Showing 17 open source projects for "bypass tcp"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. Zapret implements multiple...
    Downloads: 344 This Week
    Last Update:
    See Project
  • 3
    go-libp2p

    go-libp2p

    libp2p implementation in Go

    go-libp2p is the official Go implementation of the libp2p networking stack, a modular and extensible framework for peer-to-peer communication. Used in systems like IPFS and Filecoin, go-libp2p abstracts away the complexity of building decentralized networks by handling discovery, transport, security, and multiplexing layers. Its modular architecture allows developers to customize network behavior while maintaining interoperability with other libp2p implementations. It empowers developers to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration. Easily implement distribution by region or domain name to achieve...
    Downloads: 37 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    TG WS Proxy

    TG WS Proxy

    Telegram SOCKS5 proxy with WebSocket (WSS) for acceleration and blocki

    ...This method improves connection stability and reduces latency, especially in restricted or unstable networks. If WebSocket transport is not available, the proxy automatically falls back to a direct TCP connection, ensuring uninterrupted Telegram access. TG WS Proxy supports Windows, macOS, and Linux, includes both GUI (system tray) and CLI modes, and offers easy setup with Telegram Desktop via SOCKS5 conf
    Leader badge
    Downloads: 964 This Week
    Last Update:
    See Project
  • 6
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    Value Added VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! ...
    Downloads: 60 This Week
    Last Update:
    See Project
  • 7
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    Value Added VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định
    Downloads: 68 This Week
    Last Update:
    See Project
  • 8
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU,...
    Leader badge
    Downloads: 1,151 This Week
    Last Update:
    See Project
  • 9
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ...
    Downloads: 30 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Slipstream

    Slipstream

    NAT Slipstreaming allows an attacker to remotely access any TCP/UDP

    ...The attack is able to bypass browser port restrictions by fragmenting or massaging packets so that the “exploit payload” lands in a packet boundary that gets parsed by the NAT/ALG as a legitimate protocol packet (e.g. SIP or H.323). Once successful, the NAT/firewall is deceived into opening a “hole” (port forwarding) back to the internal host, enabling the attacker to connect directly to internal services.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    GoodbyeDPI

    GoodbyeDPI

    Deep Packet Inspection circumvention utility

    This software designed to bypass Deep Packet Inspection systems found in many Internet Service Providers which block access to certain websites. It handles DPI connected using optical splitter or port mirroring (Passive DPI) which do not block any data but just replying faster than requested destination, and Active DPI connected in sequence. These scripts launch GoodbyeDPI in recommended mode with DNS resolver redirection to Yandex DNS on non-standard port (to prevent DNS poisoning). ...
    Downloads: 57 This Week
    Last Update:
    See Project
  • 12

    InstaDowner

    A Denial Of Service Tool

    This is a tool used for Denial Of Service and should only be used with permission or is to be used for testing. We have all of the following methods on our tool- UDP TCP LDAP OVH NFO VPN SSYN HOME DNS HTTP HTTPS BYPASS we also offer an attack time of up to 7200 seconds
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    India Web Proxy
    India Web Proxy v1.0 Orginal ©2010 Proxy tunnel between web sever and client. Java PHP web tunnel network socket client Internet proxy bypass surf anonymous proxy unblock TCP IP Proxy pass filter firewall, unblock YouTube Facebook Twitter Myspace.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    GTBACKUP is a server / client backup application designed to utilize RSYNC to create full offsite (or onsite) backups of Windows and Linux servers. This includes the ability to create differential backups to save space on your backup server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    This program works along side parental control software by allowing an administrative account to block outbound TCP port 443 on Windows XP computers which effectively stops the use of SSL Proxies to bypass parental control software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    netloop is a daemon that connects together two TCP/IP clients or two TCP/IP servers. used to bypass firewall blocking all incoming connections trafic by reversing connection direction
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    hidprox allows people to bypass current firewalls and proxies. It uses random TCP ports (ICMP communication is used for port negotiation). For authentication, hidprox uses the CRAM-MD5 protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB