Tunneling Software for Windows

View 2851 business solutions

Browse free open source Tunneling software and projects for Windows below. Use the toggles on the left to filter open source Tunneling software by OS, license, language, programming language, and project status.

  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 1,620 This Week
    Last Update:
    See Project
  • 2
    S-UI

    S-UI

    An advanced Web Panel • Built for SagerNet/Sing-Box

    S-UI is an advanced web-based management panel built on top of SagerNet and Sing-box, designed to simplify the configuration and monitoring of proxy and networking services through an intuitive graphical interface. It provides a centralized dashboard where users can manage inbound and outbound connections, configure routing rules, and monitor traffic usage in real time. The platform supports multiple protocols and clients, making it flexible for different networking scenarios such as proxy servers, tunneling, and custom routing setups. It includes features for generating subscription links in various formats, allowing easy distribution of configurations to client devices. The system is built with a full-stack architecture combining a Go backend and a modern frontend, ensuring both performance and usability. It also exposes API endpoints for automation and integration with external tools, enabling advanced users to build custom workflows.
    Downloads: 689 This Week
    Last Update:
    See Project
  • 3
    NekoBox for PC (NekoRay)

    NekoBox for PC (NekoRay)

    Qt based cross-platform GUI proxy configuration manager

    NekoBox for PC is a Qt-based, cross-platform proxy configuration manager designed for Windows and Linux systems. It provides a user-friendly graphical interface for managing advanced proxy and tunneling configurations using the sing-box backend. NekoBox supports a wide range of modern proxy protocols, making it suitable for users who need flexible and powerful network routing options. The application offers portable builds that run without installation, allowing quick setup and easy deployment. With support for subscription-based configurations and custom cores, it caters to both casual users and advanced networking enthusiasts. Although the project has been archived and is no longer actively maintained, NekoBox for PC remains a popular and capable tool for managing complex proxy setups.
    Downloads: 643 This Week
    Last Update:
    See Project
  • 4
    Proton VPN Windows App

    Proton VPN Windows App

    Official ProtonVPN Windows app

    The ProtonVPN Windows app project hosts the official open-source client software that lets users securely connect their Windows machines to the ProtonVPN service with full system-wide VPN protection. It includes a modern GUI built with .NET and WPF that lets users authenticate, choose VPN servers, and configure features like split tunneling or kill switch, while a background Windows service manages VPN connections using the OpenVPN protocol and handles networking tasks such as firewall and adapter configuration. The app integrates a custom TAP driver and a split tunnel callout driver to help route traffic securely and prevent leaks, and is structured so the GUI and service components work together to deliver a smooth user experience on Windows desktops and laptops. ProtonVPN’s Windows client supports both free and paid users with access to Proton’s global server network, encrypted tunnels, and privacy-first policies that block logging and respect user anonymity.
    Downloads: 605 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. It is designed to simplify complex proxy management tasks by offering a clean, user-friendly interface while still exposing powerful configuration options for advanced users. The tool supports features such as system proxy management, TUN mode for virtual network interfaces, and detailed rule editing, making it suitable for both everyday use and more technical networking scenarios.
    Downloads: 403 This Week
    Last Update:
    See Project
  • 6
    Clash for Windows

    Clash for Windows

    Windows GUI client application built on the Clash core proxy engine

    Clash for Windows is a desktop GUI client application built on the Clash core proxy engine, providing a user-friendly interface for managing and routing network connections through customizable rule sets and multiple proxy protocols. It targets advanced users who need fine-grained control of how traffic is routed on Windows systems, enabling scenarios like split-tunneling, region-based routing, and domain-specific proxy selection. Using Clash’s rule syntax and support for diverse inbound and outbound protocols (including SOCKS5, Shadowsocks, V2Ray, and others), this client lets users define when to route traffic through a proxy or bypass it entirely, making it useful for privacy, latency optimization, testing, and censorship circumvention. The application typically includes tools to import subscription URLs, live traffic statistics, log views, and configuration editors, reducing the complexity of managing text-based YAML configs manually.
    Downloads: 390 This Week
    Last Update:
    See Project
  • 7

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,701 This Week
    Last Update:
    See Project
  • 8
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 297 This Week
    Last Update:
    See Project
  • 9
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. It is designed to simplify complex proxy management tasks by offering a clean, user-friendly interface while still exposing powerful configuration options for advanced users. The tool supports features such as system proxy management, TUN mode for virtual network interfaces, and detailed rule editing, making it suitable for both everyday use and more technical networking scenarios.
    Downloads: 276 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    ngrok

    ngrok

    Unified ingress for developers

    ngrok is a globally distributed, secure reverse proxy and tunneling service that exposes applications running on local machines behind NATs or firewalls to the public internet. It simplifies remote debugging, webhooks integration, and secure ingress by wrapping reverse proxy, firewall traversal, API gateway, and load-balancing functionality into a single tool. ngrok is a globally distributed reverse proxy that secures, protects and accelerates your applications and network services, no matter where you run them. You can think of ngrok as the front door to your applications. ngrok combines your reverse proxy, firewall, API gateway, and global load balancing into one. ngrok can capture and analyze all traffic to your web service for later inspection and replay.
    Downloads: 224 This Week
    Last Update:
    See Project
  • 11
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    Zphisher is an advanced open-source phishing tool for educational and penetration testing purposes. It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 187 This Week
    Last Update:
    See Project
  • 12

    UFTP

    Encrypted UDP based FTP with multicast

    UFTP is an encrypted multicast file transfer program, designed to securely, reliably, and efficiently transfer files to multiple receivers simultaneously. This is useful for distributing large files to a large number of receivers, and is especially useful for data distribution over a satellite link (with two way communication), where the inherent delay makes any TCP based communication highly inefficient. The multicast encryption scheme is based on TLS with extensions to allow multiple receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.
    Leader badge
    Downloads: 1,396 This Week
    Last Update:
    See Project
  • 13
    SikuliX

    SikuliX

    Now continued as OculiX — see oculix.org

    SikuliX is now continued as OculiX at https://oculix.org. The active development,,releases, documentation and community have moved there. SikuliX (and now OculiX) automates anything you see on the screen of your desktop computer. Running Windows, Mac or some Linux/Unix. It uses image recognition powered by OpenCV to identify GUI components and can act on them with mouse and keyboard actions. This is handy in cases when there is no easy access to a GUI's internals or the source code of the application or web page you want to act on. This SourceForge entry is preserved for historical reference. Please get the latest version from https://github.com/oculix-org/Oculix/releases.
    Downloads: 127 This Week
    Last Update:
    See Project
  • 14
    MasterHttpRelayVPN

    MasterHttpRelayVPN

    Domain-fronted HTTP/SOCKS5 proxy tunneling traffic through Google Apps

    MasterHttpRelayVPN is a networking tool designed to route traffic through HTTP-based relay systems, enabling VPN-like functionality over standard web protocols. It focuses on bypassing network restrictions by tunneling data through HTTP requests, making it effective in constrained or filtered environments. The system supports secure communication and can be configured to relay traffic across multiple endpoints. It is particularly useful for users who need to access restricted networks or maintain connectivity in limited conditions. The project emphasizes flexibility and adaptability in different network scenarios. It also provides tools for managing connections and monitoring traffic flow. Overall, it offers an alternative approach to traditional VPN solutions.
    Downloads: 84 This Week
    Last Update:
    See Project
  • 15
    Cntlm is an NTLM / NTLMv2 authenticating HTTP/1.1 proxy. It caches auth'd connections for reuse, offers TCP/IP tunneling (port forwarding) thru parent proxy and much much more. It's in C, very fast and resource-efficient. Go to http://cntlm.sf.net/
    Leader badge
    Downloads: 364 This Week
    Last Update:
    See Project
  • 16
    Another Redis Desktop Manager

    Another Redis Desktop Manager

    A faster, better and more stable Redis desktop manager

    AnotherRedisDesktopManager is a cross-platform GUI client for Redis that simplifies connecting, browsing, and manipulating data. It supports standalone, Sentinel, and Cluster modes, plus SSH tunneling and ACL credentials for secure access in varied environments. The UI provides tree and table views of keys with inline editors for strings, hashes, lists, sets, sorted sets, and streams, including TTL management and batch operations. Built-in monitoring lets you watch stats, slow logs, and command activity while an integrated console executes raw Redis commands. Quality-of-life features include JSON viewers, search and filter tools, favorite connections, and dark mode. For everyday operations and troubleshooting, it offers a friendlier alternative to the command line without hiding Redis’s power.
    Downloads: 71 This Week
    Last Update:
    See Project
  • 17
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 55 This Week
    Last Update:
    See Project
  • 18
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. In GOST, GOST and other proxy services are considered as proxy nodes, GOST can handle the requests itself, or forward the requests to any one or more proxy nodes. In addition to configuring services directly from the command line, parameters can also be set by specifying the external configuration file with the -C parameter.
    Downloads: 48 This Week
    Last Update:
    See Project
  • 19
    Divert

    Divert

    WinDivert: Windows Packet Divert

    Windows Packet Divert (WinDivert) is a user-mode packet interception library for Windows 7, Windows 8 and Windows 10. WinDivert can be used to implement user-mode packet filters, sniffers, firewalls, NATs, VPNs, IDSs, tunneling applications, etc.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 20
    Tun2Socks

    Tun2Socks

    tun2socks , powered by gVisor TCP/IP stack

    Proxy Everything: Handle all network traffic of any internet programs sent by the device through a proxy. Proxy Protocols: HTTP/Socks4/Socks5/Shadowsocks with authentication support for remote connections. Run Everywhere. Linux/macOS/Windows/FreeBSD/OpenBSD multi-platform support with specific optimization. Gateway Mode: Act as a layer three gateway to handle network traffic from other devices in the same network. Full IPv6 Support: All functions work in IPv6, tunnel IPv4 connections through IPv6 proxy and vice versa. Network Stack: Powered by user-space TCP/IP stack from Google container application kernel gVisor.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 21
    Scrcpy GUI

    Scrcpy GUI

    A simple & beautiful GUI application for scrcpy

    Scrcpy was created by the team behind the popular Android emulator Genymotion, but it is not an Android emulator itself, it displays and controls Android devices connected via USB or TCP/IP, it does not require any root access. It works with GNU/Linux, Windows, and MacOS. Scrcpy works by running a server on your Android device, and the desktop application communicates using USB (or using ADB tunneling wireless). The server streams the H.264 video of the device screen. The client decodes the video frames and displays them. The client captures input (keyboard and mouse) events, sends them to the server, and the server injects them into the device. If you want to see your Android screen interact with the app or content on your desktop, record your phone screen or perform other basic tasks, then Scrcpy is a good choice. In short, Scrcpy is an excellent way to easily view your Android screen on your computer and interact with it in real time.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 22
    HTTP Proxy Injector

    HTTP Proxy Injector

    Custom HTTP Proxy Header Injection Application

    HTTP Proxy Injector Custom HTTP Proxy Header Injection Application HTTP Proxy Injector is a simple but powerful tool to modify http proxy header requests and respons, to use with SSH or VPN on Windows OS. Access blocked websites behind firewall and many other functions. Free to use for everyone. Want to help HTTP Proxy Injector keep in existence and get better ? Please visit and share our Patreon, Google Sites or Facebook Page :) You can help HTTP Proxy Injector on or using : Patreon : https://www.patreon.com/httpproxyinjector KitaBisa : https://kitabisa.com/campaign/httpproxyinjector PayPal : https://paypal.me/co2thunderboy HTTP Proxy Injector support pages : Google Sites : https://hpi.co2thunderboy.net/ Facebook Page : https://www.facebook.com/co2thunderboy.net A-Developer1412 Page : https://www.facebook.com/A.Developer1412 Best Regards, co2thunderboy™ zone www.co2thunderboy.net
    Leader badge
    Downloads: 117 This Week
    Last Update:
    See Project
  • 23
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and redirect connections to your control/proxy server. You can easily hit more than 100 Mbits/sec. Here is a test using iperf from a 200Mbits/s server to a 200Mbits/s connection.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 24
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 25
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. Nebula uses certificates to assert a node's IP address, name, and membership within user-defined groups.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB