Showing 17 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    Mullvad VPN desktop and mobile app

    Mullvad VPN desktop and mobile app

    The Mullvad VPN client app for desktop and mobile

    In a society that is increasingly determined to weaken that right, a fast, reliable and easy-to-use VPN connection is a good first step towards achieving this. By connecting to the Internet with Mullvad, we ensure that traffic to and from your device is encrypted to the highest standards, even when using public Wi-Fi in a coffee shop or hotel. We do not keep activity logs or ask for personal information, and we even encourage anonymous payments using cash or any of the accepted cryptocurrencies. Your IP address will be replaced with one of ours, ensuring that device activity and location are not linked to your user. Using Mullvad is quick and easy - just download and install the app. ...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    OpenFortiVPN

    OpenFortiVPN

    Client for PPP+TLS VPN tunnel services

    openfortivpn is a command-line SSL VPN client for connecting to Fortinet FortiGate gateways without relying on proprietary GUIs. It negotiates the SSL/TLS tunnel, authenticates with credentials (and commonly with two-factor methods), then brings up a secure point-to-point interface and installs routes and DNS settings. The tool aims to be minimal and dependable: a single binary with an INI-style config file, systemd compatibility, and clear runtime diagnostics. It handles details like MTU...
    Downloads: 47 This Week
    Last Update:
    See Project
  • 3
    cunicu

    cunicu

    A zeroconf peer-to-peer mesh VPN using Wireguard

    ...Thanks to Interactive Connectivity Establishment (ICE), cunīcu is capable of establishing direct connections between peers that are located behind NAT firewalls such as home routers. In situations where ICE fails, or direct UDP connectivity is not available, cunīcu falls back to using TURN relays to reroute traffic over an intermediate hop or encapsulate the WireGuard traffic via TURN-TCP.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Proton VPN GTK App

    Proton VPN GTK App

    Official ProtonVPN Linux app

    The Proton VPN GTK App repository contains the official Linux desktop client for ProtonVPN using the GTK toolkit, allowing users of GNOME, XFCE, and other Linux desktop environments to connect securely to Proton’s VPN servers with a native-looking interface. Built with Python or C and leveraging the GTK framework, this app provides intuitive controls for server selection, connection management, and status reporting, integrating with Linux system networking and user session environments. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Multi-Account Containers

    Multi-Account Containers

    Keep parts of your online life separated into color-coded tabs

    Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs. Cookies are separated by container, allowing you to use the web with multiple accounts and integrate Mozilla VPN for an extra layer of privacy. Under the hood, it separates website storage into tab-specific Containers. Cookies downloaded by one Container are not available to other Containers. You can even integrate individual Containers with Mozilla VPN to protect your browsing and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    DSVPN

    DSVPN

    A dead simple VPN

    DSVPN is a Dead Simple VPN, designed to address the most common use case for using a VPN. Runs on TCP. Works pretty much everywhere, including on public WiFi where only TCP/443 is open or reliable. Uses only modern cryptography, with formally verified implementations. Small and constant memory footprint. Doesn't perform any heap memory allocations. Small (~25 KB), with an equally small and readable code base. No external dependencies.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 8
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9
    Internet Security Tools

    Internet Security Tools

    A set of internet security tools

    ...This module also includes Tor - connect to the onion router, Bleachbit - Clears browser history and other unused files similar to ccleaner, as well as one click installs for disconnect + noscript firefox addons. It can be run from the menu or from terminal using "internet-security-tools" A new "I.D" tab is available to change MAC address and change hostname temporarily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10

    VPN Load Tester

    A tool to perform load testing on IPFire's OpenVPN server

    VPN Load Tester is a tool to perform load testing on IPFire's OpenVPN server. By using KVM and Libvirt in a CentOS 6 server, it is able to create a large number of virtual VPN clients and connect those client machines to the VPN server at the same time. It is able to control all VPN clients to perform the same tasks on the VPN server. For example, it is able to control all VPN clients to send network traffic to the VPN server at the same time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Compassh

    the OpenSSH VPN, without the VPN

    Compassh is an helper for the popular OpenSSH remote connection software, focused on providing near-VPN service without the complexity and the setup required by a real VPN. Using a VPN software may require an ad-hoc firewall setup, the generation of a key (pair) and the installation of the VPN software on a host that is not under your control. Compassh try to solve as much of this problems with a smart use of OpenSSH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Rapid Tunneling is a set of scripts using ssh -R that provides a VPN-like functionality with an easy-to-use command-line and web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This contains a sample implementation of DTLS-VPN using OpenSSL DTLSv1 Support - to send data over an encrypted channel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Traffic shaper for vpn, poptop, etc., using iproute2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PyVpn is a software for management VPN connections for GNU/Linux written in Python using pySqlite and pyGtk. With DB support and Wi-Fi support too. It is based on the "iwconfig" utilities and the "ppp" package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Ncurses based tool for easily deploying IPsec tunnels using FreeSWAN (Linux only) Easy to configure a tunnel, simple options, user friendly interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Tunnel communication through a SOCKS proxy. With SSH and PPP, this provides a more efficient VPN than using httptunnel. This can also be used for running applications such as SETI@Home through SOCKS. Visit http://www.securitybulletins.com/ for more info.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next