Showing 5 open source projects for "trojan vpn"

View related business solutions
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    hiddify-app

    hiddify-app

    Multi-platform auto-proxy client, supporting Sing-box, X-ray, TUIC

    Hiddify is a comprehensive VPN and proxy client designed to facilitate secure internet access and bypass censorship. It supports advanced proxy protocols like V2Ray, Shadowsocks, and Trojan, offering configuration through QR codes, links, and subscription services. Hiddify aims to be user-friendly while also catering to power users with customizable options, making it a popular choice in regions with restricted internet access.
    Downloads: 671 This Week
    Last Update:
    See Project
  • 2
    3X-UI

    3X-UI

    Xray panel supporting multi-protocol multi-user expire day

    3X‑UI is an enhanced fork of the X‑UI project, serving as a multifunctional web panel to manage VPN services. It supports multi‑protocol configurations (like VMess, VLESS, Trojan, Shadowsocks, WireGuard), offers traffic and user limits, SSL management, multilingual support, and integrates Telegram notifications for system events. Advanced, open-source web-based control panel designed for managing Xray-core server. It offers a user-friendly interface for configuring and monitoring various VPN and proxy protocols. ...
    Downloads: 82 This Week
    Last Update:
    See Project
  • 3
    V2ray Config Pool - Free VPN Config

    V2ray Config Pool - Free VPN Config

    Multi-Protocol VPN Configuration Manager

    V2ray Config Pool - Multi-Protocol Free VPN Configuration Manager Configs are updated every hour from various sources Description: V2ray Config Pool is a free Windows application designed for users who need seamless access to global VPN configurations. This powerful tool collects and organizes a wide range of protocols, including VMess, VLESS, Trojan, HTTPS, Shadowsocks, and WireGuard, from over 60 countries based on IPs and locations.
    Leader badge
    Downloads: 280 This Week
    Last Update:
    See Project
  • 4
    NetMod VPN Client (V2Ray/SSH)
    NetMod is a free, advanced VPN client and set of network tool, offering VPN protocols including SSH, HTTP(S), Socks, VMess, VLess, Trojan, Shadowsocks, ShadowsocksR, DNSTT, OpenVPN. unblock the internet censorship and stay anonymous online. Any question related to project can be asked in here: https://www.facebook.com/NetModSyna/ netmodsyna@gmail.com Telegram: https://t.me/netmod_vpn_channel Get Android version: https://play.google.com/store/apps/details?...
    Leader badge
    Downloads: 5,051 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 25 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB