Showing 22 open source projects for "firewall bypass"

View related business solutions
  • SOCRadar Extended Threat Intelligence Platform Icon
    SOCRadar Extended Threat Intelligence Platform

    Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.

    SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
    Start Free Trial
  • Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries. Icon
    Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.

    For Residential, Commercial and Public Works Contractors

    Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
    Learn More
  • 1
    OpenWrt PassWall

    OpenWrt PassWall

    OpenWRT plugin that provides proxy routing management

    openwrt-passwall is a comprehensive OpenWRT plugin that provides proxy routing management for internet traffic. It integrates with various tools and protocols like Shadowsocks, V2Ray, XRay, and Trojan to bypass censorship and optimize network performance. Designed for advanced users and network administrators, Passwall features a full-featured web UI and dynamic rules for routing and DNS control.
    Downloads: 196 This Week
    Last Update:
    See Project
  • 2
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. Zapret implements multiple...
    Downloads: 1,169 This Week
    Last Update:
    See Project
  • 3
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. Nipe currently operates over IPv4 and does not yet support IPv6, meaning that users with IPv6 connectivity may bypass Tor routing. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    go-libp2p

    go-libp2p

    libp2p implementation in Go

    go-libp2p is the official Go implementation of the libp2p networking stack, a modular and extensible framework for peer-to-peer communication. Used in systems like IPFS and Filecoin, go-libp2p abstracts away the complexity of building decentralized networks by handling discovery, transport, security, and multiplexing layers. Its modular architecture allows developers to customize network behavior while maintaining interoperability with other libp2p implementations. It empowers developers to...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Network Discovery Software | JDisc Discovery Icon
    Network Discovery Software | JDisc Discovery

    JDisc Discovery supports the IT organizationss of medium-sized businesses and large-scale enterprises.

    JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices.
    Learn More
  • 5
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    CF-Workers-docker.io is a project by cmliu that sets up a proxy for Docker Hub (and potentially other container image registries) using Cloudflare Workers, effectively acting as a middle-man mirror to improve image pull reliability and speed in regions where direct access is degraded. The idea is to intercept registry requests, reroute or mirror them through a worker endpoint, and therefore bypass regional limitations or firewall blocks affecting official Docker registries. Users can deploy their own copy of this proxy, point their Docker daemon’s registry-mirrors configuration to it, and benefit from an accelerated and more accessible image pull experience. The project’s README warns about possible policy risks—since Cloudflare’s terms forbid use of Workers for VPN or similar proxy services, so users deploy at their own risk. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Slipstream

    Slipstream

    NAT Slipstreaming allows an attacker to remotely access any TCP/UDP

    Slipstream (also referred to as “NAT Slipstreaming”) is a proof-of-concept exploit framework that allows an attacker to remotely access any TCP or UDP service running on a victim machine inside a NAT (behind a router/firewall) simply by tricking the target to visit a malicious website. It works by abusing the NAT’s Application Level Gateway (ALG) logic and connection tracking, combined with browser capabilities like WebRTC, precise packet fragmentation or boundary control, and packet injection techniques. The attack is able to bypass browser port restrictions by fragmenting or massaging packets so that the “exploit payload” lands in a packet boundary that gets parsed by the NAT/ALG as a legitimate protocol packet (e.g. ...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    gooreplacer

    gooreplacer

    A browser extension to modify HTTP requests

    At first, Gooreplacer was created for redirecting Google Ajax/Api/Themes to other CDN to bypass Great Firewall since pages referring to those are slow as molasses. Most users prefer gooreplacer than other similar extensions(HTTPS Everywhere/Redirector) for ease of use. Why not give it a try? gooreplacer was originally born to solve the inability to access Google resources (Ajax, API, etc.) in China, which caused the page loading speed to be extremely slow.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    In the early days, the firewall only intercepted and reviewed outbound traffic, that is,Passive detection. Shadowsoks' encryption protocol design makes the transmitted data package itself have almost no characteristics, and it looks similar to a completely random bitflow, which can indeed effectively bypass GFW in the early days. Contrary to Shadowsoks, Trojan does not use self-defined encryption protocols to hide itself.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Run your private office with the ONLYOFFICE Icon
    Run your private office with the ONLYOFFICE

    Secure office and productivity apps

    A Comprehensive Alternative to Office 365 for Business
    Learn More
  • 10
    WhatWaf?

    WhatWaf?

    Detect and bypass web application firewalls and protection systems

    WhatWaf is an advanced firewall detection tool who's goal is to give you the idea of "There's a WAF?". WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    babe-control

    this app is a reverse www shell for windows

    this app is a reverse www shell for windows operating systems . Reverse WWW Shell is a process that creates covert channels using HTTP protocol . Reverse WWW Shell allows fathers to access a babe's machine on the internet network from outside . Reverse WWW Shell server executes the commands, sends the results to Reverse WWW Shell master (via http request), and retrieves the next command (via http reply) this app work on all version of Windows Operating Systems Windows NT...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    respite vpn - ssh & openvpn injector

    respite vpn - ssh & openvpn injector

    Bypass your ISP's firewalls and connect to the internet!

    Source: https://github.com/AlizerUncaged/HTTP-Injector respite is a SSH/openVPN client that allows you to connect to the internet with custom injected HTTP Proxy headers. This application requires Java (https://www.java.com/en/download/) and .Net 4.5 (https://www.microsoft.com/en-ph/download/details.aspx?id=42642 .Net 4.5 is already preinstalled in Windows 10). There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com HTTP Proxy responses...
    Downloads: 58 This Week
    Last Update:
    See Project
  • 13
    httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    payloadmask

    payloadmask

    Payload list editor to use techniques to bypass WAF

    Payload mask tool to edit web payload lists to try bypass web application firewall. A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Jxtadoop

    Jxtadoop

    This project aims to provide P2P capabilities with Hadoop DFS.

    ...The goal of this project is to provide an alternative to direct IP connectivity required for Hadoop. Instead, the DFS layer has been modified to use a Peer-2-Peer framework which allows direct connectivity in datacenters as well as indirect connectivity to bypass firewall constraints. The typical use case is the use of servers in various DMZs with hundreds of gigabytes of data not used which can be leveraged to provide a massive storage cloud for Hadoop. The first release of Jxtadoop focused on providing the data storage layer with P2P capabilities based on the JXTA framework. contact : franck@besnard.mobi source : https://github.com/besn0847/Jxtadoop *** IMPORTANT NOTE *** Make sure you use Java 1.7 JRE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Firewall Bypasser

    bypass firewall censorship & get full internet access over restriction

    Please Download Latest ver with fixed bugs. Firewall bypasser is a proxy based VPN working programe that provide you freedom to surf Inernet. There is no "Admin Rights " required for installation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    India Web Proxy
    India Web Proxy v1.0 Orginal ©2010 Proxy tunnel between web sever and client. Java PHP web tunnel network socket client Internet proxy bypass surf anonymous proxy unblock TCP IP Proxy pass filter firewall, unblock YouTube Facebook Twitter Myspace.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    In just one clic (no setup) this Java Applet based solution allows you to run VNC Server / VNC Viewer through an HTTP AES encrypted tunnel. As it is full HTTP, there is no proxy or firewall setup needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A simple CVS client that bypass any firewall blocking port 2401 used by cvs. It relies on the ViewCVS web interface to the repository to work. To use when all other solutions (SSH...) fail
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    netloop is a daemon that connects together two TCP/IP clients or two TCP/IP servers. used to bypass firewall blocking all incoming connections trafic by reversing connection direction
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.
    Downloads: 16 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB