Showing 22 open source projects for "bypass vpn"

View related business solutions
  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.


    How the world collects public web data

    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
    Learn More
  • Dynamic Work and Complex Project Management Platform | Quickbase Icon
    Dynamic Work and Complex Project Management Platform | Quickbase

    Quickbase is the leading application platform for dynamic work.

    Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.
    Learn More
  • 1
    hiddify-app

    hiddify-app

    Multi-platform auto-proxy client, supporting Sing-box, X-ray, TUIC

    Hiddify is a comprehensive VPN and proxy client designed to facilitate secure internet access and bypass censorship. It supports advanced proxy protocols like V2Ray, Shadowsocks, and Trojan, offering configuration through QR codes, links, and subscription services. Hiddify aims to be user-friendly while also catering to power users with customizable options, making it a popular choice in regions with restricted internet access.
    Downloads: 867 This Week
    Last Update:
    See Project
  • 2
    Expose

    Expose

    A beautiful, fully open-source, tunneling service

    ...Expose is written in PHP and can be self-hosted, giving developers full control over their infrastructure, domains, and traffic while avoiding reliance on third-party tunneling services. The system includes both a client and server component, where the client runs locally and the server manages incoming connections and tunnel routing. It can bypass common restrictions such as firewalls or VPN limitations by establishing an outbound connection from the local machine to the tunnel s
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers.
    Downloads: 1,073 This Week
    Last Update:
    See Project
  • 4
    Clash for Android

    Clash for Android

    Mobile counterpart to desktop Clash clients for Android

    ...It provides a front end to define inbound and outbound proxy rules, supports various protocols like SOCKS5, Shadowsocks, V2Ray, and more, and lets users import configurations through URLs or local files, handling dynamic subscription updates. With its ability to route app or domain-specific traffic, Android users can implement split-tunneling, bypass geographic restrictions, and optimize latency for performance-sensitive apps without requiring full VPN profiles. The application usually includes features like logs, traffic monitoring, and status indicators so users can see how rules are applied in real time, and it fits into Android’s VPN API to create a local virtual network interface for routing.
    Downloads: 296 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 5
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    CF-Workers-docker.io is a project by cmliu that sets up a proxy for Docker Hub (and potentially other container image registries) using Cloudflare Workers, effectively acting as a middle-man mirror to improve image pull reliability and speed in regions where direct access is degraded. The idea is to intercept registry requests, reroute or mirror them through a worker endpoint, and therefore bypass regional limitations or firewall blocks affecting official Docker registries. Users can deploy their own copy of this proxy, point their Docker daemon’s registry-mirrors configuration to it, and benefit from an accelerated and more accessible image pull experience. The project’s README warns about possible policy risks—since Cloudflare’s terms forbid use of Workers for VPN or similar proxy services, so users deploy at their own risk. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Clash for Windows

    Clash for Windows

    Windows GUI client application built on the Clash core proxy engine

    Clash for Windows is a desktop GUI client application built on the Clash core proxy engine, providing a user-friendly interface for managing and routing network connections through customizable rule sets and multiple proxy protocols. It targets advanced users who need fine-grained control of how traffic is routed on Windows systems, enabling scenarios like split-tunneling, region-based routing, and domain-specific proxy selection. Using Clash’s rule syntax and support for diverse inbound and...
    Downloads: 374 This Week
    Last Update:
    See Project
  • 7
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/android-64-psimux-4g-0limit/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup is shared for educational and testing purposes only. ...
    Downloads: 101 This Week
    Last Update:
    See Project
  • 8
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/vpn-4g-ssl-tls-sni-vpngate/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định
    Downloads: 253 This Week
    Last Update:
    See Project
  • 9
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints.
    Leader badge
    Downloads: 1,304 This Week
    Last Update:
    See Project
  • Run your private office with the ONLYOFFICE Icon
    Run your private office with the ONLYOFFICE

    Secure office and productivity apps

    A Comprehensive Alternative to Office 365 for Business
    Learn More
  • 10
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 11

    openddos-deluxe

    A free Python DDoS script I made for EDUCATIONAL PURPOSES.

    It's probably the best DoS python script out there that is for free (to my knowledge). I made this for educational purposes, It is not under my responsibility if an individual uses my application for illegal purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Unplug

    Unplug

    Free, open source internet blocker for windows computers

    Unplug is a free, open source internet blocker for windows computers. Unplug lets you block all outbound connections for the period of time of your choosing. Meaning that browsers, email, vpn, ftp, ssh and every other thing that uses the internet will not work. This app might help you if: - You are struggling with any internet related addictions (online gaming, gambling, pornography, video streaming) - You waste hours of time a day mindlessly sufring the web instead of doing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    V2Ray Core

    V2Ray Core

    A platform for building proxies to bypass network restrictions

    V2Ray is the core of the Project V platform—a set of network tools for building custom proxy/VPN setups. It supports multiple protocols (VMess, SOCKS, Shadowsocks, HTTP, etc.), advanced routing, dynamic inbound/outbound connections, and is focused on privacy and bypassing censorship.
    Downloads: 85 This Week
    Last Update:
    See Project
  • 14

    .lua Private

    my private script

    being fun on game what you bad at for Crisis Action only you need to load this script whit game guardian this is for aim lock use game guardian and bypass before u open the vitual app dont open real app cause you get banned if you dont use virtual app always use bypass before open virtual if you dont want this app get force close in mid game that only what you need to do if you want to get this app work on you phone/or maybe you play on emulator in this case you need to get your pc only use vpn you dont need to get hthe bypass if you do that this app dont need to get root fo only mac maybe this got to big problem use linux to get more safe using thiss script cheat i use to talk to much cuz i like it ok simply use bypass for CA you can get it from youtube there is alot people share the bypass for thiss game dont forget to urn off the anti-viruses beefore you install the bypass no need to panic if your pc get infected you can deleted the bypass and download it again anytime.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 32 This Week
    Last Update:
    See Project
  • 16
    Streisand

    Streisand

    Streisand sets up a new server running your choice

    Streisand is a tool that automates the deployment of censorship-resistant VPN services on cloud servers. It was created to help users bypass internet censorship and surveillance by quickly setting up secure communication channels without needing deep system administration expertise. With just a cloud provider account and basic Unix command-line knowledge, Streisand can provision a server and configure multiple VPN and proxy protocols almost automatically.
    Downloads: 456 This Week
    Last Update:
    See Project
  • 17
    respite vpn - ssh & openvpn injector

    respite vpn - ssh & openvpn injector

    Bypass your ISP's firewalls and connect to the internet!

    Source: https://github.com/AlizerUncaged/HTTP-Injector respite is a SSH/openVPN client that allows you to connect to the internet with custom injected HTTP Proxy headers. This application requires Java (https://www.java.com/en/download/) and .Net 4.5 (https://www.microsoft.com/en-ph/download/details.aspx?id=42642 .Net 4.5 is already preinstalled in Windows 10). There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com HTTP Proxy responses...
    Downloads: 58 This Week
    Last Update:
    See Project
  • 18

    InstaDowner

    A Denial Of Service Tool

    This is a tool used for Denial Of Service and should only be used with permission or is to be used for testing. We have all of the following methods on our tool- UDP TCP LDAP OVH NFO VPN SSYN HOME DNS HTTP HTTPS BYPASS we also offer an attack time of up to 7200 seconds
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Betternet
    From Betternet: Betternet is a free VPN utility for Windows that help mask your identity and prevent your online activity from being tracked. Betternet is a VPN for Windows with no ads and no registration. The distinctive features of betternet: * It's free forever. * It supports Windows 10, 8.1, 8, 7. * No credit cards needed. * No Registration or Login is needed. * No log is saved from any users. * Simple, one tap connect. * It connects you to the fastest Server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    SurfOpenly

    SurfOpenly

    Connect to a vpn server, hide your identity and access every thing.

    SurfOpenly is a reliable and lightweight application designed to help you connect to a VPN server from anywhere in the world. The software allows you to connect to the VPN server in order to navigate the Internet under the server address, instead of your system’s IP, thus protecting your privacy. With SurfOpenly, connecting your station to a VPN server is made easy and safe. A VPN, or a virtual private network is designed to extend a private network across the Internet, using dedicated...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Psiphon Portable

    Psiphon Portable

    Uncensored Internet access

    Psiphon is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet content. Your Psiphon client will automatically learn about new access points to maximize your chances of bypassing censorship. Psiphon is designed to provide you with open access to online content. Psiphon does not increase your online privacy, and should not be considered or used as an online security tool.
    Leader badge
    Downloads: 179 This Week
    Last Update:
    See Project
  • 22

    Firewall Bypasser

    bypass firewall censorship & get full internet access over restriction

    Please Download Latest ver with fixed bugs. Firewall bypasser is a proxy based VPN working programe that provide you freedom to surf Inernet. There is no "Admin Rights " required for installation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB