Tunneling Software

View 8778 business solutions
Tunneling Clear Filters
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    Scrcpy GUI

    Scrcpy GUI

    A simple & beautiful GUI application for scrcpy

    Scrcpy was created by the team behind the popular Android emulator Genymotion, but it is not an Android emulator itself, it displays and controls Android devices connected via USB or TCP/IP, it does not require any root access. It works with GNU/Linux, Windows, and MacOS. Scrcpy works by running a server on your Android device, and the desktop application communicates using USB (or using ADB tunneling wireless). The server streams the H.264 video of the device screen. The client decodes the video frames and displays them. The client captures input (keyboard and mouse) events, sends them to the server, and the server injects them into the device. If you want to see your Android screen interact with the app or content on your desktop, record your phone screen or perform other basic tasks, then Scrcpy is a good choice. In short, Scrcpy is an excellent way to easily view your Android screen on your computer and interact with it in real time.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 2
    Linux and FreeBSD client for the proprietary Microsoft Point-to-Point tunneling protocol, PPTP. See the Home Page.
    Downloads: 109 This Week
    Last Update:
    See Project
  • 3
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    Seeker is an open source project that demonstrates how to obtain precise location information from devices using social engineering and web-based techniques. The tool sets up a phishing page that asks for location permissions, allowing GPS and other device data to be shared if the user consents. It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 17 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    HTTP Proxy Injector

    HTTP Proxy Injector

    Custom HTTP Proxy Header Injection Application

    HTTP Proxy Injector Custom HTTP Proxy Header Injection Application HTTP Proxy Injector is a simple but powerful tool to modify http proxy header requests and respons, to use with SSH or VPN on Windows OS. Access blocked websites behind firewall and many other functions. Free to use for everyone. Want to help HTTP Proxy Injector keep in existence and get better ? Please visit and share our Patreon, Google Sites or Facebook Page :) You can help HTTP Proxy Injector on or using : Patreon : https://www.patreon.com/httpproxyinjector KitaBisa : https://kitabisa.com/campaign/httpproxyinjector PayPal : https://paypal.me/co2thunderboy HTTP Proxy Injector support pages : Google Sites : https://hpi.co2thunderboy.net/ Facebook Page : https://www.facebook.com/co2thunderboy.net A-Developer1412 Page : https://www.facebook.com/A.Developer1412 Best Regards, co2thunderboy™ zone www.co2thunderboy.net
    Leader badge
    Downloads: 117 This Week
    Last Update:
    See Project
  • 6
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and redirect connections to your control/proxy server. You can easily hit more than 100 Mbits/sec. Here is a test using iperf from a 200Mbits/s server to a 200Mbits/s connection.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 8
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. Nebula uses certificates to assert a node's IP address, name, and membership within user-defined groups.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 9
    TunMod VPN Client

    TunMod VPN Client

    TunMod VPN Client

    TunMod VPN Client is a Windows App designed for secure VPN tunneling and seamless server connections. Featuring Payload Generator, SSH Client, SSL/TLS Tunneling, and multi-profile management, it allows for customized, encrypted connections. TunMod also supports V2Ray, Xray, and XTLS protocols,l2tp,PPTP,HTTPS,OpenVPN, making it a comprehensive solution for advanced tunneling needs. Any suggestions or bug reports: tunmodsupp@gmail.com https://github.com/TunMod/TunMod-VPN-Client
    Leader badge
    Downloads: 112 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    AWL

    AWL

    Securely connect your devices into a private network

    Anywherelan (AWL) is a peer-to-peer mesh VPN solution designed to securely connect devices across diverse networks without relying on centralized servers. By leveraging WireGuard tunneling and built-in NAT traversal, AWL facilitates seamless device connectivity at the IP level, enabling users to access services like SSH, RDP, or self-hosted applications without complex configurations. Its decentralized architecture ensures that traffic flows directly between devices, enhancing privacy and reducing latency. AWL is particularly beneficial for scenarios such as remote work, gaming, or accessing geographically restricted content.​
    Downloads: 11 This Week
    Last Update:
    See Project
  • 11
    Drip

