16 projects for "dns proxy" with 1 filter applied:

  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Blocky

    Blocky

    Fast and lightweight DNS proxy as ad-blocker for local network

    Blocky is a fast, lightweight DNS proxy and network-wide ad blocker designed for home labs and small networks that want Pi-hole-like filtering with more flexible DNS routing and modern protocol support. It blocks DNS queries using external deny lists while also supporting allow lists, and it can scope policies by client groups so different devices or households can have different rulesets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cloudflare-Socks5

    Cloudflare-Socks5

    CF-workers/pages proxy script: supports Vless-ws (tls) and Trojan-ws

    Cloudflare-Socks5 is a proxy deployment toolkit designed to leverage Cloudflare Workers and Pages to create flexible, censorship-resistant proxy nodes using protocols such as VLESS and Trojan. The project provides scripts that enable users to deploy proxy services locally without relying on external subscription providers, improving privacy and control over configuration data. It supports multiple transport modes including WebSocket with TLS, as well as optional encrypted handshake...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    v2flyNG

    v2flyNG

    A V2Ray client for Android, support v2fly core

    ...It focuses on making modern protocols—such as VMess, VLESS, and Trojan—accessible without requiring shell access or manual config editing. Profiles can be added via subscription links or QR codes, and the app merges and updates them on schedule to keep node lists fresh. Per-app proxy controls allow you to include or exclude specific applications, which is useful for balancing privacy with bandwidth and latency. The client exposes routing controls, TLS settings, custom DNS, and UDP handling so advanced users can fine-tune behavior. Status panels and logs help diagnose connectivity issues and confirm that rules are being applied as intended.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    Raccoon is a high-performance offensive security tool designed to assist with reconnaissance and vulnerability scanning during penetration testing and security assessments. It automates several common reconnaissance tasks, allowing security professionals to quickly gather information about a target system or web application. The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a...
    Downloads: 4 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Tholian Stealth

    Tholian Stealth

    Secure, Peer-to-Peer, Private and Automateable Web Browser

    Tholian Stealth is an open-source privacy-focused web browser and automation platform designed to combine secure browsing, web scraping, and proxy functionality into a unified system. It aims to prioritize user privacy and autonomy by minimizing tracking, blocking unnecessary requests, and restricting potentially harmful web technologies such as JavaScript execution. The platform operates as both a browser and a network service, capable of acting as a proxy, scraper, and content filtering...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 6,867 This Week
    Last Update:
    See Project
  • 7
    ProxyBroker

    ProxyBroker

    Asynchronous tool for finding and checking public proxy servers

    ...ProxyBroker can filter proxies based on criteria such as anonymity level, response time, country of origin, and DNS blacklist status. In addition to discovering and validating proxies, it can also function as a proxy server that distributes incoming requests across a rotating pool of working proxies. This capability allows users to route traffic through multiple proxies automatically, which can help with tasks.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10

    DNS rewriter

    simple local dns that either answer query or forward them

    Local DNS server, that act as a proxy and will rewrite request according to a config file and an "active" environement. Usefull to switch easily between diffent configuration without touch the host file. small web server embeded to display current configuration, control active environment and reload configuraiton.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DKIMproxy is an SMTP-proxy that implements the DKIM and DomainKeys standards, to sign and verify email messages using digital signatures and DNS records. It can be used to add DKIM support to nearly any existing SMTP mail server.
    Downloads: 49 This Week
    Last Update:
    See Project
  • 12

    Spondulas

    Spondulas is browser emulator designed to retrieve web pages for hunti

    Spondulas is browser emulator and parser designed to retrieve web pages for hunting malware. It supports generation of browser user agents, GET/POST requests, and SOCKS5 proxy. It can be used to parse HTML files sent via e-mail. Monitor mode allows a website to be monitored at intervals to discover changes in DNS or content over time. Autolog mode creates an investigation file that documents redirection chains. The retrieved web pages are parsed for links and reported to an output file. More information is available on the wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Camel's Eye is a powerful POP3 email filter. It supports DNS-based Blackhole Lists (DNSBL/RBL), Razor, and rules that search header or body. Features include regular expressions, scoring, deletion on server, automatic whitelisting through an SMTP proxy.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    wp-whois-proxy (wp.cgi) is a total rewrite (perl) of the famous GeekTools Whois Proxy with additional functions, a validated html/css interface, and explicit functions which should make it easier to maintain and expand.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a software system designed to "proxy" any number of dnsbl's. The system is designed to work with static, or dynamic dns zones(bind spec), sendmail access files, or libmilter and uses perl and bdb.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project intends to make a SOCKS compatible tunnel proxy which communicates to the server part, running on your nameserver, over standard DNS (UDP) protocol. That way you can bypass network firewalls allowing no other IP traffic but DNS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB