Showing 33 open source projects for "network access control"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 2
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks. An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    ...All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 314 This Week
    Last Update:
    See Project
  • 4
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    ...NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of network needs.
    Downloads: 2 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Tyk API Gateway

    Tyk API Gateway

    Open Source API Gateway written in Go

    Tyk is an open source Enterprise API Gateway, supporting REST, GraphQL, TCP and gRPC protocols. Tyk Gateway is provided ‘Batteries-included’, with no feature lockout. Enabling your organization to control who accesses your APIs, when they access, and how they access it. Tyk Technologies uses the same API Gateway for all it’s applications. Protecting, securing, and processing APIs for thousands of organizations and businesses around the world. Ideal for Open Banking, building software in the clouds as well as exposing APIs to teams, partners & consumers. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Routr

    Routr

    The future of programmable SIP servers

    Lightweight sip proxy, location server, and registrar that provides a reliable and scalable SIP infrastructure for telephony carriers, communication service providers, and integrators. Routr provides all the tools required to deploy your VoIP network, including a command-line for remote server control. It can also be controlled via a RESTful API or a web-based GUI. Routr includes all tools for deploying your VoIP network. It offers remote server control via command-line, RESTful API, or a user-friendly GUI in your web browser. Our Docker image includes the server, and deployment tools, and is regularly tested with popular cloud providers, enabling effortless deployment of Routr in seconds. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    TG WS Proxy

    TG WS Proxy

    Local MTProto proxy server for partial bypassing of Telegram loading

    ...The tool is particularly useful in regions with network restrictions, enabling continued access to Telegram services. It also offers flexibility in configuration, allowing users to adapt it to different network conditions.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    Pangolin

    Pangolin

    Identity-Aware Tunneled Reverse Proxy Server with Dashboard UI

    Pangolin is an open-source, self-hosted tunneled reverse proxy server that brings identity-aware access control and dashboard management to exposing private services securely. It allows you to connect applications and resources behind firewalls or NATs to a central hub, using encrypted tunnels rather than opening public ports or relying entirely on VPNs. With Pangolin you can route traffic from across distributed networks, enforce contextual access rules (such as SSO, geolocation, time of day, IP restrictions), and manage all of your exposed resources in one dashboard. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    EdgeVPN

    EdgeVPN

    The immutable, decentralized, statically built p2p VPN

    Fully Decentralized. Immutable. Portable. Easy to use Statically compiled VPN and a reverse proxy over p2p. EdgeVPN uses libp2p to build private decentralized networks that can be accessed via shared secrets.
    Downloads: 20 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    GoProxy

    GoProxy

    High performance proxy server implemented by golang

    The GoProxy is a high-performance http proxy, https proxy, socks5 proxy, ss proxy, websocket proxies, tcp proxies, udp proxies, game shield, game proxies. Supports forward proxies, reverse proxy, transparent proxy, internet nat proxies, https proxy load balancing, http proxy load balancing , socks5 proxies load balancing, socket proxy load balancing, ss proxy load balancing, TCP / UDP port mapping, SSH transit, TLS encrypted transmission, protocol conversion, anti-pollution DNS proxy, API...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    SSPanel-UIM

    SSPanel-UIM

    Multi-purpose proxy service management system

    ...Because anonymity and reliability matter, SSPanel-UIM includes abuse checks like detection of reused accounts or suspicious traffic patterns. Many deployments are used in regions where open access is restricted and users rely on secure routing tools managed via such control planes to enforce policy and usage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 40,876 This Week
    Last Update:
    See Project
  • 14
    OpenResty Manager

    OpenResty Manager

    The most simple, powerful and beautiful server control panel.

    The most simple, powerful and beautiful host management panel, an open source alternative to OpenResty Edge, allows you to easily secure reverse proxy websites running at home or on the Internet, including access control, denial of service attack protection, automatic application and renewal of free SSL certificates, without having to know too much about OpenResty or Let's Encrypt. And it supports host management, including easy-to-use web terminals and file management, as well as Docker Composer based application store, greatly reducing the difficulty of website building and container management.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    TG WS Proxy

    TG WS Proxy

    Telegram SOCKS5 proxy with WebSocket (WSS) for acceleration and blocki

    ...This method improves connection stability and reduces latency, especially in restricted or unstable networks. If WebSocket transport is not available, the proxy automatically falls back to a direct TCP connection, ensuring uninterrupted Telegram access. TG WS Proxy supports Windows, macOS, and Linux, includes both GUI (system tray) and CLI modes, and offers easy setup with Telegram Desktop via SOCKS5 conf
    Downloads: 423 This Week
    Last Update:
    See Project
  • 16
    FastTunnel

    FastTunnel

    Expose a local server to the internet

    FastTunnel is a high-performance cross-platform intranet penetration tool. With it, you can expose intranet services to the public network for yourself or anyone to access. Unlike other penetration tools, the FastTunnel project is committed to creating an easy-to-extensible and easy-to-maintain intranet penetration framework. You can build your own penetration application by referencing the nuget package of FastTunnel.Core, and target the business extension functions you need.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Lanproxy

    Lanproxy

    Intranet penetration tool that proxies local area network computers

    Lanproxy is an intranet penetration tool that proxies local area network personal computers and servers to the public network. It supports tcp traffic forwarding and any tcp upper layer protocol (access to intranet websites, local payment interface debugging, ssh access, remote desktop, http proxy) , https proxy, socks5 proxy...). Penetration basic functions, same as the open source version, high performance, can support tens of thousands of penetration connections at the same time. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    p2p proxy network

    P2P Proxy Network by Proxies.online

    There are a lot of great features of the P2P Proxy Network. The most vital is the one that we have been discussing, getting access to the servers that we have available so that you are always anonymous. You send data to one of our proxy servers and it exits out the other side via a completely different proxy server with a completely different IP address. That means that you always have a new IP address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ngrok

    ngrok

    Unified ingress for developers

    ngrok is a globally distributed, secure reverse proxy and tunneling service that exposes applications running on local machines behind NATs or firewalls to the public internet. It simplifies remote debugging, webhooks integration, and secure ingress by wrapping reverse proxy, firewall traversal, API gateway, and load-balancing functionality into a single tool. ngrok is a globally distributed reverse proxy that secures, protects and accelerates your applications and network services, no...
    Downloads: 393 This Week
    Last Update:
    See Project
  • 20
    jkaptive

    jkaptive

    A simple captive portal

    Jkaptive is a simple captive portal without RADIUS and thus, without total security, but at the same time. without too much hassle. The reason behind this is because a lot of site administrators don't need tight security - their site is just a café which offers free internet access on an unsecured WLAN access point connected to the internet and they need a ticketing system to make it cumbersome for average people to use this offering without actually buying a single coffee. Jkaptive itself just presents the login page,checks the token and places netfilter rules. Telling apart ticketed from unticketed traffic is done through Linux' netfilter. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Squidgate

    Squidgate is a webinterface to manage squid

    PHP LDAP web interface to manage Squid Proxy Server, you can create/add/delete squid users groups and ACL (Access Control lists), change Proxy ports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Restlet Proxy Server uses the Restlet framework and allows to make access control to Restlet Server. The Restlet Proxy Server is composed by a filter that intercepts all requests. Each request is evaluated with a mechanism of PEP/PDP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DiMo
    Directory Monitor Application by WEBNETSOFT http://www.webnetsoft.gr. You need .NET 4 to run DiMo. DiMo makes use of open source framework CSharpFrame, https://sourceforge.net/projects/csharpframe.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    CLara is a framework that enables you to access the computing power of many graphics processors in an IP-based network using a kind of Client/Proxy/Server model. Its programming interface conforms to the OpenCL 1.0 standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Proxy Server Solution for SOHO (Small Offices or Home Offices). This project is contain the web-interface (PHP) for database (MySQL) & scripts (perl) for user-based access control of the SQUID Proxy Server. This solution based on the squid2mysql.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB