Python Tunneling Software

View 8778 business solutions

Browse free open source Python Tunneling Software and projects below. Use the toggles on the left to filter open source Python Tunneling Software by OS, license, language, programming language, and project status.

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    MasterHttpRelayVPN

    MasterHttpRelayVPN

    Domain-fronted HTTP/SOCKS5 proxy tunneling traffic through Google Apps

    MasterHttpRelayVPN is a networking tool designed to route traffic through HTTP-based relay systems, enabling VPN-like functionality over standard web protocols. It focuses on bypassing network restrictions by tunneling data through HTTP requests, making it effective in constrained or filtered environments. The system supports secure communication and can be configured to relay traffic across multiple endpoints. It is particularly useful for users who need to access restricted networks or maintain connectivity in limited conditions. The project emphasizes flexibility and adaptability in different network scenarios. It also provides tools for managing connections and monitoring traffic flow. Overall, it offers an alternative approach to traditional VPN solutions.
    Downloads: 75 This Week
    Last Update:
    See Project
  • 2
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 46 This Week
    Last Update:
    See Project
  • 3
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    Seeker is an open source project that demonstrates how to obtain precise location information from devices using social engineering and web-based techniques. The tool sets up a phishing page that asks for location permissions, allowing GPS and other device data to be shared if the user consents. It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    sqlit

    sqlit

    A user friendly TUI for SQL databases

    sqlit is a keyboard-first terminal UI that lets you connect to, browse, and query SQL databases quickly without relying on heavyweight GUI clients. It positions itself as a “lazygit-style” experience for databases, aiming for fast startup, intuitive navigation, and developer-friendly workflows directly inside your terminal. The tool supports a wide range of database providers, so you can use one interface across local databases, remote servers, and cloud-hosted instances rather than juggling multiple clients. It includes a connection manager so you can save connections and switch between them without constantly retyping CLI arguments or connection strings. For querying, it emphasizes productivity features like syntax highlighting, searchable query history, and vim-style keybindings so power users can move fast. For exploring data at scale, it can load and inspect very large result sets and provides filtering and fuzzy search to find rows and values efficiently.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 5
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    SMTP Tunnel Proxy is a high-speed covert tunneling proxy that disguises regular TCP traffic as legitimate SMTP email communication to evade deep packet inspection (DPI) firewalls and censorship systems. It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange. The tool supports modern TLS encryption (STARTTLS) with HMAC-SHA256 authentication, per-user secrets, IP whitelisting, and multiplexed connections over a single tunnel. With a simple installer and systemd service setup, users can quickly deploy it on a Linux VPS as a tunneled access point, then connect from Windows, macOS, or Linux clients using auto-generated client packages. The project is useful for environments where standard VPNs or proxies are blocked, offering a combination of performance and stealth.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    http-proxy-tunnel

    Create nested tunnels through HTTP proxies

    Http-proxy-tunnel creates TCP tunnels through http proxies that permit the CONNECT method. It differs from other proxy tunnelling programs in that it can tunnel through multiple proxies, and can use SSL tunnels. These abilities mean that in combination with a web server that can proxy (such as Apache) you can serve normal web pages from ports 80 and 443 and connect to the server (using ssh say) via those ports at the same time. All available documentation can be read online at http://http-proxy-tunnel.sourceforge.net/
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    How to get Bot Lobbies

    How to get Bot Lobbies

    Get easy bot lobbies in any game with our bot lobbies tool.

    Test it on the web app: https://slothytech.com/ezlobbies/ EzLobbies is the open-source tool developed by SlothyTech that helps gamers get easier, bot-filled lobbies in the world’s top games. Instantly generate custom OpenVPN config files that route only your game’s matchmaking traffic through the VPN server of your choice—no complicated setup and no speed loss for browsing or streaming. Supported titles include Fortnite, Call of Duty, Warzone, Apex Legends, Overwatch, Valorant, PUBG, and more. Simply select your game, region, and server, then import your config into OpenVPN. EzLobbies is fully open source, privacy-friendly, and works with any VPN provider that supports OpenVPN configs. Unlock easier matches, level up faster, and enjoy a more relaxed gaming experience—try EzLobbies today and take control of your lobbies!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    EH Forwarder Bot

    EH Forwarder Bot

    An extensible message tunneling chat bot framework

    Codename EH Forwarder Bot (EFB) is an extensible message tunneling chat bot framework that delivers messages to and from multiple platforms and remotely controls your accounts. Since the majority of our channels are using polling for message retrieval, a stable internet connection is necessary for channels to run smoothly. An unstable connection may lead to slow response, or loss of messages. EFB uses a *nix user configuration style, which is described in details in Directories. In short, if you are using the default configuration, you need to create ~/.ehforwarderbot, and give read and write permission to the user running EFB. Currently, all modules that was submitted to us are recorded in the modules repository. You can choose the channels that fits your need the best. When you have successfully installed the modules of your choices, you can the use the configuration wizard which guides you to enable channels and middlewares, and continue to setup those modules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    tunnel a tcp/udp connection through a http(s) connection, surviving proxy-servers
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was only accessible from the compromised machine. If the compromised host is behind a Firewall / NAT and isn't directly accessible from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on the compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessible from the compromised machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    An easy to use sql client gui.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    new-pac

    new-pac

    Scientific Internet access

    This repository aggregates tools, guides, and configuration files aimed at enabling network access in restrictive environments across desktop and mobile platforms. It collects client applications, one-click browser bundles, configuration examples, and references for widely used proxy and tunneling technologies. The emphasis is on approachability: instructions, packaged builds, and links are organized so non-experts can find a workable setup for their device. Because endpoint reliability and availability change over time, the project is maintained as a living resource with frequent updates and alternatives. It also includes how-to materials for self-hosting and basic operational hygiene so users can better manage their own connectivity. The goal is practical empowerment—reduce friction, centralize information, and provide options suited to different networks and risk tolerances.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    py-multiaddr

    py-multiaddr

    multiaddr implementation in Python

    py-multiaddr is a multiaddr implementation in Python. Every choice in computing has a tradeoff. This includes formats, algorithms, encodings, and so on. And even with a great deal of planning, decisions may lead to breaking changes down the road, or to solutions that are no longer optimal. Allowing systems to evolve and grow is important. The Multiformats Project is a collection of protocols that aim to future-proof systems, today. They do this mainly by enhancing format values with self-description. This allows interoperability, and protocol agility, and helps us avoid lock-in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    scrapy-proxy-headers

    Handle custom proxy headers when making HTTPS requests in scrapy

    The scrapy-proxy-headers package is designed for adding proxy headers to HTTPS requests in Scrapy. In normal usage, custom headers put in request.headers cannot be read by a proxy when you make a HTTPS request, because the headers are encrypted and passed through the proxy tunnel, along with the rest of the request body. You can read more about this at Proxy Server Requests over HTTPS. Because Scrapy does not have a good way to pass custom headers to a proxy when you make HTTPS requests, we at ProxyMesh made this extension to support our customers that use Scrapy and want to use custom headers to control our proxy behavior. But this extension can work for handling custom headers through any proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Command line and wxWidgets UI for an HTTP(S) proxy that can tunnel web requests over one or more SSH tunnels to one or more web specified servers, while using a direct connection for all other traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB