajectories              │\n└─────────────────────────────────────────────────────────────────┘\n```\n\n**Not a dashboard about your security. A window into your security.**\n\n[Cortex Documentation](shared/cortex/README.md) | [See the live dashboard demo](https://mssp.hookprobe.com/?site=demo-site)\n\n---\n\n## ⚡ Quick Start\n\n```bash\n# First-time setup (fresh Raspberry Pi)\nsudo apt update \u0026\u0026 sudo apt install -y git\n\n# Clone and install\ngit clone https://github.com/hookprobe/hookprobe.git\ncd hookprobe\nsudo ./install.sh --tier guardian   # 🏠 Home/Prosumer ($75 RPi, 1.5GB RAM)\n\n# Other tiers available:\n# sudo ./install.sh --tier fortress   # 🏢 Business ($200 Mini PC, 4GB RAM)\n# sudo ./install.sh --tier fortress --enable-aiochi  # With AI Eyes cognitive layer\n# sudo ./install.sh --tier nexus      # 🏗️ Enterprise ($2000 Server, 16GB+ RAM)\n```\n\n**That's it!** The install script handles everything else automatically:\n- System packages (hostapd, dnsmasq, etc.)\n- Python dependencies\n- Locale and WiFi country configuration\n- Network interface setup\n- Service configuration\n\n**⏱️ Time to protection:** ~5 minutes\n**🔄 Ongoing maintenance:** Automatic\n**💰 Software cost:** $0\n\n[📚 Full Installation Guide](docs/installation/INSTALLATION.md)\n\n---\n\n## 🎯 See It Live\n\n**Not ready to install?** Explore HookProbe's capabilities instantly — no account required.\n\n### [Try the Interactive Demo →](https://mssp.hookprobe.com/?site=demo-site)\n\nThe demo dashboard gives you hands-on access to:\n\n- **Real-time Qsecbit scoring** — Watch the resilience gauge respond to simulated threats\n- **Node management** — See how Guardian, Fortress, and Nexus nodes are monitored\n- **Threat intelligence feed** — Global attack patterns with 1-minute delay\n- **Alert management** — Severity-based triage with investigation workflows\n- **Combat Mode** — Emergency isolation controls for active incidents\n\n### Platform Links\n\n| Platform | What You'll See | Access |\n|----------|-----------------|--------|\n| [**hookprobe.com**](https://hookprobe.com) | Architecture, product tiers, pricing, FAQ | Public |\n| [**Live Demo Dashboard**](https://mssp.hookprobe.com/?site=demo-site) | Interactive MSSP dashboard with simulated data | Public (no login) |\n| [**MSSP Platform**](https://mssp.hookprobe.com) | Multi-tenant management for service providers | [Create account](https://mssp.hookprobe.com/auth/login) |\n\n\u003e Currently showing **QSECBIT: 94% 🟢** across active mesh nodes — [see it live](https://hookprobe.com)\n\n---\n\n## Our Commitment to Transparency\n\n### Open Source Foundation\n\nThe majority of HookProbe is open source under AGPL v3.0:\n- Deployment scripts and configuration\n- Guardian product tier\n- Mesh communication layer\n- Threat response modules\n- All documentation\n- Cortex visualization\n\n### Documented Innovations\n\nOur proprietary components (Qsecbit algorithm, Neural Resonance protocol, dnsXai classifier, AIOCHI cognitive layer, SLA AI business continuity) are clearly documented. You can understand *what* they do and *why* - the implementation is protected, but the purpose is transparent.\n\n### Privacy by Architecture\n\nWe didn't add privacy as an afterthought. The architecture ensures:\n- Raw data never leaves your edge\n- Only anonymized signatures are shared\n- You control what participates in the mesh\n- Compliance (GDPR, NIS2) is built-in\n\n### Community-Driven Development\n\n- Public roadmap\n- Open issue tracking\n- Community contributions welcome\n- Regular security audits\n\n[Licensing Details](LICENSING.md) | [Contributing Guide](docs/CONTRIBUTING.md)\n\n---\n\n## Architecture Overview\n\n```\nhookprobe/\n├── core/                    # Core Intelligence (documented)\n│   ├── aegis/               # AEGIS - Autonomous AI Orchestrator (proprietary)\n│   ├── napse/               # NAPSE - Neural Adaptive Packet Synthesis (proprietary)\n│   ├── htp/                 # Transport Protocol (open source)\n│   ├── qsecbit/             # AI Threat Scoring (documented, proprietary)\n│   └── neuro/               # Neural Authentication (documented, proprietary)\n│\n├── shared/                  # Shared Modules\n│   ├── dnsXai/              # AI DNS Protection (documented, proprietary)\n│   ├── mesh/                # Collective Defense (open source)\n│   ├── dsm/                 # Decentralized Security (documented, proprietary)\n│   ├── aiochi/              # AIOCHI - AI Eyes Cognitive Layer (proprietary)\n│   ├── slaai/               # SLA AI Business Continuity (proprietary)\n│   ├── response/            # Automated Response (open source)\n│   └── cortex/              # 3D Visualization (open source)\n│\n├── products/                # Deployment Tiers (mostly open source)\n│   ├── guardian/            # Home/Prosumer\n│   ├── fortress/            # Business\n│   └── nexus/               # Enterprise\n│\n└── deploy/                  # Deployment Scripts (open source)\n```\n\nEvery directory has documentation. Every module has a README.\n\n---\n\n## Resources\n\n| Resource | Description |\n|----------|-------------|\n| [**Live Demo**](https://mssp.hookprobe.com/?site=demo-site) | Try the dashboard instantly — no login required |\n| [**hookprobe.com**](https://hookprobe.com) | Product overview, pricing, and FAQ |\n| [MSSP Platform](https://mssp.hookprobe.com) | Multi-tenant management for service providers |\n| [Installation Guide](docs/installation/INSTALLATION.md) | Get started in 5 minutes |\n| [Architecture Overview](docs/architecture/HOOKPROBE-ARCHITECTURE.md) | Understand the system |\n| [Qsecbit Documentation](core/qsecbit/README.md) | How threat scoring works |\n| [Mesh Architecture](shared/mesh/ARCHITECTURE.md) | Collective defense explained |\n| [Cortex Visualization](shared/cortex/README.md) | See your security |\n| [API Reference](docs/components/README.md) | Integrate and extend |\n| [GDPR Compliance](docs/GDPR.md) | Privacy documentation |\n| [Security Policy](docs/SECURITY.md) | Report vulnerabilities |\n\n---\n\n## The HookProbe Difference\n\n**We don't ask you to trust us. We give you the tools to verify.**\n\n- Every threat decision is explainable\n- Every line of defense code is auditable\n- Every piece of your data stays under your control\n- Every node in the mesh strengthens everyone\n\n**This is what security looks like when transparency comes first.**\n\n---\n\n## 🤝 Join The Family\n\nHookProbe isn't a product. It's a **movement**. A family of people who believe that security is a right, not a privilege.\n\n### How You Can Help\n\n| Action | Impact |\n|--------|--------|\n| ⭐ **Star this repo** | Help others discover protection |\n| 🔧 **Deploy HookProbe** | Strengthen the mesh for everyone |\n| 🐛 **Find vulnerabilities** | Make the stack stronger |\n| 📝 **Contribute code/docs** | Build the future together |\n| 📢 **Share the project** | Spread the word |\n\n### What \"Family\" Means\n\n- 🔓 **We share knowledge freely** - No paywalls on protection\n- 🤝 **We help each other** - Stuck? Ask. Know something? Teach.\n- 🛠️ **We build together** - Your contribution makes everyone stronger\n- 🛡️ **We protect each other** - One node's detection → Everyone's protection\n\n**Read our [Manifesto](MANIFESTO.md)** to understand what we're building and why.\n\n---\n\n## 🎯 The Mission\n\n```\n┌─────────────────────────────────────────────────────────────────────────────┐\n│                                                                              │\n│    We're not building a product.                                            │\n│    We're building a MOVEMENT.                                               │\n│                                                                              │\n│    A world where:                                                           │\n│    • A grandmother in rural India has the same protection as a bank in NYC  │\n│    • A small business in Nigeria can't be ransomed                          │\n│    • A journalist in a dangerous country has unbreakable encryption         │\n│    • A hospital never has to choose between ransom and saving lives         │\n│                                                                              │\n│    This is possible.                                                        │\n│    This is what we're building.                                             │\n│    This is HookProbe.                                                       │\n│                                                                              │\n└─────────────────────────────────────────────────────────────────────────────┘\n```\n\n---\n\n\u003cp align=\"center\"\u003e\n  \u003cstrong\u003eHookProbe v5.1 \"Neural\"\u003c/strong\u003e\u003cbr\u003e\n  \u003cem\u003eOne Node's Detection → Everyone's Protection\u003c/em\u003e\u003cbr\u003e\n  \u003cstrong\u003eThe HTP-DSM-NEURO-QSECBIT-NSE Security Stack\u003c/strong\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cstrong\u003e🛡️ Join the family. Protect each other. Achieve more. 🛡️\u003c/strong\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"https://mssp.hookprobe.com/?site=demo-site\"\u003e🎯 Live Demo\u003c/a\u003e ·\n  \u003ca href=\"https://hookprobe.com\"\u003e🌐 Website\u003c/a\u003e ·\n  \u003ca href=\"docs/installation/INSTALLATION.md\"\u003e⚡ Get Started\u003c/a\u003e ·\n  \u003ca href=\"MANIFESTO.md\"\u003e📜 Read The Manifesto\u003c/a\u003e ·\n  \u003ca href=\"docs/CONTRIBUTING.md\"\u003e🛠️ Contribute\u003c/a\u003e ·\n  \u003ca href=\"https://github.com/hookprobe/hookprobe/discussions\"\u003e💬 Community\u003c/a\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cem\u003e\"In a world where attackers share everything, defenders must too.\"\u003c/em\u003e\n\u003c/p\u003e\n","funding_links":["https://github.com/sponsors/hookprobe"],"categories":["Security","Projects"],"sub_categories":["Low Level"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhookprobe%2Fhookprobe","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhookprobe%2Fhookprobe","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhookprobe%2Fhookprobe/lists"}