|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Frp||65,427||9||2 days ago||78||July 10, 2022||108||apache-2.0||Go|
|A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.|
|Nps||24,980||14 days ago||53||October 09, 2021||409||gpl-3.0||Go|
|一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发，可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面，内网dns解析、内网socks5代理等等……，并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.|
|Gost||11,480||4||5||11 days ago||4||March 24, 2021||230||mit||Go|
|GO Simple Tunnel - a simple tunnel written in golang|
|Chisel||8,718||2||21||14 days ago||27||February 03, 2022||173||mit||Go|
|A fast TCP/UDP tunnel over HTTP|
|Rathole||4,893||8 days ago||18||September 16, 2022||41||apache-2.0||Rust|
|A lightweight and high-performance reverse proxy for NAT traversal, written in Rust. An alternative to frp and ngrok.|
|Sish||3,265||1||a month ago||34||November 12, 2021||7||mit||Go|
|HTTP(S)/WS(S)/TCP Tunnels to localhost using only SSH.|
|Go Http Tunnel||3,031||4 days ago||November 29, 2017||55||agpl-3.0||Go|
|Fast and secure tunnels over HTTP/2|
|Expose your localhost to the web. Node wrapper for ngrok.|
|Neo Regeorg||1,972||22 days ago||5||gpl-3.0||Java|
|Neo-reGeorg is a project that seeks to aggressively refactor reGeorg|
|Gost||1,055||1||14 hours ago||6||March 15, 2022||46||mit||Go|
|GO Simple Tunnel - a simple tunnel written in golang|
Go HTTP tunnel is a reverse tunnel based on HTTP/2. It enables you to share your localhost when you don't have a public IP.
Common use cases:
IF YOU WOULD LIKE TO SEE THIS PROJECT MODERNIZED PLEASE UPVOTE THE ISSUE.
Build the latest version.
$ go get -u github.com/mmatczuk/go-http-tunnel/cmd/...
Alternatively download the latest release.
There are two executables:
tunneld- the tunnel server, to be run on publicly available host like AWS or GCE
tunnel- the tunnel client, to be run on your local machine or in your private network
To get help on the command parameters run
tunneld -h or
Tunnel requires TLS certificates for both client and server.
$ openssl req -x509 -nodes -newkey rsa:2048 -sha256 -keyout client.key -out client.crt $ openssl req -x509 -nodes -newkey rsa:2048 -sha256 -keyout server.key -out server.crt
.tunneldirectory in your project directory
$ tunnel -config ./tunnel/tunnel.yml start-all
$ tunneld -tlsCrt .tunneld/server.crt -tlsKey .tunneld/server.key
This will run HTTP server on port
80 and HTTPS (HTTP/2) server on port
443. If you want to use HTTPS it's recommended to get a properly signed certificate to avoid security warnings.
$ vim tunneld.service
[Unit] Description=Go-Http-Tunnel Service After=network.target After=network-online.target [Service] ExecStart=/path/to/your/tunneld -tlsCrt /path/to/your/folder/.tunneld/server.crt -tlsKey /path/to/your/folder/.tunneld/server.key TimeoutSec=30 Restart=on-failure RestartSec=30 [Install] WantedBy=multi-user.target
$ sudo mv tunneld.service /etc/systemd/system/
$ sudo chmod u+x /etc/systemd/system/tunneld.service
$ sudo systemctl start tunneld.service
$ sudo systemctl stop tunneld.service
$ sudo systemctl enable tunneld.service
There are many more options for systemd services, and this is by not means an exhaustive configuration file.
The tunnel client
tunnel requires configuration file, by default it will try reading
tunnel.yml in your current working directory. If you want to specify other file use
Sample configuration that exposes:
looks like this
server_addr: SERVER_IP:5223 tunnels: webui: proto: http addr: localhost:8080 auth: user:password host: webui.my-tunnel-host.com ssh: proto: tcp addr: 192.168.0.5:22 remote_addr: 0.0.0.0:22 tls: proto: sni addr: localhost:443 host: tls.my-tunnel-host.com
server_addr: server TCP address, i.e.
tls_crt: path to client TLS certificate, default:
client.crtin the config file directory
tls_key: path to client TLS certificate key, default:
client.keyin the config file directory
root_ca: path to trusted root certificate authority pool file, if empty any server certificate is accepted
tunnels / [name]
proto: tunnel protocol,
addr: forward traffic to this local port number or network address, for
proto=httpthis can be full URL i.e.
https://machine/sub/path/?plus=params, supports URL schemes
proto=http) (optional) basic authentication credentials to enforce on tunneled requests, format
proto=sni) hostname to request (requires reserved name and DNS CNAME)
proto=tcp) bind the remote TCP address
interval: how long client would wait before redialing the server if connection was lost, exponential backoff initial interval, default:
multiplier: interval multiplier if reconnect failed, default:
max_interval: maximal time client would wait before redialing the server, default:
max_time: maximal time client would try to reconnect to the server if connection was lost, set
0to never stop trying, default:
A client opens TLS connection to a server. The server accepts connections from known clients only. The client is recognized by its TLS certificate ID. The server is publicly available and proxies incoming connections to the client. Then the connection is further proxied in the client's network.
The tunnel is based HTTP/2 for speed and security. There is a single TCP connection between client and server and all the proxied connections are multiplexed using HTTP/2.
If this project help you reduce time to develop, you can give me a cup of coffee.
A GitHub star is always appreciated!
Copyright (C) 2017 Michał Matczuk
This project is distributed under the AGPL-3 license. See the LICENSE file for details. If you need an enterprice license contact me directly.