    Drip

    Self-hosted tunneling solution to expose localhost securely

    Drip is an open-source, self-hosted tunneling solution that lets you expose local services to the internet securely on your own terms. Inspired by the idea of “lighting a small lamp on your network,” Drip creates encrypted tunnels through your own infrastructure without relying on third-party servers, giving you full control over traffic direction and network endpoints. The project supports unlimited tunnels and bandwidth, making it suitable for both development and production scenarios where conventional reverse proxies may not suffice. It is written primarily in Go, which enables high performance and cross-platform deployment with minimal overhead. Drip includes a rich command-line interface for configuring, launching, and managing tunnels and supports transport protocol selection and access control features.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. The repository includes multiple binaries such as sslocal for local SOCKS5 proxy clients and ssserver for remote proxy servers, giving developers flexible components to build customized proxy setups. It also supports modern asynchronous networking patterns, optional DNS handling, transparent proxy modes, tunneling, and advanced cipher methods.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 34 This Week
    Last Update:
    See Project
  • 14
    Portable OpenSSH

    Portable OpenSSH

    Complete implementation of the SSH protocol

    Portable OpenSSH is a cross-platform implementation of the Secure Shell (SSH) protocol that provides encrypted communication and secure remote access over untrusted networks. It originates from the OpenSSH project maintained by the OpenBSD community and adapts the core OpenBSD implementation so it can run on many operating systems including Linux, macOS, and Windows. The software suite enables administrators and developers to securely log into remote systems, transfer files, and create encrypted tunnels for network traffic. By encrypting all communications between client and server, it protects against threats such as eavesdropping, connection hijacking, and data interception. The portable distribution follows the development of the main OpenSSH codebase while adding compatibility layers for multiple operating systems and authentication systems.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    Weron

    Weron

    Overlay networks based on WebRTC.

    Weron is a peer-to-peer overlay network built using WebRTC and WebSockets, enabling remote access and tunneling between machines behind NATs without the need for centralized servers. It uses Golang on the backend and supports secure connections using WireGuard-compatible encryption. Weron allows developers to create scalable mesh or point-to-point networks for applications like remote desktop, Kubernetes access, or collaborative tools—all without requiring public IPs or complicated port forwarding.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    pandora-box

    pandora-box

    Lightweight cross-platform desktop client for managing Mihomo proxies

    Pandora-Box is a lightweight desktop client designed to provide a graphical interface for the Mihomo proxy core. It allows users to manage proxy configurations and subscriptions through a simple and user-friendly interface rather than working directly with configuration files. Pandora-Box supports multiple proxy protocols and provides tools to organize and control network routing rules. It is designed to work for both casual users who want an easy setup and advanced users who need more control over proxy behavior. It also supports automatic rule grouping and features such as TUN mode to enable system-wide proxy routing. Pandora-Box focuses on delivering a clean interface with practical features for importing, managing, and converting proxy subscriptions. Pandora-Box combines a desktop interface with backend components to create a functional proxy management environment that simplifies complex networking configurations.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    BoringTun

    BoringTun

    Userspace WireGuard Implementation in Rust

    BoringTun is a high-performance, portable implementation of the WireGuard VPN protocol written in Rust, designed so that developers and system integrators can run WireGuard tunnels entirely in user space across a variety of operating systems without kernel modules. It implements the core WireGuard protocol — including key exchange, encryption (ChaCha20-Poly1305), and authenticated transport — while omitting platform-specific tunneling stacks, allowing embedment in custom VPN client applications or userspace networking tools. The repository includes both a library for programmatic use and a command-line executable that can act as a userspace WireGuard interface on supported platforms like Linux and macOS. Because it’s written in Rust, BoringTun benefits from strong safety guarantees, memory safety without garbage collection, and cross-platform support, making it suitable for mobile, desktop, and server environments.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    RDM

    RDM

    Cross-platform GUI management tool for Redis

    Cross-platform open source database management tool for Redis. RDM is easy-to-use GUI tool available for Windows, Linux, MacOS and iPadOS. Analyse your Redis ® memory usage with RDM and remove obsolete data with bulk removal. RDM supports all latest Redis ® features: ACL, Streams, Cluster, Sentinel, ReJSON module, HyperLogLog, etc. Build-in TLS, SSH and TLS-over-SSH tunneling for easy and secure access to any redis-server. RDM works with Amazon ElastiCache, Microsoft Azure Redis Cache, Digital Ocean and other Redis ® clouds. RDM displays JSON, MessagePack, CBOR, PHP, Pickle, numpy.Array, pandas.DataFrame and binary data in human readable form and supports Native Formatters. RDM offers you an easy-to-use GUI to access your Redis ® databases and perform some basic operations. RDM allows to perform bulk operations which simplifies developer daily routines.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    Value Added VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định. 🚀 Free Psiphon3 + SNI Customization and meek proxy 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This Psiphon3 server setup is shared for educational and testing purposes only. Learn how SNI customization and meek proxy affect network censorship bypassing. 🧪 Try it on real-world networks to understand circumvention strategies. Buy +84-387554874 @Whatsapp This project use some open source components
    Downloads: 68 This Week
    Last Update:
    See Project
  • 21
    VPNCloud

    VPNCloud

    Peer-to-peer VPN

    VPNCloud is a peer-to-peer VPN solution that uses UDP tunneling to create secure, distributed virtual networks. Unlike traditional VPNs, VPNCloud creates mesh-like connections between nodes and is particularly useful for remote access, private networks, or IoT environments. It supports both encrypted and plaintext tunnels, dynamic peer discovery, and flexible routing. With minimal configuration, VPNCloud provides a lightweight way to link multiple machines across the internet as if they were on the same LAN.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce support for Spotify accounts, Instagram accounts, ssh servers, Microsoft RDP clients and Gmail accounts. Emagnet is a very powerful tool for capturing email addresses and passwords from leaked databases uploaded on Pastebin. It's almost impossible to find leaked passwords after they're removed from the list on pastebin.com. Either they have been deleted by Pastebin's techs or the upload is just one in the crowd.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    SuperEdge

    SuperEdge

    An edge-native container management system for edge computing

    SuperEdge is an open-source container management system for edge computing to manage compute resources and container applications in multiple edge regions. These resources and applications, in the current approach, are managed as one single Kubernetes cluster. A native Kubernetes cluster can be easily converted to a SuperEdge cluster. SuperEdge extends the powerful container orchestration and scheduling capabilities of Kubernetes to the edge. It makes non-intrusive enhancements to Kubernetes and is fully compatible with all Kubernetes APIs and resources. Kubernetes users can leverage SuperEdge easily for edge environments with minimal learning. When the network connection between the edge and the cloud is unstable, or the edge node is offline, the node can still work independently. But at this time, edge node can't do anything associated with writing operation, such as create/delete/update.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    pgrok

    pgrok

    HTTP/TCP reverse tunnel solution through SSH remote port forwarding

    The pgrok is a multi-tenant HTTP/TCP reverse tunnel solution through remote port forwarding from the SSH protocol. This is intended for small teams that need to expose the local development environment to the public internet, and you need to bring your own domain name and SSO provider. It gives a stable subdomain for every user and gated by your SSO through the OIDC protocol. Think of this as a bare-bones alternative to the ngrok's $65/user/month enterprise tier. Trying to put this behind a production system will blow up your SLA. For individuals and production systems, just buy ngrok, it is still my favorite.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    Value Added VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup is shared for educational and testing purposes only. Learn how SNI customization and meek proxy affect network censorship bypassing. 🧪 Try it on real-world networks to understand circumvention strategies. Buy +84-387554874 @Whatsapp This project use some open source components 🔧 Máy chủ VPNGate miễn phí có hỗ trợ SNI tùy chỉnh ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo,
    Downloads: 39 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB