Open Source Linux Tunneling Software - Page 2

Tunneling Software for Linux

View 1485 business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and redirect connections to your control/proxy server. You can easily hit more than 100 Mbits/sec. Here is a test using iperf from a 200Mbits/s server to a 200Mbits/s connection.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. Nebula uses certificates to assert a node's IP address, name, and membership within user-defined groups.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4
    AWL

    AWL

    Securely connect your devices into a private network

    Anywherelan (AWL) is a peer-to-peer mesh VPN solution designed to securely connect devices across diverse networks without relying on centralized servers. By leveraging WireGuard tunneling and built-in NAT traversal, AWL facilitates seamless device connectivity at the IP level, enabling users to access services like SSH, RDP, or self-hosted applications without complex configurations. Its decentralized architecture ensures that traffic flows directly between devices, enhancing privacy and reducing latency. AWL is particularly beneficial for scenarios such as remote work, gaming, or accessing geographically restricted content.​
    Downloads: 11 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Drip

    Drip

    Self-hosted tunneling solution to expose localhost securely

    Drip is an open-source, self-hosted tunneling solution that lets you expose local services to the internet securely on your own terms. Inspired by the idea of “lighting a small lamp on your network,” Drip creates encrypted tunnels through your own infrastructure without relying on third-party servers, giving you full control over traffic direction and network endpoints. The project supports unlimited tunnels and bandwidth, making it suitable for both development and production scenarios where conventional reverse proxies may not suffice. It is written primarily in Go, which enables high performance and cross-platform deployment with minimal overhead. Drip includes a rich command-line interface for configuring, launching, and managing tunnels and supports transport protocol selection and access control features.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 6
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. The repository includes multiple binaries such as sslocal for local SOCKS5 proxy clients and ssserver for remote proxy servers, giving developers flexible components to build customized proxy setups. It also supports modern asynchronous networking patterns, optional DNS handling, transparent proxy modes, tunneling, and advanced cipher methods.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 34 This Week
    Last Update:
    See Project
  • 8
    Portable OpenSSH

    Portable OpenSSH

    Complete implementation of the SSH protocol

    Portable OpenSSH is a cross-platform implementation of the Secure Shell (SSH) protocol that provides encrypted communication and secure remote access over untrusted networks. It originates from the OpenSSH project maintained by the OpenBSD community and adapts the core OpenBSD implementation so it can run on many operating systems including Linux, macOS, and Windows. The software suite enables administrators and developers to securely log into remote systems, transfer files, and create encrypted tunnels for network traffic. By encrypting all communications between client and server, it protects against threats such as eavesdropping, connection hijacking, and data interception. The portable distribution follows the development of the main OpenSSH codebase while adding compatibility layers for multiple operating systems and authentication systems.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Weron

    Weron

    Overlay networks based on WebRTC.

    Weron is a peer-to-peer overlay network built using WebRTC and WebSockets, enabling remote access and tunneling between machines behind NATs without the need for centralized servers. It uses Golang on the backend and supports secure connections using WireGuard-compatible encryption. Weron allows developers to create scalable mesh or point-to-point networks for applications like remote desktop, Kubernetes access, or collaborative tools—all without requiring public IPs or complicated port forwarding.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10
    pandora-box

    pandora-box

    Lightweight cross-platform desktop client for managing Mihomo proxies

    Pandora-Box is a lightweight desktop client designed to provide a graphical interface for the Mihomo proxy core. It allows users to manage proxy configurations and subscriptions through a simple and user-friendly interface rather than working directly with configuration files. Pandora-Box supports multiple proxy protocols and provides tools to organize and control network routing rules. It is designed to work for both casual users who want an easy setup and advanced users who need more control over proxy behavior. It also supports automatic rule grouping and features such as TUN mode to enable system-wide proxy routing. Pandora-Box focuses on delivering a clean interface with practical features for importing, managing, and converting proxy subscriptions. Pandora-Box combines a desktop interface with backend components to create a functional proxy management environment that simplifies complex networking configurations.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    BoringTun

    BoringTun

    Userspace WireGuard Implementation in Rust

    BoringTun is a high-performance, portable implementation of the WireGuard VPN protocol written in Rust, designed so that developers and system integrators can run WireGuard tunnels entirely in user space across a variety of operating systems without kernel modules. It implements the core WireGuard protocol — including key exchange, encryption (ChaCha20-Poly1305), and authenticated transport — while omitting platform-specific tunneling stacks, allowing embedment in custom VPN client applications or userspace networking tools. The repository includes both a library for programmatic use and a command-line executable that can act as a userspace WireGuard interface on supported platforms like Linux and macOS. Because it’s written in Rust, BoringTun benefits from strong safety guarantees, memory safety without garbage collection, and cross-platform support, making it suitable for mobile, desktop, and server environments.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    RDM

    RDM

    Cross-platform GUI management tool for Redis

    Cross-platform open source database management tool for Redis. RDM is easy-to-use GUI tool available for Windows, Linux, MacOS and iPadOS. Analyse your Redis ® memory usage with RDM and remove obsolete data with bulk removal. RDM supports all latest Redis ® features: ACL, Streams, Cluster, Sentinel, ReJSON module, HyperLogLog, etc. Build-in TLS, SSH and TLS-over-SSH tunneling for easy and secure access to any redis-server. RDM works with Amazon ElastiCache, Microsoft Azure Redis Cache, Digital Ocean and other Redis ® clouds. RDM displays JSON, MessagePack, CBOR, PHP, Pickle, numpy.Array, pandas.DataFrame and binary data in human readable form and supports Native Formatters. RDM offers you an easy-to-use GUI to access your Redis ® databases and perform some basic operations. RDM allows to perform bulk operations which simplifies developer daily routines.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce support for Spotify accounts, Instagram accounts, ssh servers, Microsoft RDP clients and Gmail accounts. Emagnet is a very powerful tool for capturing email addresses and passwords from leaked databases uploaded on Pastebin. It's almost impossible to find leaked passwords after they're removed from the list on pastebin.com. Either they have been deleted by Pastebin's techs or the upload is just one in the crowd.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    SuperEdge

    SuperEdge

    An edge-native container management system for edge computing

    SuperEdge is an open-source container management system for edge computing to manage compute resources and container applications in multiple edge regions. These resources and applications, in the current approach, are managed as one single Kubernetes cluster. A native Kubernetes cluster can be easily converted to a SuperEdge cluster. SuperEdge extends the powerful container orchestration and scheduling capabilities of Kubernetes to the edge. It makes non-intrusive enhancements to Kubernetes and is fully compatible with all Kubernetes APIs and resources. Kubernetes users can leverage SuperEdge easily for edge environments with minimal learning. When the network connection between the edge and the cloud is unstable, or the edge node is offline, the node can still work independently. But at this time, edge node can't do anything associated with writing operation, such as create/delete/update.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    pgrok

    pgrok

    HTTP/TCP reverse tunnel solution through SSH remote port forwarding

    The pgrok is a multi-tenant HTTP/TCP reverse tunnel solution through remote port forwarding from the SSH protocol. This is intended for small teams that need to expose the local development environment to the public internet, and you need to bring your own domain name and SSO provider. It gives a stable subdomain for every user and gated by your SSO through the OIDC protocol. Think of this as a bare-bones alternative to the ngrok's $65/user/month enterprise tier. Trying to put this behind a production system will blow up your SLA. For individuals and production systems, just buy ngrok, it is still my favorite.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    Enables tunneling of network connections through restrictive HTTP proxies. Features: Portmapping, SOCKS4, SOCKS5, web-based admin interface, possibility to use standalone server (perl) or hosted server (PHP), optional authorization from LDAP or MySQL
    Downloads: 23 This Week
    Last Update:
    See Project
  • 18
    Expose

    Expose

    A beautiful, fully open-source, tunneling service

    Expose is an open source tunneling service that allows developers to securely share locally running web applications with the public internet through temporary public URLs. The project functions as an alternative to tools like ngrok by creating encrypted tunnels that route incoming requests from a publicly accessible server directly to a developer’s local machine. This makes it possible to test webhooks, demonstrate applications, or collaborate with teammates without deploying the project to a staging server. Expose is written in PHP and can be self-hosted, giving developers full control over their infrastructure, domains, and traffic while avoiding reliance on third-party tunneling services. The system includes both a client and server component, where the client runs locally and the server manages incoming connections and tunnel routing. It can bypass common restrictions such as firewalls or VPN limitations by establishing an outbound connection from the local machine to the tunnel s
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    FancySS

    FancySS

    fancyss is a project for bypassing the Great Firewall (GFW)

    Fancyss is a “scientific Internet access / bypassing censorship” toolkit targeted principally to Asus routers running AsusWRT or Merlin-based firmware. The project provides a plugin suite (with “software center” integration) so that home routers can run proxy or tunneling tools (e.g. V2Ray) to circumvent firewall or censorship (“GFW” in the Chinese context). Because it integrates into the router’s firmware environment, fancyss automates configuration, routing, and firewall rules to minimize manual tinkering. It supports multiple architectures and firmware versions, though some submodules or variants (e.g. “fancyss_hnd”) are optimized for specific chipsets. The project also maintains offline packages for constrained environments and hardware support lists. Many users adopt fancyss to turn relatively cheap consumer routers into censorship-resilient gateways, avoiding separate proxy appliances.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Narrowlink

    Narrowlink

    A self-hosted solution to enable secure connectivity between devices

    Narrowlink is a zero-config tunneling and reverse proxy solution that enables secure access to services behind firewalls or NATs without exposing public IPs. Unlike traditional tools like ngrok, Narrowlink is peer-to-peer and privacy-focused, using WireGuard and WebRTC to establish direct encrypted tunnels between peers. It is designed to make exposing local services simple, fast, and secure with no need for port forwarding or cloud relays. Narrowlink is ideal for developers, self-hosters, and remote teams looking for frictionless, encrypted connectivity.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    sqlit

    sqlit

    A user friendly TUI for SQL databases

    sqlit is a keyboard-first terminal UI that lets you connect to, browse, and query SQL databases quickly without relying on heavyweight GUI clients. It positions itself as a “lazygit-style” experience for databases, aiming for fast startup, intuitive navigation, and developer-friendly workflows directly inside your terminal. The tool supports a wide range of database providers, so you can use one interface across local databases, remote servers, and cloud-hosted instances rather than juggling multiple clients. It includes a connection manager so you can save connections and switch between them without constantly retyping CLI arguments or connection strings. For querying, it emphasizes productivity features like syntax highlighting, searchable query history, and vim-style keybindings so power users can move fast. For exploring data at scale, it can load and inspect very large result sets and provides filtering and fuzzy search to find rows and values efficiently.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Proxifier is a command line tool which allows users to tunnel Internet applications through HTTPS, SOCKS v4, and SOCKS v5 Proxy Servers. Proxifier can be used to: access the Internet from a home or corporate network through a proxy server running on th
    Downloads: 53 This Week
    Last Update:
    See Project
  • 23
    Convert Webmail to POP3.Is also included a SMTP/POP3 tunneling system that allow send and receive email in a private network HTTP PROXY based. All connection are plugin based. Over 450 email server supported and tested, GMAIL POP3/SMTP over Proxy Network.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 24
    Doffen SSH Tunnel

    Doffen SSH Tunnel

    Manage hierarchy of ssh sessions and tunnels

    Ssh terminal, file transfer and tunneling tool. The focus is on running tunnels inside tunnels. That one has to jump through several machines. Please see the wiki pages for documentation. https://sourceforge.net/p/doffensshtunnel/wiki/Home/
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 25
    CallMe

    CallMe

    Minimal plugin that lets Claude Code call you on the phone

    CallMe is a minimalist plugin for Claude Code that bridges computational tasks with real-world alerts by letting the AI call your phone, smartwatch, or even a landline when an operation finishes, gets stuck, or needs a user decision. It is designed to let users start a long-running task, leave their device, and then be notified in a natural way with a phone call instead of second-guessing progress in the console. The plugin uses a local MCP server alongside a webhook tunnel (typically via ngrok) to connect with voice providers like Telnyx or Twilio for outbound calls, with prompts and responses flowing between Claude Code and the user’s voice device. Multi-turn conversations are supported, so users can respond in real time to questions the agent asks during execution, giving it a practical human-in-the-loop capability for complex workflows.
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB