Showing 10 open source projects for "vpn gnu"

View related business solutions
  • Workspace management made easy, fast and affordable. Icon
    Workspace management made easy, fast and affordable.

    For companies searching for a desk booking software for safe and flexible working

    The way we work has changed and Clearooms puts you in complete control of your hybrid workspace. Both meeting rooms and hot desk booking can be easily managed to ensure flexible and safe working, however big or small your organisation.
    Learn More
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 1
    3X-UI

    3X-UI

    Xray panel supporting multi-protocol multi-user expire day

    3X‑UI is an enhanced fork of the X‑UI project, serving as a multifunctional web panel to manage VPN services. It supports multi‑protocol configurations (like VMess, VLESS, Trojan, Shadowsocks, WireGuard), offers traffic and user limits, SSL management, multilingual support, and integrates Telegram notifications for system events. Advanced, open-source web-based control panel designed for managing Xray-core server. It offers a user-friendly interface for configuring and monitoring various VPN...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 2
    clash-rules

    clash-rules

    Clash Premium rule set (RULE-SET), compatible with ClashX Pro

    clash-rules is a repository that provides rule sets and configuration files designed for proxy tools and systems like V2Ray / Clash — helping users to decide routing, blocking, or proxy behavior based on domain, IP, or other criteria. The repo aggregates many community-maintained lists: blocked domains, direct access lists, proxy-needed domains, geo-IP lists, and more — offering up-to-date and curated configuration data that reflects network conditions, censorship lists, or desirable routing...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    SideStore

    SideStore

    SideStore is a fork of AltStore that doesn't require an AltServer

    SideStore is an untethered, community-driven alternative app store for non-jailbroken iOS devices. SideStore is an iOS application that allows you to sideload apps onto your iOS device with just your Apple ID. SideStore resigns apps with your personal development certificate and then uses a specially designed VPN in order to trick iOS into installing them. SideStore will periodically "refresh" your apps in the background, to keep their normal 7-day development period from expiring....
    Downloads: 163 This Week
    Last Update:
    See Project
  • 4
    MSI Downloader

    MSI Downloader

    MSI installers for a wide range of software and utilities

    MSI Downloader has been created for IT professionals who want a quick and easy method of downloading the latest MSI installers for various software. MSI installers are much easier to use for deployment using systems like Group Policy, Microsoft Deployment Toolkit (MDT) and Microsoft System Center Configuration Manager (SCCM). Some publishers happily supply MSI installers for their software, however, some are very hard to find. So this new tool will not only be providing the easy to...
    Leader badge
    Downloads: 240 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    Ubuntu-Business-Desktop (LXC)

    Ubuntu-Business-Desktop (LXC)

    Ubuntu LXQT - LXC Template for Proxmox

    This is a LXC-Template witch can be used for a company or private. It's an adapted Ubuntu with x2go-Terminalserver and Webmincontrol. It's easy to control the system with webmin. You never must use the terminal. Try it!
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    KT-Connect

    KT-Connect

    A toolkit for Integrating with your kubernetes dev environment

    KtConnect ("Kt" is short for "Kubernetes Toolkit") is a utility tool to help you work with the Kubernetes dev environment more efficiently. Directly Access a remote Kubernetes cluster. KtConnect use ssh-vpn or socks-proxy to access remote Kubernetes cluster networks. Developers can exchange the workload to redirect the requests to a local app. You can create a mesh version service in the local host, and redirect specified workload requests to your local. Expose a local running app to the...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7
    Guard Stone is an Open Source Security Platform, which enables to integrate and deploy open source security tools. Some of Guard Stone's focus areas include Firewall, VPN, Mail Gateway Filters, Web Filters, Web Application Security, Routing etc;
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    yoni

    yoni

    Yoni secures your privacy when your vpn fails

    yoni is a linux command line tool which ensures that chosen applications run only when chosen vpn connection is active.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    vpnguard

    Daemon making your VPN resilient to disconnections and other failures

    Linux daemon restarting your VPN in case of disconnection or no bandwidth in the tunnel. It sends notifications to your email address and it stop / start other services when VPN goes down. Based on nmtools, entirely implemented in bash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 10
    EmpeecoMail: A full featured POP3 mail server, proxy server, DHCP server, fax server. Interactive/service on WIN32 systems. Multiple users mailboxes on LAN or Broadband VPN. Collect from multiple external Mailboxes. Spam Filter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB