Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Algo | 27,303 | 5 days ago | 155 | agpl-3.0 | Jinja | |||||
Set up a personal VPN in the cloud | ||||||||||
Setup Ipsec Vpn | 21,943 | 13 days ago | 2 | other | Shell | |||||
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2 | ||||||||||
Openvpn | 8,621 | 2 days ago | 53 | other | C | |||||
OpenVPN is an open source VPN daemon | ||||||||||
Netmaker | 6,838 | 3 days ago | 64 | September 20, 2022 | 141 | other | Go | |||
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks. | ||||||||||
Docker Ipsec Vpn Server | 5,532 | 13 days ago | 2 | other | Shell | |||||
Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2 | ||||||||||
Firezone | 4,284 | 4 hours ago | 50 | apache-2.0 | Elixir | |||||
WireGuard®-based VPN server and firewall | ||||||||||
Wireguard Docs | 4,010 | 9 days ago | 11 | mit | Shell | |||||
📖 Unofficial WireGuard Documentation: Setup, Usage, Configuration, and full example setups for VPNs supporting both servers & roaming clients. | ||||||||||
Wgcf | 3,501 | 6 days ago | 4 | January 02, 2022 | 21 | mit | Go | |||
🚤 Cross-platform, unofficial CLI for Cloudflare Warp | ||||||||||
Meshbird | 3,446 | 4 months ago | January 30, 2016 | 12 | apache-2.0 | Go | ||||
Distributed private networking | ||||||||||
I2pd | 2,423 | 6 days ago | 77 | bsd-3-clause | C++ | |||||
🛡 I2P: End-to-End encrypted and anonymous Internet |
A Virtual Private Network (VPN) allows users to send and receive data through shared or public networks as if their computing devices were directly connected to the private network. Thus, applications running on an end-system (PC, smartphone, etc.) over a VPN may benefit from individual network features, protection, and management. Encryption is a standard aspect of a VPN connection but not an intrinsic one.
WireGuard is a straightforward yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general-purpose VPN for running on embedded interfaces and super computers alike, fit for many circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under a massive development, but it already might be regarded as the most secure, most comfortable to use, and the simplest VPN solution in the industry.
Kernel 3.1
or newersudo
privilege.Lets first use curl
and save the file in /usr/local/bin/
curl https://raw.githubusercontent.com/complexorganizations/wireguard-manager/main/wireguard-manager.sh --create-dirs -o /usr/local/bin/wireguard-manager.sh
Then let's make the script user executable
chmod +x /usr/local/bin/wireguard-manager.sh
It's finally time to execute the script
bash /usr/local/bin/wireguard-manager.sh
In your /etc/wireguard/clients
directory, you will have .conf
files. These are the peer configuration files. Download them from your WireGuard Interface and connect using your favorite WireGuard Peer.
usage: ./wireguard-manager.sh <command>
--install Install WireGuard
--start Start WireGuard
--stop Stop WireGuard
--restart Restart WireGuard
--list Show WireGuard
--add Add WireGuard Peer
--remove Remove WireGuard Peer
--reinstall Reinstall WireGuard
--uninstall Uninstall WireGuard
--update Update WireGuard Manager
--ddns Update WireGuard IP Address
--backup Backup WireGuard
--restore Restore WireGuard
--purge Purge WireGuard Peer(s)
--help Show Usage Guide
PRIVATE_SUBNET_V4_SETTINGS
- By default, the private IPv4 subnet configuration is 10.0.0.0/8
.PRIVATE_SUBNET_V6_SETTINGS
- fd00:00:00::0/8
is the default private IPv6 subnet.SERVER_HOST_V4_SETTINGS
- Curl detects a public IPv4 address by default.SERVER_HOST_V6_SETTINGS
- Curl by default finds a public IPv6 address.SERVER_PUB_NIC_SETTINGS
- Using the ip command, to find the local public network interface.SERVER_PORT_SETTINGS
- 51820
is the default public port for the wireguard interface.NAT_CHOICE_SETTINGS
- Determine whether or not to use the vpn tunnel's keep alive feature.MTU_CHOICE_SETTINGS
- The wireguard peers will utilize this MTU.SERVER_HOST_SETTINGS
-CLIENT_ALLOWED_IP_SETTINGS
- Using an IP range, choose what should be sent to the VPN.AUTOMATIC_UPDATES_SETTINGS
-AUTOMATIC_BACKUP_SETTINGS
-DNS_PROVIDER_SETTINGS
- You'll have to utilize another DNS if you don't have Unbound.CONTENT_BLOCKER_SETTINGS
-CLIENT_NAME
- The wireguard peer's name.AUTOMATIC_CONFIG_REMOVER
-OS | i386 | amd64 | armhf | arm64 |
---|---|---|---|---|
Ubuntu 14 | ❌ | ❌ | ❌ | ❌ |
Ubuntu 16 | ✔️ | ✔️ | ✔️ | ✔️ |
Debian 7 | ❌ | ❌ | ❌ | ❌ |
Debian 8 | ✔️ | ✔️ | ✔️ | ✔️ |
CentOS 6 | ❌ | ❌ | ❌ | ❌ |
CentOS 7 | ✔️ | ✔️ | ✔️ | ✔️ |
Fedora 29 | ❌ | ❌ | ❌ | ❌ |
Fedora 30 | ✔️ | ✔️ | ✔️ | ✔️ |
RedHat 6 | ❌ | ❌ | ❌ | ❌ |
RedHat 7 | ✔️ | ✔️ | ✔️ | ✔️ |
Kali 1.0 | ❌ | ❌ | ❌ | ❌ |
Kali 1.1 | ✔️ | ✔️ | ✔️ | ✔️ |
Arch | ✔️ | ✔️ | ✔️ | ✔️ |
Raspbian | ✔️ | ✔️ | ✔️ | ✔️ |
PopOS | ✔️ | ✔️ | ✔️ | ✔️ |
Manjaro | ✔️ | ✔️ | ✔️ | ✔️ |
Mint | ✔️ | ✔️ | ✔️ | ✔️ |
Alma | ✔️ | ✔️ | ✔️ | ✔️ |
Alpine | ✔️ | ✔️ | ✔️ | ✔️ |
FreeBSD | ✔️ | ✔️ | ✔️ | ✔️ |
Neon | ✔️ | ✔️ | ✔️ | ✔️ |
Rocky | ✔️ | ✔️ | ✔️ | ✔️ |
Oracle | ✔️ | ✔️ | ✔️ | ✔️ |
Cloud | Supported |
---|---|
AWS | ✔️ |
Google Cloud | ✔️ |
Linode | ✔️ |
Digital Ocean | ✔️ |
Vultr | ✔️ |
Microsoft Azure | ✔️ |
OpenStack | ✔️ |
Rackspace | ✔️ |
Scaleway | ✔️ |
EuroVPS | ✔️ |
Hetzner Cloud | ❌ |
Strato | ❌ |
Virtualization | Supported |
---|---|
KVM | ✔️ |
None | ✔️ |
Qemu | ✔️ |
LXC | ✔️ |
Microsoft | ✔️ |
Vmware | ✔️ |
OpenVZ | ❌ |
Docker | ❌ |
WSL | ❌ |
Kernel | Supported |
---|---|
Linux Kernel 3.0 | ❌ |
Linux Kernel 3.1 | ✔️ |
Which hosting provider do you recommend?
Which WireGuard client do you recommend?
Is there WireGuard documentation?
How do I install a wireguard without the questions? (Headless Install)
./wireguard-manager.sh --install
Are there any good alternative to self-hosting vpn?
Why is all the code in one place?
Which port do I need to forward for wireguard, and which protocol should I use?
51820
must be forwarded.For unbound, which ports do I need to forward?
53
.What is blocked if I enable the content blocker?
What kind of information is collected and how is it gathered?
If I want to set up my own VPN server, what should I purchase?
How much should the entire cost of constructing your own VPN be?
Official Links
Developing the code without having to clone the repository
After cloning the repo, Then start debugging the code.
git clone https://github.com/complexorganizations/wireguard-manager /root/
bash -x /root/wireguard-manager/wireguard-manager.sh >>/root/wireguard-manager/wireguard-manager.log
Open Source Community
![]() |