Tunneling Software for Mac

View 1711 business solutions

Browse free open source Tunneling software and projects for Mac below. Use the toggles on the left to filter open source Tunneling software by OS, license, language, programming language, and project status.

  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 1,620 This Week
    Last Update:
    See Project
  • 2
    S-UI

    S-UI

    An advanced Web Panel • Built for SagerNet/Sing-Box

    S-UI is an advanced web-based management panel built on top of SagerNet and Sing-box, designed to simplify the configuration and monitoring of proxy and networking services through an intuitive graphical interface. It provides a centralized dashboard where users can manage inbound and outbound connections, configure routing rules, and monitor traffic usage in real time. The platform supports multiple protocols and clients, making it flexible for different networking scenarios such as proxy servers, tunneling, and custom routing setups. It includes features for generating subscription links in various formats, allowing easy distribution of configurations to client devices. The system is built with a full-stack architecture combining a Go backend and a modern frontend, ensuring both performance and usability. It also exposes API endpoints for automation and integration with external tools, enabling advanced users to build custom workflows.
    Downloads: 689 This Week
    Last Update:
    See Project
  • 3
    NekoBox for PC (NekoRay)

    NekoBox for PC (NekoRay)

    Qt based cross-platform GUI proxy configuration manager

    NekoBox for PC is a Qt-based, cross-platform proxy configuration manager designed for Windows and Linux systems. It provides a user-friendly graphical interface for managing advanced proxy and tunneling configurations using the sing-box backend. NekoBox supports a wide range of modern proxy protocols, making it suitable for users who need flexible and powerful network routing options. The application offers portable builds that run without installation, allowing quick setup and easy deployment. With support for subscription-based configurations and custom cores, it caters to both casual users and advanced networking enthusiasts. Although the project has been archived and is no longer actively maintained, NekoBox for PC remains a popular and capable tool for managing complex proxy setups.
    Downloads: 643 This Week
    Last Update:
    See Project
  • 4
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. It is designed to simplify complex proxy management tasks by offering a clean, user-friendly interface while still exposing powerful configuration options for advanced users. The tool supports features such as system proxy management, TUN mode for virtual network interfaces, and detailed rule editing, making it suitable for both everyday use and more technical networking scenarios.
    Downloads: 403 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,701 This Week
    Last Update:
    See Project
  • 6
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 297 This Week
    Last Update:
    See Project
  • 7
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. It is designed to simplify complex proxy management tasks by offering a clean, user-friendly interface while still exposing powerful configuration options for advanced users. The tool supports features such as system proxy management, TUN mode for virtual network interfaces, and detailed rule editing, making it suitable for both everyday use and more technical networking scenarios.
    Downloads: 276 This Week
    Last Update:
    See Project
  • 8
    ngrok

    ngrok

    Unified ingress for developers

    ngrok is a globally distributed, secure reverse proxy and tunneling service that exposes applications running on local machines behind NATs or firewalls to the public internet. It simplifies remote debugging, webhooks integration, and secure ingress by wrapping reverse proxy, firewall traversal, API gateway, and load-balancing functionality into a single tool. ngrok is a globally distributed reverse proxy that secures, protects and accelerates your applications and network services, no matter where you run them. You can think of ngrok as the front door to your applications. ngrok combines your reverse proxy, firewall, API gateway, and global load balancing into one. ngrok can capture and analyze all traffic to your web service for later inspection and replay.
    Downloads: 224 This Week
    Last Update:
    See Project
  • 9
    WireGuard for iOS and macOS

    WireGuard for iOS and macOS

    An application for iOS and for macOs

    WireGuard for iOS and macOS is the official WireGuard client implementation for Apple platforms, including iOS, iPadOS, and macOS. The project delivers a native Swift-based application that integrates with Apple’s Network Extension framework to provide secure VPN tunneling with strong performance and reliability. It offers a polished graphical interface that allows users to create, import, and manage WireGuard configurations while maintaining the protocol’s emphasis on simplicity and modern cryptography. The software is designed to work seamlessly within Apple’s ecosystem, supporting keychain storage, system networking controls, and platform security features. Because WireGuard is known for its lean architecture, the Apple client maintains efficient resource usage while delivering fast connection speeds. Overall, wireguard-apple is intended for Apple device users and organizations that require a secure, modern VPN solution fully aligned with the Apple networking stack.
    Downloads: 192 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    Zphisher is an advanced open-source phishing tool for educational and penetration testing purposes. It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 187 This Week
    Last Update:
    See Project
  • 11

    UFTP

    Encrypted UDP based FTP with multicast

    UFTP is an encrypted multicast file transfer program, designed to securely, reliably, and efficiently transfer files to multiple receivers simultaneously. This is useful for distributing large files to a large number of receivers, and is especially useful for data distribution over a satellite link (with two way communication), where the inherent delay makes any TCP based communication highly inefficient. The multicast encryption scheme is based on TLS with extensions to allow multiple receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.
    Leader badge
    Downloads: 1,396 This Week
    Last Update:
    See Project
  • 12
    SikuliX

    SikuliX

    Now continued as OculiX — see oculix.org

    SikuliX is now continued as OculiX at https://oculix.org. The active development,,releases, documentation and community have moved there. SikuliX (and now OculiX) automates anything you see on the screen of your desktop computer. Running Windows, Mac or some Linux/Unix. It uses image recognition powered by OpenCV to identify GUI components and can act on them with mouse and keyboard actions. This is handy in cases when there is no easy access to a GUI's internals or the source code of the application or web page you want to act on. This SourceForge entry is preserved for historical reference. Please get the latest version from https://github.com/oculix-org/Oculix/releases.
    Downloads: 127 This Week
    Last Update:
    See Project
  • 13
    MasterHttpRelayVPN

    MasterHttpRelayVPN

    Domain-fronted HTTP/SOCKS5 proxy tunneling traffic through Google Apps

    MasterHttpRelayVPN is a networking tool designed to route traffic through HTTP-based relay systems, enabling VPN-like functionality over standard web protocols. It focuses on bypassing network restrictions by tunneling data through HTTP requests, making it effective in constrained or filtered environments. The system supports secure communication and can be configured to relay traffic across multiple endpoints. It is particularly useful for users who need to access restricted networks or maintain connectivity in limited conditions. The project emphasizes flexibility and adaptability in different network scenarios. It also provides tools for managing connections and monitoring traffic flow. Overall, it offers an alternative approach to traditional VPN solutions.
    Downloads: 84 This Week
    Last Update:
    See Project
  • 14
    Another Redis Desktop Manager

    Another Redis Desktop Manager

    A faster, better and more stable Redis desktop manager

    AnotherRedisDesktopManager is a cross-platform GUI client for Redis that simplifies connecting, browsing, and manipulating data. It supports standalone, Sentinel, and Cluster modes, plus SSH tunneling and ACL credentials for secure access in varied environments. The UI provides tree and table views of keys with inline editors for strings, hashes, lists, sets, sorted sets, and streams, including TTL management and batch operations. Built-in monitoring lets you watch stats, slow logs, and command activity while an integrated console executes raw Redis commands. Quality-of-life features include JSON viewers, search and filter tools, favorite connections, and dark mode. For everyday operations and troubleshooting, it offers a friendlier alternative to the command line without hiding Redis’s power.
    Downloads: 71 This Week
    Last Update:
    See Project
  • 15
    OpenFortiVPN

    OpenFortiVPN

    Client for PPP+TLS VPN tunnel services

    openfortivpn is a command-line SSL VPN client for connecting to Fortinet FortiGate gateways without relying on proprietary GUIs. It negotiates the SSL/TLS tunnel, authenticates with credentials (and commonly with two-factor methods), then brings up a secure point-to-point interface and installs routes and DNS settings. The tool aims to be minimal and dependable: a single binary with an INI-style config file, systemd compatibility, and clear runtime diagnostics. It handles details like MTU tuning, split tunneling via pushed routes, and reconnect logic to keep the session stable. Because it works with the standard tun interface, it integrates smoothly with common Linux networking stacks and pairs well with desktop frontends such as NetworkManager plugins. For admins and developers, it’s a scriptable, cross-platform-friendly alternative that makes FortiGate access reliable on servers and developer workstations alike.
    Downloads: 58 This Week
    Last Update:
    See Project
  • 16
    A client implementation of Secure Socket Tunneling Protocol (SSTP) for Linux / Mac OS-X that allows remote access via SSTP VPN to Microsoft Windows 2008 Server. This project has been moved to https://gitlab.com/eivnaes/sstp-client
    Leader badge
    Downloads: 373 This Week
    Last Update:
    See Project
  • 17
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 55 This Week
    Last Update:
    See Project
  • 18
    Divert

    Divert

    WinDivert: Windows Packet Divert

    Windows Packet Divert (WinDivert) is a user-mode packet interception library for Windows 7, Windows 8 and Windows 10. WinDivert can be used to implement user-mode packet filters, sniffers, firewalls, NATs, VPNs, IDSs, tunneling applications, etc.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 19
    Tun2Socks

    Tun2Socks

    tun2socks , powered by gVisor TCP/IP stack

    Proxy Everything: Handle all network traffic of any internet programs sent by the device through a proxy. Proxy Protocols: HTTP/Socks4/Socks5/Shadowsocks with authentication support for remote connections. Run Everywhere. Linux/macOS/Windows/FreeBSD/OpenBSD multi-platform support with specific optimization. Gateway Mode: Act as a layer three gateway to handle network traffic from other devices in the same network. Full IPv6 Support: All functions work in IPv6, tunnel IPv4 connections through IPv6 proxy and vice versa. Network Stack: Powered by user-space TCP/IP stack from Google container application kernel gVisor.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 20
    Scrcpy GUI

    Scrcpy GUI

    A simple & beautiful GUI application for scrcpy

    Scrcpy was created by the team behind the popular Android emulator Genymotion, but it is not an Android emulator itself, it displays and controls Android devices connected via USB or TCP/IP, it does not require any root access. It works with GNU/Linux, Windows, and MacOS. Scrcpy works by running a server on your Android device, and the desktop application communicates using USB (or using ADB tunneling wireless). The server streams the H.264 video of the device screen. The client decodes the video frames and displays them. The client captures input (keyboard and mouse) events, sends them to the server, and the server injects them into the device. If you want to see your Android screen interact with the app or content on your desktop, record your phone screen or perform other basic tasks, then Scrcpy is a good choice. In short, Scrcpy is an excellent way to easily view your Android screen on your computer and interact with it in real time.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 21
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    Seeker is an open source project that demonstrates how to obtain precise location information from devices using social engineering and web-based techniques. The tool sets up a phishing page that asks for location permissions, allowing GPS and other device data to be shared if the user consents. It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 22
    HTTP Proxy Injector

    HTTP Proxy Injector

    Custom HTTP Proxy Header Injection Application

    HTTP Proxy Injector Custom HTTP Proxy Header Injection Application HTTP Proxy Injector is a simple but powerful tool to modify http proxy header requests and respons, to use with SSH or VPN on Windows OS. Access blocked websites behind firewall and many other functions. Free to use for everyone. Want to help HTTP Proxy Injector keep in existence and get better ? Please visit and share our Patreon, Google Sites or Facebook Page :) You can help HTTP Proxy Injector on or using : Patreon : https://www.patreon.com/httpproxyinjector KitaBisa : https://kitabisa.com/campaign/httpproxyinjector PayPal : https://paypal.me/co2thunderboy HTTP Proxy Injector support pages : Google Sites : https://hpi.co2thunderboy.net/ Facebook Page : https://www.facebook.com/co2thunderboy.net A-Developer1412 Page : https://www.facebook.com/A.Developer1412 Best Regards, co2thunderboy™ zone www.co2thunderboy.net
    Leader badge
    Downloads: 117 This Week
    Last Update:
    See Project
  • 23
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and redirect connections to your control/proxy server. You can easily hit more than 100 Mbits/sec. Here is a test using iperf from a 200Mbits/s server to a 200Mbits/s connection.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 24
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 25
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. Nebula uses certificates to assert a node's IP address, name, and membership within user-defined groups.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB