GADNET - Next-Generation Security.

Just plug in to protect your home, family, and business.

GADNET is a digital shield for your home and office, turning ordinary WiFi into a fortress. It protects your family and children from online threats and criminals. It's not just another router – it's an intelligent guardian that segments and isolates devices before threats reach your data.

For specialists: GADNET integrates **NGFW** capabilities with a dedicated **internal PKI** to enforce a pure **Zero Trust** architecture. By leveraging L3/L4 micro-segmentation, mutual TLS (mTLS) authentication, and a rigorous Default Deny policy, it effectively eliminates lateral movement and secures the network edge.

Why Choose GADNET?

Zero Trust by Default

Stop intruders. Default-Deny blocks unapproved devices.

No Passwords to Steal

Unphishable. FIDO2 Biometric & Key authentication.

GDPR Compliant

Total Privacy. Local logs only, fully GDPR compliant.

Easy Setup

Fast Deploy. Automated installation in under 15 minutes.

Open Source

Transparent Security. 100% Open Source & Auditable code.

Protect Kids

Family Safety. DNS blocking for Ads, Porn & Malware.

Protect Business

Secure Remote Work. VLAN isolation for business assets.

Own CA Infrastructure

Encrypted Network. Internal CA & TLS 1.3 architecture.

GADNET vs Traditional Router

Feature Traditional Router GADNET Zero Trust
Network Trust Full trust after password Verify then trust
New Devices Instant Full Access Quarantined until approved
If Device Hacked Spreads to entire network Trapped in isolation
Smart Home (IoT) On same network as banking Isolated in safe zone
Admin Login Password (Phishable) Passkey / Hardware Key
Privacy ISP/Vendor Telemetry 100% Local & Private
Updates Ends after 2-3 years Lifetime updates

The Hidden Danger

Router security threats explained

The Hidden Danger

It's 2026. Your phone updates weekly, but your router likely runs firmware from 2020. It trusts every device that connects, becoming the weakest link in your digital life.

The average home now has 30+ connected devices. If one is outdated, it opens a backdoor to your entire network.

The Castle & Moat Failure

Traditional routers assume "inside is safe". But once a hacker breaches your smart bulb, they bypass the firewall entirely. This is called Lateral Movement.

They don't attack your PC directly. They enter through the TV, then jump to your laptop, stealing passwords and data from the inside.

The AI-IoT Nightmare

Cheap smart cameras and plugs have zero security. In 2026, AI-driven botnets scan the globe for these devices in milliseconds. 70% of IoT devices are vulnerable out of the box.

Once infected, they become spies in your living room, recording audio and launching attacks on others without you knowing.

The Home Office Risk

Your corporate laptop sits on the same WiFi as your child's tablet and smart TV. A malware infections from a "free game" your kid downloaded can easily jump to your work device, bypassing the VPN entirely.

Sensitive documents and client data stored locally are at risk. Without network isolation, a compromised smart bulb or game console could read your files, encrypt them (ransomware), or use your laptop as a bridge to attack your company.

Who Benefits?

Modern Families

Safety for the connected home
"With 35+ devices, from gaming PCs to smart fridges, GADNET is the only thing keeping our network secure."
  • Isolate unsecured IoT/Smart devices
  • Parental Control & Content Filters
  • Guest Network with speed limits

Privacy Advocates

Zero Surveillance
"My ISP shouldn't know my medical history. GADNET encrypts DNS and blocks trackers at the root."
  • Block telemetry & tracking 24/7
  • Encrypted DNS-over-HTTPS (DoH)
  • 100% Local Logs (No Cloud)

Small Business

Enterprise Grade, Startup Budget
"We needed PCI-DSS compliance without hiring a Cisco engineer. GADNET solved it automatically."
  • Segregate POS & Payment Terminals
  • Ransomware mitigation barriers
  • VoIP & Conference prioritization

High-Risk Pros

Lawyers, Journalists, Doctors
"In my field, a data leak ends my career. GADNET creates a digital fortress for my client files."
  • Protect Client/Source confidentiality
  • Secure remote access (No 3rd party)
  • Tamper-proof activity logs

What is Zero Trust?

(And Why It Changes Everything)

Zero Trust Architecture Visualization

The Simple Explanation

Imagine your network as a hotel. A traditional router gives every guest a master key that opens every room. Once you're in the building, you can go anywhere.

GADNET works differently. It gives each guest a keycard that only opens their specific room. Even if someone steals a keycard, they can only access one room—not the entire hotel.

Zero Trust: the principle that no device, user, or connection should be automatically trusted, regardless of where it comes from.

Default Deny

Block by Default. Whitelist-only access prevents unauthorized connections.

Continuous Verification

Never Trust, Always Verify. Every request is re-authenticated in real-time.

Least Privilege

Minimal Access. Users access only the specific resources they need.

Micro-Segmentation

Contain Breaches. Network divided into isolated, firewalled zones.

Restricted Access

Hardened Perimeter. External ports open only to specific, verified IPs.

Monitoring & Alerts

Full Visibility. Real-time traffic analysis and active intrusion detection.

15 min
Setup Time
$0
Subscription
100%
Open Source
A+
Security Rating
Modern Secure Office with IoT

Network Zones

Isolated

New devices

No access

Trusted

Main devices

Full access

IoT

Smart devices

Limited

Guest

Visitors

Internet only

Admin

Dashboard access

Full control

Custom

Build as needed

Flexible

Technical Specifications

Hardware

DeviceRaspberry Pi 5
RAM4GB / 8GB
Storage16GB+ MicroSD
NetworkMin. 2 Ports (WAN+LAN)

Security

EncryptionAES-256-GCM
AuthWebAuthn (FIDO2)
TLSTLS 1.3
FirewallStateful + IPS

Network

Zones4+ (Scalable)
DHCPPer-zone Server
DNSLocal + Filtering
Rules140+ Default Rules

Software

OSAlpine Linux
FrameworkFastAPI
FrontendVanilla JS (PWA)
LicenseOpen Source (MIT)

Why Trust GADNET?

Open Source Transparency

Every line of code is public. No backdoors, no hidden tracking.

Rigorous Testing

98.9% test pass rate. OWASP Top 10 compliance verified.

Privacy by Design

Zero telemetry. No cloud dependency. Your data stays local.

Standards Compliance

GDPR compliant, FIDO2 certified, TLS 1.3 encryption.

Smart Home WiFi Visualization

How to Get Started

Total: ~20 minutes, ~$100 hardware

Download & Flash

Flash GADNET to SD card

5 min

Connect & Boot

Connect to modem

10 min

Setup WiFi

Connect to GADNET-Setup

2 min

Create Admin Account

Create local account & add devices

3 min

FAQ

Do I need to be technical to use GADNET?
No. If you can connect to WiFi and use a smartphone, you can use GADNET. The setup wizard guides you through everything.
Will it work with my existing internet provider?
Yes. GADNET connects to your existing modem via Ethernet. It secures everything behind it.
What about my existing devices?
They will need to reconnect to the new GADNET WiFi. They appear in the Isolation zone until you approve them.
Is my data stored in the cloud?
No. Everything runs locally on your Raspberry Pi. No data ever leaves your network. No subscription required.
What happens if GADNET fails?
It includes automatic recovery. You can also restore from backup or reflash the SD card in minutes.
Can I use it for my business?
Yes. It allows for network segmentation compliant with GDPR and PCI-DSS requirements.
Is it really free?
Yes. GADNET is open source. You only pay for the hardware (Raspberry Pi + SD card).
How is this different from a VPN?
Unlike a VPN which typically gives access to the entire network, GADNET allows external access only after strict authorization and limits it to specific, pre-approved resources.

Support GADNET Development

GADNET is free and always will be. If you find it valuable, consider supporting development to help us add more features and keep the project sustainable.