Showing 5 open source projects for "mac"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 3,960 This Week
    Last Update:
    See Project
  • 2
    ZeroTier

    ZeroTier

    A smart Ethernet switch for Earth

    Connect team members from anywhere in the world on any device. ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices. ZeroTier combines the capabilities of VPN and SD-WAN, simplifying network management. Enjoy flexibility while avoiding costly hardware vendor lock in. Set up ZeroTier in minutes with remote, automated deployment. Emulates Layer 2 Ethernet with multipath, multicast, and bridging capabilities. ZeroTier’s zero-trust networking solution provides...
    Downloads: 75 This Week
    Last Update:
    See Project
  • 3
    OmniEdge

    OmniEdge

    Bringing intranet on the internet with Zero-Config Mesh VPNS.

    OmniEdge is an Open source p2p layer 2 , zero-config mesh VPN infrastructure, a traditional VPN, AWS VPC, Ngrok, DDNS alternative. No central server, easy to scale with less maintenance. What happens in intranet, stays in in intranet.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 27 This Week
    Last Update:
    See Project
  • Print management system for direct buyers, brokers, in-plants and printers. Icon
    Print management system for direct buyers, brokers, in-plants and printers.

    P3Software is a premier provider of intelligent print management solutions.

    P3Software's affordable print management system, is ideally suited for corporate, non-profit and educational print buyers, print managers, in-plants and print manufacturers. Designed by print experts, this easy-to-use print procurement management system helps users manage the print sourcing and buying workflow, from initial job specification to project delivery. Core features include bid and buy or direct buy, customer proposal (estimate), customer direct ordering, enhanced CRM, powerful reporting, easy access to current and historical data, and outstanding training and support.
    Learn More
  • 5
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next