Proxy Servers for Windows

View 70 business solutions

Browse free open source Proxy Servers and projects for Windows below. Use the toggles on the left to filter open source Proxy Servers by OS, license, language, programming language, and project status.

  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are also available for download. NOTICE: V1 development has been stopped at the end of 2014 (1.10.1 build 16060). Possibly there will be done some bugfixing in future. Please upgrade to V2, which is and will be actively maintained.
    Leader badge
    Downloads: 40,651 This Week
    Last Update:
    See Project
  • 2
    Sing-box

    Sing-box

    The universal proxy platform

    Sing-box is a universal proxy platform written in Go with support for servers and clients across platforms. It handles multiple proxy protocols with advanced routing, supports TUN-based transparent proxying, and offers both CLI and native graphical clients.
    Downloads: 235 This Week
    Last Update:
    See Project
  • 3
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 205 This Week
    Last Update:
    See Project
  • 4
    ngrok

    ngrok

    Unified ingress for developers

    ngrok is a globally distributed, secure reverse proxy and tunneling service that exposes applications running on local machines behind NATs or firewalls to the public internet. It simplifies remote debugging, webhooks integration, and secure ingress by wrapping reverse proxy, firewall traversal, API gateway, and load-balancing functionality into a single tool. ngrok is a globally distributed reverse proxy that secures, protects and accelerates your applications and network services, no matter where you run them. You can think of ngrok as the front door to your applications. ngrok combines your reverse proxy, firewall, API gateway, and global load balancing into one. ngrok can capture and analyze all traffic to your web service for later inspection and replay.
    Downloads: 196 This Week
    Last Update:
    See Project
  • Host LLMs in Production With On-Demand GPUs Icon
    Host LLMs in Production With On-Demand GPUs

    NVIDIA L4 GPUs. 5-second cold starts. Scale to zero when idle.

    Deploy your model, get an endpoint, pay only for compute time. No GPU provisioning or infrastructure management required.
    Try Free
  • 5

    UFTP

    Encrypted UDP based FTP with multicast

    UFTP is an encrypted multicast file transfer program, designed to securely, reliably, and efficiently transfer files to multiple receivers simultaneously. This is useful for distributing large files to a large number of receivers, and is especially useful for data distribution over a satellite link (with two way communication), where the inherent delay makes any TCP based communication highly inefficient. The multicast encryption scheme is based on TLS with extensions to allow multiple receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.
    Leader badge
    Downloads: 1,253 This Week
    Last Update:
    See Project
  • 6
    Jackett

    Jackett

    API Support for your favorite torrent trackers

    Jackett works as a proxy server, it translates queries from apps (Sonarr, Radarr, SickRage, CouchPotato, Mylar3, Lidarr, DuckieTV, qBittorrent, Nefarious, etc.) into tracker-site-specific HTTP queries, parses the HTML or JSON response, and then sends results back to the requesting software. This allows for getting recent uploads (like RSS) and performing searches. Jackett is a single repository of maintained indexer scraping & translation logic, removing the burden from other apps. Trackers marked with (invite needed) have no active maintainer and may be missing features or be broken. If your client supports multiple feeds it's recommended to add each indexer directly instead of using all indexers. Using the all indexer has no advantages (besides reduced management overhead). We recommend you install Jackett as a Windows service using the supplied installer. You may also download the zipped version if you would like to configure everything manually.
    Downloads: 108 This Week
    Last Update:
    See Project
  • 7
    frp

    frp

    A Fast Reverse Proxy

    frp stands for exactly what it is: a fast reverse proxy. It helps you expose a local server behind a NAT or firewall to the Internet. It is currently under development, but already supports TCP and UDP, as well as HTTP and HTTPS protocols where requests can be forwarded to internal services by domain name. It also has a P2P connect mode and many other nifty features. These include configuration files, environment variables, a dashboard that shows you frp's status and proxies' statistics information, an Admin UI that helps you check and manage frpc's configuration, and many others.
    Downloads: 80 This Week
    Last Update:
    See Project
  • 8
    FlareSolverr

    FlareSolverr

    Proxy server to bypass Cloudflare protection

    FlareSolverr is a proxy server to bypass Cloudflare and DDoS-GUARD protection. FlareSolverr starts a proxy server, and it waits for user requests in an idle state using few resources. When some request arrives, it uses puppeteer with the stealth plugin to create a headless browser (Firefox). It opens the URL with user parameters and waits until the Cloudflare challenge is solved (or timeout). The HTML code and the cookies are sent back to the user, and those cookies can be used to bypass Cloudflare using other HTTP clients. Web browsers consume a lot of memory. If you are running FlareSolverr on a machine with few RAM, do not make many requests at once. With each request, a new browser is launched. It is also possible to use a permanent session. However, if you use sessions, you should make sure to close them as soon as you are done using them. It is recommended to install using a Docker container because the project depends on an external browser that is already included.
    Downloads: 38 This Week
    Last Update:
    See Project
  • 9
    Caddy

    Caddy

    Powerful, enterprise-ready, open source web server w/ automatic HTTPS

    Caddy is a powerful, extensible, enterprise-ready server platform that uses TLS by default. Everything you would require in your infrastructure, from TLS certificate renewals and OCSP stapling, to reverse proxying and ingress, Caddy simplifies it all. Its modular architecture lets you do more with just a single static binary that compiles for any platform. Caddy is the only web server that uses HTTPS automatically and by default. It automatically renews TLS certificates, staples OCSP responses and more. Though used mostly as an HTTPS server, Caddy can be used to run Go applications, offering automated documentation, graceful on-line config changes via API and more to these apps. Caddy is very extensible, with a powerful plugin system unlike any other web server.
    Downloads: 34 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 11
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration. Easily implement distribution by region or domain name to achieve optimal network performance. V2Ray can open multiple protocol support at the same time, including Socks, HTTP, Shadowsoks and VMess. The transmission carrier can be set separately for each protocol, such as TCP, mKCP and WebSocket. Nodes of V2Ray can be disguised as a normal website (HTTPS) to confuse its traffic with normal web traffic to avoid third-party interference. Universal reverse proxy support can achieve intranet penetration.
    Downloads: 30 This Week
    Last Update:
    See Project
  • 12
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. In GOST, GOST and other proxy services are considered as proxy nodes, GOST can handle the requests itself, or forward the requests to any one or more proxy nodes. In addition to configuring services directly from the command line, parameters can also be set by specifying the external configuration file with the -C parameter.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 13
    EdgeVPN

    EdgeVPN

    The immutable, decentralized, statically built p2p VPN

    Fully Decentralized. Immutable. Portable. Easy to use Statically compiled VPN and a reverse proxy over p2p. EdgeVPN uses libp2p to build private decentralized networks that can be accessed via shared secrets.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 14
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    mitmproxy is an open source, interactive SSL/TLS-capable intercepting HTTP proxy, with a console interface fit for HTTP/1, HTTP/2, and WebSockets. It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of features like request interception and replay. Its command-line version mitmdump allows you to write powerful addons and script mitmproxy so it can automatically modify messages, redirect traffic, and perform many other custom commands.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 15
    GoProxy

    GoProxy

    High performance proxy server implemented by golang

    The GoProxy is a high-performance http proxy, https proxy, socks5 proxy, ss proxy, websocket proxies, tcp proxies, udp proxies, game shield, game proxies. Supports forward proxies, reverse proxy, transparent proxy, internet nat proxies, https proxy load balancing, http proxy load balancing , socks5 proxies load balancing, socket proxy load balancing, ss proxy load balancing, TCP / UDP port mapping, SSH transit, TLS encrypted transmission, protocol conversion, anti-pollution DNS proxy, API authentication, speed limit, limit connection. Reverse proxy to help you expose a local server behind a NAT or firewall to the internet so that you or your visitors can access it directly and easily. Chained proxies, the program itself can be used as a proxy, and if it is set up, it can be used as a secondary proxy or even an N-level proxy.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 16
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure. Pomerium uses identity and context to ensure secure access to internal applications, servers, and infrastructure even from untrusted networks. Pomerium adds authentication and authorization to any application or server, giving IT Management a centralized panel for organization-wide control. Assert compliance in your current architecture without giving up control over data tenancy. Pomerium supports your infrastructure and can be deployed in all environments: cloud, hybrid, or on-prem. From AWS to Kubernetes and more, your internal and 3rd-party apps are covered.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 17
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. The repository includes multiple binaries such as sslocal for local SOCKS5 proxy clients and ssserver for remote proxy servers, giving developers flexible components to build customized proxy setups. It also supports modern asynchronous networking patterns, optional DNS handling, transparent proxy modes, tunneling, and advanced cipher methods.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 18
    SocksCap64

    SocksCap64

    Sockscap64 Makes your Programs Support Socks Proxy

    SocksCap64 is an easy and a beautiful way to let the programs you want to work through a specific SOCKS proxy server, even if your applications don't have such an option. It allows you to use different proxies for different programs and make a launch list for the applications you wish to have a peculiar connection. SocksCap64 does not require modifications to the Winsock applications or the Winsock stacks.
    Leader badge
    Downloads: 268 This Week
    Last Update:
    See Project
  • 19
    V2Ray-Agent

    V2Ray-Agent

    Xray, Tuic, hysteria2, sing-box

    An all-in-one V2Ray/Xray agent script to automate proxy server deployment on Linux. Supports multiple protocols (VLESS, VMess, Shadowsocks, WireGuard), automatic certificate generation, CDN node management, and multi-VPS subscription configurations—often used for network optimization or censorship circumvention.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20
    fanqiang

    fanqiang

    Over the Wall - Science Online

    Over the wall-Scientific Internet, over-the-wall tool, over-the-wall tutorial project library.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 21
    OAuth2 Proxy

    OAuth2 Proxy

    A reverse proxy that provides authentication with Google, Azure, etc.

    A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. If you are running a version older than v6.0.0 we strongly recommend you please update to the current version. After returning from the authentication provider, the OAuth tokens are stored in the configured session store (cookie, redis, ...) and a cookie is set. The request is forwarded to the upstream server with added user info and authentication headers (depending on the configuration) oauth2-proxy can be configured via command line options, environment variables or config file (in decreasing order of precedence, i.e. command line options will overwrite environment variables and environment variables will overwrite configuration file settings).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Pangolin

    Pangolin

    Identity-Aware Tunneled Reverse Proxy Server with Dashboard UI

    Pangolin is an open-source, self-hosted tunneled reverse proxy server that brings identity-aware access control and dashboard management to exposing private services securely. It allows you to connect applications and resources behind firewalls or NATs to a central hub, using encrypted tunnels rather than opening public ports or relying entirely on VPNs. With Pangolin you can route traffic from across distributed networks, enforce contextual access rules (such as SSO, geolocation, time of day, IP restrictions), and manage all of your exposed resources in one dashboard. It supports multi-site deployments and highly-available node architectures, enabling you to own your infrastructure yet still get orchestration and control benefits. Pangolin works well for individuals, teams or organizations that need to expose internal web apps, APIs, or services, while maintaining strong authentication, auditing and governance.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of network needs.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    SMTP Tunnel Proxy is a high-speed covert tunneling proxy that disguises regular TCP traffic as legitimate SMTP email communication to evade deep packet inspection (DPI) firewalls and censorship systems. It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange. The tool supports modern TLS encryption (STARTTLS) with HMAC-SHA256 authentication, per-user secrets, IP whitelisting, and multiplexed connections over a single tunnel. With a simple installer and systemd service setup, users can quickly deploy it on a Linux VPS as a tunneled access point, then connect from Windows, macOS, or Linux clients using auto-generated client packages. The project is useful for environments where standard VPNs or proxies are blocked, offering a combination of performance and stealth.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    ShadowsocksR-native

    ShadowsocksR-native

    ShadowsocksR (SSRoT) native implementation for all platforms

    ShadowsocksR-native is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. It's derived from Shadowsocks-libev.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB