Showing 102 open source projects for "network"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Clash Meta for Android

    Clash Meta for Android

    A rule-based tunnel for Android

    Clash Meta for Android is an Android application that functions as a rule-based network tunneling and proxy management tool, enabling users to control how their internet traffic is routed through different proxy servers. Built on the Clash.Meta core, it allows advanced routing based on customizable rules, making it possible to selectively direct traffic for specific apps, domains, or regions. The application is commonly used for bypassing network restrictions, optimizing routing performance, and managing multiple proxy configurations in a unified interface. ...
    Downloads: 229 This Week
    Last Update:
    See Project
  • 3
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 329 This Week
    Last Update:
    See Project
  • 4
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 462 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    MasterHttpRelayVPN

    MasterHttpRelayVPN

    Domain-fronted HTTP/SOCKS5 proxy tunneling traffic through Google Apps

    ...The project emphasizes flexibility and adaptability in different network scenarios. It also provides tools for managing connections and monitoring traffic flow. Overall, it offers an alternative approach to traditional VPN solutions.
    Downloads: 100 This Week
    Last Update:
    See Project
  • 6
    Tun2Socks

    Tun2Socks

    tun2socks , powered by gVisor TCP/IP stack

    Proxy Everything: Handle all network traffic of any internet programs sent by the device through a proxy. Proxy Protocols: HTTP/Socks4/Socks5/Shadowsocks with authentication support for remote connections. Run Everywhere. Linux/macOS/Windows/FreeBSD/OpenBSD multi-platform support with specific optimization. Gateway Mode: Act as a layer three gateway to handle network traffic from other devices in the same network.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 7
    Proton VPN Windows App

    Proton VPN Windows App

    Official ProtonVPN Windows app

    ...The app integrates a custom TAP driver and a split tunnel callout driver to help route traffic securely and prevent leaks, and is structured so the GUI and service components work together to deliver a smooth user experience on Windows desktops and laptops. ProtonVPN’s Windows client supports both free and paid users with access to Proton’s global server network, encrypted tunnels, and privacy-first policies that block logging and respect user anonymity.
    Downloads: 1,154 This Week
    Last Update:
    See Project
  • 8
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. ...
    Downloads: 289 This Week
    Last Update:
    See Project
  • 9
    NekoBox for PC (NekoRay)

    NekoBox for PC (NekoRay)

    Qt based cross-platform GUI proxy configuration manager

    ...It provides a user-friendly graphical interface for managing advanced proxy and tunneling configurations using the sing-box backend. NekoBox supports a wide range of modern proxy protocols, making it suitable for users who need flexible and powerful network routing options. The application offers portable builds that run without installation, allowing quick setup and easy deployment. With support for subscription-based configurations and custom cores, it caters to both casual users and advanced networking enthusiasts. Although the project has been archived and is no longer actively maintained, NekoBox for PC remains a popular and capable tool for managing complex proxy setups.
    Downloads: 776 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 11
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 12
    NodePass

    NodePass

    TCP/UDP tunneling that delivers access across network restrictions

    ...NodePass can be used to expose internal services, bridge environments, manage tunnels, and create fast network paths through pre-established connections. Its focus is practical tunnel management with high performance, flexible instance control, and deployment patterns that work across client and server environments.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    OpenFortiVPN

    OpenFortiVPN

    Client for PPP+TLS VPN tunnel services

    openfortivpn is a command-line SSL VPN client for connecting to Fortinet FortiGate gateways without relying on proprietary GUIs. It negotiates the SSL/TLS tunnel, authenticates with credentials (and commonly with two-factor methods), then brings up a secure point-to-point interface and installs routes and DNS settings. The tool aims to be minimal and dependable: a single binary with an INI-style config file, systemd compatibility, and clear runtime diagnostics. It handles details like MTU...
    Downloads: 64 This Week
    Last Update:
    See Project
  • 14
    AWL

    AWL

    Securely connect your devices into a private network

    Anywherelan (AWL) is a peer-to-peer mesh VPN solution designed to securely connect devices across diverse networks without relying on centralized servers. By leveraging WireGuard tunneling and built-in NAT traversal, AWL facilitates seamless device connectivity at the IP level, enabling users to access services like SSH, RDP, or self-hosted applications without complex configurations. Its decentralized architecture ensures that traffic flows directly between devices, enhancing privacy and...
    Downloads: 37 This Week
    Last Update:
    See Project
  • 15
    Portable OpenSSH

    Portable OpenSSH

    Complete implementation of the SSH protocol

    ...It originates from the OpenSSH project maintained by the OpenBSD community and adapts the core OpenBSD implementation so it can run on many operating systems including Linux, macOS, and Windows. The software suite enables administrators and developers to securely log into remote systems, transfer files, and create encrypted tunnels for network traffic. By encrypting all communications between client and server, it protects against threats such as eavesdropping, connection hijacking, and data interception. The portable distribution follows the development of the main OpenSSH codebase while adding compatibility layers for multiple operating systems and authentication systems.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    fq-book

    fq-book

    Detailed Explanation of Network Proxy and VPN Applications

    ...Its value comes from combining tool-oriented guidance with broader explanations of how network access restrictions and proxy systems operate.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    docker-host

    docker-host

    A docker sidecar container to forward all traffic to local docker host

    ...It is useful in environments where containers need to reach services running on the host machine, especially when direct host networking is unavailable or inconsistent across platforms. The project creates a predictable network alias, commonly used as docker-host, so other containers can connect through a stable name. It supports TCP and UDP traffic forwarding examples and can be used inside custom Docker networks or Docker Compose setups. The container requires network-related capabilities such as NET_ADMIN and NET_RAW so it can handle forwarding behavior. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    pandora-box

    pandora-box

    Lightweight cross-platform desktop client for managing Mihomo proxies

    ...It allows users to manage proxy configurations and subscriptions through a simple and user-friendly interface rather than working directly with configuration files. Pandora-Box supports multiple proxy protocols and provides tools to organize and control network routing rules. It is designed to work for both casual users who want an easy setup and advanced users who need more control over proxy behavior. It also supports automatic rule grouping and features such as TUN mode to enable system-wide proxy routing. Pandora-Box focuses on delivering a clean interface with practical features for importing, managing, and converting proxy subscriptions. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    zoro

    zoro

    zoro can help you expose local server to external network

    Zoro is a Go-based tunneling tool for exposing local services to an external network. It supports TCP and UDP forwarding, which makes it useful for HTTP, HTTPS, SSH, DNS, and other network services. The project follows a simple client-and-server model where the remote server opens an external port and forwards traffic back to a local service. It also includes HTTPS-specific server and client modes that can map local HTTP services to subdomains under a configured domain. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Stowaway

    Stowaway

    Multi-hop Proxy Tool for pentesters

    ...It uses an admin-and-agent model that allows operators to build a chain of connected nodes across segmented networks. The tool supports active and passive connection modes, making it adaptable to different network layouts. It can route traffic through SOCKS5 and HTTP proxy settings, and it also supports TCP, HTTP-style, and WebSocket-style upstream or downstream transport modes. Stowaway includes encrypted node communication through a shared key, with optional TLS support noted in its runtime parameters. Its feature set makes it useful for studying pivoting, port forwarding, and controlled internal network routing in legitimate test environments.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Wstunnel

    Wstunnel

    Tunnel all your traffic over Websocket or HTTP2

    ...It is designed to help users reach resources through networks where direct traffic may be blocked, filtered, or difficult to route. Because WebSocket is compatible with regular HTTP infrastructure, wstunnel can work through many reverse proxies, firewalls, and web-oriented network paths. The tool supports client and server modes, static binaries, Docker deployment, reverse tunneling, SOCKS5, HTTP proxying, and multiple transport options. It is useful for developers, administrators, and advanced users who need flexible tunneling for SSH, databases, internal web services, or other authorized network access. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    ...What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. Nebula uses certificates to assert a node's IP address, name, and membership within user-defined groups.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 24
    Drip

    Drip

    Self-hosted tunneling solution to expose localhost securely

    Drip is an open-source, self-hosted tunneling solution that lets you expose local services to the internet securely on your own terms. Inspired by the idea of “lighting a small lamp on your network,” Drip creates encrypted tunnels through your own infrastructure without relying on third-party servers, giving you full control over traffic direction and network endpoints. The project supports unlimited tunnels and bandwidth, making it suitable for both development and production scenarios where conventional reverse proxies may not suffice. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    File Tunnel

    File Tunnel

    Tunnel TCP connections through a file

    ...Its documentation includes examples for bypassing firewall limitations, tunneling through FTP, using remote internet access, and routing through remote desktop file shares. File-Tunnel is best understood as a specialized connectivity workaround for controlled environments where file access exists but normal network routing does not.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB