VPN Software for Linux

View 83 business solutions
VPN Linux Clear Filters

Browse free open source VPN software and projects for Linux below. Use the toggles on the left to filter open source VPN software by OS, license, language, programming language, and project status.

  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    V2Ray

    V2Ray

    V2Ray is a set of tools for building your own private network

    Project V is a set of tools to help you build your own privacy network over internet. The core of Project V, named V2Ray, is responsible for network protocols and communications. It can work alone, as well as combine with other tools.
    Downloads: 7,070 This Week
    Last Update:
    See Project
  • 2
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 4,313 This Week
    Last Update:
    See Project
  • 3
    VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It supports IP, Ethernet, PPP and other tunnel types. VTun is easily and highly configurable. VPN, Mobile IP, Shaping, etc
    Leader badge
    Downloads: 13,760 This Week
    Last Update:
    See Project
  • 4
    Xray Core

    Xray Core

    Xray, Penetrates Everything. Also the best v2ray-core

    Xray-core is an enhanced superset of v2ray-core, providing a high-performance privacy proxy framework supporting XTLS. It offers full compatibility with v2ray configs, supports multiple protocols, advanced routing, and is distributed as a single executable.
    Downloads: 618 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    hiddify-app

    hiddify-app

    Multi-platform auto-proxy client, supporting Sing-box, X-ray, TUIC

    Hiddify is a comprehensive VPN and proxy client designed to facilitate secure internet access and bypass censorship. It supports advanced proxy protocols like V2Ray, Shadowsocks, and Trojan, offering configuration through QR codes, links, and subscription services. Hiddify aims to be user-friendly while also catering to power users with customizable options, making it a popular choice in regions with restricted internet access.
    Downloads: 600 This Week
    Last Update:
    See Project
  • 6
    Streisand

    Streisand

    Streisand sets up a new server running your choice

    Streisand is a tool that automates the deployment of censorship-resistant VPN services on cloud servers. It was created to help users bypass internet censorship and surveillance by quickly setting up secure communication channels without needing deep system administration expertise. With just a cloud provider account and basic Unix command-line knowledge, Streisand can provision a server and configure multiple VPN and proxy protocols almost automatically. This includes OpenVPN, WireGuard, Shadowsocks, OpenConnect, and Tor bridges, often with optional add-ons like obfuscation or stunnel to resist throttling and detection. The result is a private website that hosts client software downloads and setup instructions for easy access. Streisand supports major cloud providers like AWS, Azure, Google Cloud, Linode, DigitalOcean, and Rackspace, while also offering installation options for advanced users with their own servers.
    Downloads: 437 This Week
    Last Update:
    See Project
  • 7
    Tailscale

    Tailscale

    The easiest, most secure way to use WireGuard and 2FA

    Tailscale is an open-source zero-configuration VPN and networking solution that makes it simple to create secure, private networks across devices by leveraging WireGuard under the hood. It lets users connect computers, servers, mobile devices, and cloud instances together with peer-to-peer encrypted tunnels without dealing with complex firewalls, NAT rules, or key distribution headaches. Instead of traditional VPN server infrastructure, Tailscale uses a coordination service to authenticate devices and exchange connection information, enabling automatic NAT traversal and minimal manual setup. The project includes a daemon (tailscaled) and a CLI tool that run on major operating systems, and it also forms the basis for the official clients on platforms like iOS and Android, though those have GUI wrappers not fully in this repository.
    Downloads: 127 This Week
    Last Update:
    See Project
  • 8
    MasterHttpRelayVPN

    MasterHttpRelayVPN

    Domain-fronted HTTP/SOCKS5 proxy tunneling traffic through Google Apps

    MasterHttpRelayVPN is a networking tool designed to route traffic through HTTP-based relay systems, enabling VPN-like functionality over standard web protocols. It focuses on bypassing network restrictions by tunneling data through HTTP requests, making it effective in constrained or filtered environments. The system supports secure communication and can be configured to relay traffic across multiple endpoints. It is particularly useful for users who need to access restricted networks or maintain connectivity in limited conditions. The project emphasizes flexibility and adaptability in different network scenarios. It also provides tools for managing connections and monitoring traffic flow. Overall, it offers an alternative approach to traditional VPN solutions.
    Downloads: 116 This Week
    Last Update:
    See Project
  • 9
    Poptop is an open source implementation of a PPTP server. Running under x86 or embedded Motorola ColdFire architectures Poptop provides full interoperability with the Microsoft PPTP VPN client.
    Leader badge
    Downloads: 824 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 91 This Week
    Last Update:
    See Project
  • 11
    SoftEther VPN

    SoftEther VPN

    Cross-platform multi-protocol VPN software

    An open-source free cross-platform multi-protocol VPN program, as an academic project from University of Tsukuba, under the Apache License 2.0. The API Suite allows you to easily develop your original SoftEther VPN Server management application to control the VPN Server (e.g. creating users, adding Virtual Hubs, disconnecting a specified VPN sessions) from JavaScript, TypeScript, C# or other languages. SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful and easy-to-use multi-protocol VPN software. It runs on Windows, Linux, Mac, FreeBSD and Solaris. SoftEther VPN is an optimum alternative to OpenVPN and Microsoft's VPN servers. SoftEther VPN has a clone-function of OpenVPN Server. You can integrate from OpenVPN to SoftEther VPN smoothly. SoftEther VPN is faster than OpenVPN. SoftEther VPN also supports Microsoft SSTP VPN for Windows Vista / 7 / 8. No more need to pay expensive charges for Windows Server license for Remote-Access VPN function.
    Downloads: 89 This Week
    Last Update:
    See Project
  • 12
    Proton VPN Browser Extension

    Proton VPN Browser Extension

    Proton VPN Browser Extension

    The Proton VPN Browser Extension repository houses the code for an official browser extension that lets users quickly secure their web browsing traffic through ProtonVPN from within browsers like Firefox and Chrome without routing all system traffic. This extension provides users with a convenient way to encrypt and anonymize HTTP requests, hide IP addresses, and prevent tracking while browsing, acting independently of the full OS-level VPN clients. Because browser extensions are constrained by browser APIs, this extension focuses on securing in-browser connections, protecting privacy specifically within the browser context rather than across the entire operating system. Users can sign in with their Proton accounts, choose from available VPN locations, and connect or disconnect from the toolbar with a single click, making it practical for casual privacy protection or geo-unblocking content without installing native applications.
    Downloads: 80 This Week
    Last Update:
    See Project
  • 13
    ZeroTier

    ZeroTier

    A smart Ethernet switch for Earth

    Connect team members from anywhere in the world on any device. ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices. ZeroTier combines the capabilities of VPN and SD-WAN, simplifying network management. Enjoy flexibility while avoiding costly hardware vendor lock in. Set up ZeroTier in minutes with remote, automated deployment. Emulates Layer 2 Ethernet with multipath, multicast, and bridging capabilities. ZeroTier’s zero-trust networking solution provides scalable security with 256-bit end-to-end encryption. Simplify your network stack by unifying VPNs, VLANs, and SD-WANs with one solution. Easily build common backplane networks spanning multiple cloud providers. Easily provision and de-provision remote access for users, contractors, and partners. Save on performance, storage, and bandwidth by unifying on-prem with cloud. Administrate and debug from anywhere.
    Downloads: 79 This Week
    Last Update:
    See Project
  • 14
    Outline Client

    Outline Client

    Outline clients, developed by Jigsaw

    Outline clients, developed by Jigsaw. The Outline clients use the popular Shadowsocks protocol, and lean on the Cordova and Electron frameworks to support Windows, Android / ChromeOS, Linux, iOS and macOS. The Outline Client is a cross-platform VPN or proxy client for Windows, macOS, iOS, Android, and ChromeOS. The Outline Client is designed for use with the Outline Server software, but it is fully compatible with any Shadowsocks server. The client's user interface is implemented in Polymer 2.0. Platform support is provided by Cordova and Electron, with additional native components in this repository. Outline clients share the same web app across all platforms. This code is located in the src/www directory. If you are making changes to the shared web app and do not need to test platform-specific functionality, you can test in a desktop browser. It provides the "missing Unix pieces" required by build system such as rsync (and many others).
    Downloads: 69 This Week
    Last Update:
    See Project
  • 15
    OpenFortiVPN

    OpenFortiVPN

    Client for PPP+TLS VPN tunnel services

    openfortivpn is a command-line SSL VPN client for connecting to Fortinet FortiGate gateways without relying on proprietary GUIs. It negotiates the SSL/TLS tunnel, authenticates with credentials (and commonly with two-factor methods), then brings up a secure point-to-point interface and installs routes and DNS settings. The tool aims to be minimal and dependable: a single binary with an INI-style config file, systemd compatibility, and clear runtime diagnostics. It handles details like MTU tuning, split tunneling via pushed routes, and reconnect logic to keep the session stable. Because it works with the standard tun interface, it integrates smoothly with common Linux networking stacks and pairs well with desktop frontends such as NetworkManager plugins. For admins and developers, it’s a scriptable, cross-platform-friendly alternative that makes FortiGate access reliable on servers and developer workstations alike.
    Downloads: 55 This Week
    Last Update:
    See Project
  • 16
    A client implementation of Secure Socket Tunneling Protocol (SSTP) for Linux / Mac OS-X that allows remote access via SSTP VPN to Microsoft Windows 2008 Server. This project has been moved to https://gitlab.com/eivnaes/sstp-client
    Leader badge
    Downloads: 361 This Week
    Last Update:
    See Project
  • 17
    Mullvad VPN desktop and mobile app

    Mullvad VPN desktop and mobile app

    The Mullvad VPN client app for desktop and mobile

    In a society that is increasingly determined to weaken that right, a fast, reliable and easy-to-use VPN connection is a good first step towards achieving this. By connecting to the Internet with Mullvad, we ensure that traffic to and from your device is encrypted to the highest standards, even when using public Wi-Fi in a coffee shop or hotel. We do not keep activity logs or ask for personal information, and we even encourage anonymous payments using cash or any of the accepted cryptocurrencies. Your IP address will be replaced with one of ours, ensuring that device activity and location are not linked to your user. Using Mullvad is quick and easy - just download and install the app. Don't spend time on complicated setup and multi-step registration processes. We designed Mullvad to be easy to use. Privacy is essential in a well-functioning society, as it allows norms, ethics and laws to be safely debated and challenged. Without privacy, a free and open society cannot flourish or exist.
    Downloads: 47 This Week
    Last Update:
    See Project
  • 18
    V2Ray Core

    V2Ray Core

    A platform for building proxies to bypass network restrictions

    V2Ray is the core of the Project V platform—a set of network tools for building custom proxy/VPN setups. It supports multiple protocols (VMess, SOCKS, Shadowsocks, HTTP, etc.), advanced routing, dynamic inbound/outbound connections, and is focused on privacy and bypassing censorship.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 19
    WireGuard

    WireGuard

    Historical monolithic WireGuard repository

    WireGuard is an archived repository that preserves earlier monolithic development snapshots of the WireGuard project for historical and reference purposes. It reflects a previous stage in WireGuard’s evolution before the codebase was modularized into the modern multi-repository structure used today. The repository is valuable primarily for researchers, maintainers, and security analysts who want to study the protocol’s design history, implementation changes, or legacy behavior. Although not intended for production use, it provides insight into how WireGuard’s minimalist architecture and cryptographic approach matured over time. The project forms part of the broader WireGuard ecosystem, which focuses on delivering a simpler and faster VPN compared to legacy solutions. In practice, most users should rely on the actively maintained repositories, while this historical mirror serves educational and archival needs.
    Downloads: 30 This Week
    Last Update:
    See Project
  • 20
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 27 This Week
    Last Update:
    See Project
  • 21
    Setup IPsec VPN

    Setup IPsec VPN

    Scripts to build your own IPsec VPN server with IPsec/L2TP

    setup-ipsec-vpn is a set of automated scripts that allow you to deploy your own IPsec VPN server on Linux in just a few minutes. It supports multiple VPN protocols, including IPsec/L2TP, Cisco IPsec (XAuth), and IKEv2, providing strong encryption to protect network traffic. By encrypting all traffic between the client and server, the VPN prevents eavesdropping on unsecured networks such as public Wi-Fi in coffee shops, hotels, or airports. The project uses Libreswan as the IPsec server and xl2tpd as the L2TP provider, with additional options to install WireGuard or OpenVPN on the same host. It is designed for simplicity—requiring only a single command to set up, with randomly generated secure credentials created during installation. The repository also provides helper scripts for user and certificate management, client configuration files for major platforms, and support for deploying on popular Linux distributions and public cloud services.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 22
    Algo VPN

    Algo VPN

    Set of Ansible scripts that simplifies the setup of a personal VPN

    Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cloud that is not shared with other users, relies on only modern protocols and ciphers, and includes only the minimal software you need. And it’s free. For anyone who is privacy conscious, travels for work frequently, or can’t afford a dedicated IT department, this one’s for you. Really, the paid-for services are just commercial honeypots. If an attacker can compromise a VPN provider, they can monitor a whole lot of sensitive data. Paid-for VPNs tend to be insecure: they share keys, their weak cryptography gives a false sense of security, and they require you to trust their operators. Even if you’re not doing anything wrong, you could be sharing the same endpoint with someone who is. In that case, your network traffic will be analyzed when law enforcement makes that seizure.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 23
    Proton VPN GTK App

    Proton VPN GTK App

    Official ProtonVPN Linux app

    The Proton VPN GTK App repository contains the official Linux desktop client for ProtonVPN using the GTK toolkit, allowing users of GNOME, XFCE, and other Linux desktop environments to connect securely to Proton’s VPN servers with a native-looking interface. Built with Python or C and leveraging the GTK framework, this app provides intuitive controls for server selection, connection management, and status reporting, integrating with Linux system networking and user session environments. It supports features expected of a full VPN client—such as secure tunnels, automatic reconnection, and location selection—while respecting desktop conventions like system tray icons and notifications. The GTK client helps bring ProtonVPN’s privacy-focused service to the Linux ecosystem in a way that fits naturally with widely used Linux DEs, making secure connectivity accessible to users who prefer open systems for development, business, or privacy reasons.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 24
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel. UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
    Downloads: 15 This Week
    Last Update:
    See Project
  • 25
    IPsec VPN Server on Docker

    IPsec VPN Server on Docker

    Docker image to run an IPsec VPN server, with IPsec/L2TP

    IPsec VPN Server on Docker is an open-source project that provides a ready-to-use Docker image for deploying a fully functional IPsec VPN server with minimal setup. It supports multiple VPN protocols, including IPsec/L2TP, Cisco IPsec, and IKEv2, allowing compatibility with a wide range of devices and operating systems. The project is designed to simplify VPN deployment by encapsulating all required components, such as Libreswan and xl2tpd, into a single containerized environment. Users can quickly launch a secure VPN server using a single command, with credentials automatically generated for convenience. The system ensures encrypted communication, protecting user data from interception on unsecured networks like public Wi-Fi. It also supports multiple client platforms, including Windows, macOS, iOS, Android, and Linux, making it highly versatile. Additional tools are included for managing users and certificates, enhancing administrative control.
    Downloads: 14 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB