[go: up one dir, main page]

Go Internet Software

View 8645 business solutions

Browse free open source Go Internet Software and projects below. Use the toggles on the left to filter open source Go Internet Software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • 1
    ngrok

    ngrok

    Unified ingress for developers

    ngrok is a globally distributed, secure reverse proxy and tunneling service that exposes applications running on local machines behind NATs or firewalls to the public internet. It simplifies remote debugging, webhooks integration, and secure ingress by wrapping reverse proxy, firewall traversal, API gateway, and load-balancing functionality into a single tool. ngrok is a globally distributed reverse proxy that secures, protects and accelerates your applications and network services, no matter where you run them. You can think of ngrok as the front door to your applications. ngrok combines your reverse proxy, firewall, API gateway, and global load balancing into one. ngrok can capture and analyze all traffic to your web service for later inspection and replay.
    Downloads: 268 This Week
    Last Update:
    See Project
  • 2
    v2rayA

    v2rayA

    A web GUI client of Project V

    v2rayA is a V2Ray Linux client supporting global transparent proxy, compatible with SS, SSR, Trojan(trojan-go), PingTunnel protocols. We are committed to providing the simplest operation and meet most needs. Thanks to the advantages of Web GUI, you can not only use it on your local computer, but also easily deploy it on a router or NAS.
    Leader badge">
    Downloads: 6,653 This Week
    Last Update:
    See Project
  • 3
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration. Easily implement distribution by region or domain name to achieve optimal network performance. V2Ray can open multiple protocol support at the same time, including Socks, HTTP, Shadowsoks and VMess. The transmission carrier can be set separately for each protocol, such as TCP, mKCP and WebSocket. Nodes of V2Ray can be disguised as a normal website (HTTPS) to confuse its traffic with normal web traffic to avoid third-party interference. Universal reverse proxy support can achieve intranet penetration.
    Downloads: 207 This Week
    Last Update:
    See Project
  • 4
    Xray Core

    Xray Core

    Xray, Penetrates Everything. Also the best v2ray-core

    Xray-core is an enhanced superset of v2ray-core, providing a high-performance privacy proxy framework supporting XTLS. It offers full compatibility with v2ray configs, supports multiple protocols, advanced routing, and is distributed as a single executable.
    Downloads: 191 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 5
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 188 This Week
    Last Update:
    See Project
  • 6
    v2rayA

    v2rayA

    A web GUI client of Project V which supports V2Ray, Xray, SS, SSR

    A web GUI client of Project V which supports V2Ray, Xray, SS, SSR, Trojan and Pingtunnel. v2rayA is a V2Ray Linux client supporting global transparent proxy, compatible with SS, SSR, Trojan(trojan-go), PingTunnel protocols. We are committed to providing the simplest operation and meet most needs. Thanks to the advantages of Web GUI, you can not only use it on your local computer, but also easily deploy it on a router or NAS.
    Downloads: 128 This Week
    Last Update:
    See Project
  • 7
    frp

    frp

    A Fast Reverse Proxy

    frp stands for exactly what it is: a fast reverse proxy. It helps you expose a local server behind a NAT or firewall to the Internet. It is currently under development, but already supports TCP and UDP, as well as HTTP and HTTPS protocols where requests can be forwarded to internal services by domain name. It also has a P2P connect mode and many other nifty features. These include configuration files, environment variables, a dashboard that shows you frp's status and proxies' statistics information, an Admin UI that helps you check and manage frpc's configuration, and many others.
    Downloads: 82 This Week
    Last Update:
    See Project
  • 8
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. In GOST, GOST and other proxy services are considered as proxy nodes, GOST can handle the requests itself, or forward the requests to any one or more proxy nodes. In addition to configuring services directly from the command line, parameters can also be set by specifying the external configuration file with the -C parameter.
    Downloads: 79 This Week
    Last Update:
    See Project
  • 9
    NextDNS

    NextDNS

    NextDNS CLI client (DoH Proxy)

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones. Use the most popular ads & trackers blocklists, millions of domains all updated in real-time.
    Downloads: 77 This Week
    Last Update:
    See Project
  • Zendesk: The Complete Customer Service Solution Icon
    Zendesk: The Complete Customer Service Solution

    Discover AI-powered, award-winning customer service software trusted by 200k customers

    Equip your agents with powerful AI tools and workflows that boost efficiency and elevate customer experiences across every channel.
    Learn More
  • 10
    MailHog

    MailHog

    Web and API based SMTP testing

    Inspired by MailCatcher, easier to install. Built with Go, MailHog runs without installation on multiple platforms. Run it from Docker Hub or using the provided Dockerfile. The SMTP server starts on port 1025, the HTTP server starts on port 8025, in-memory message storage. ESMTP server implementing RFC5321. Support for SMTP AUTH (RFC4954) and PIPELINING (RFC2920). Web interface to view messages (plain text, HTML or source). Supports RFC2047 encoded headers. Real-time updates using EventSource. Release messages to real SMTP servers. Chaos Monkey for failure testing. HTTP API to list, retrieve and delete messages. See APIv1 and APIv2 documentation for more information. HTTP basic authentication for MailHog UI and API. Multipart MIME support. Download individual MIME parts. In-memory message storage. MongoDB and file based storage for message persistence. Lightweight and portable. No installation required.
    Downloads: 69 This Week
    Last Update:
    See Project
  • 11
    V2Ray Core

    V2Ray Core

    A platform for building proxies to bypass network restrictions

    V2Ray is the core of the Project V platform—a set of network tools for building custom proxy/VPN setups. It supports multiple protocols (VMess, SOCKS, Shadowsocks, HTTP, etc.), advanced routing, dynamic inbound/outbound connections, and is focused on privacy and bypassing censorship.
    Downloads: 53 This Week
    Last Update:
    See Project
  • 12
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    Gobuster is a tool used to brute-force. This project is born out of the necessity to have something that didn't have a fat Java GUI (console FTW), something that did not do recursive brute force, something that allowed me to brute force folders and multiple extensions at once, something that compiled to native on multiple platforms, something that was faster than an interpreted script (such as Python), and something that didn't require a runtime. Provides several modes, like the classic directory brute-forcing mode, DNS subdomain brute-forcing mode, the mode that enumerates open S3 buckets and looks for existence and bucket listings, and the virtual host brute-forcing mode (not the same as DNS!). Since this tool is written in Go you need to install the Go language/compiler/etc. Full details of installation and set up can be found on the Go language website. Once installed you have two options. You need at least go 1.16.0 to compile gobuster.
    Downloads: 45 This Week
    Last Update:
    See Project
  • 13
    Tailscale

    Tailscale

    The easiest, most secure way to use WireGuard and 2FA

    Tailscale is an open-source zero-configuration VPN and networking solution that makes it simple to create secure, private networks across devices by leveraging WireGuard under the hood. It lets users connect computers, servers, mobile devices, and cloud instances together with peer-to-peer encrypted tunnels without dealing with complex firewalls, NAT rules, or key distribution headaches. Instead of traditional VPN server infrastructure, Tailscale uses a coordination service to authenticate devices and exchange connection information, enabling automatic NAT traversal and minimal manual setup. The project includes a daemon (tailscaled) and a CLI tool that run on major operating systems, and it also forms the basis for the official clients on platforms like iOS and Android, though those have GUI wrappers not fully in this repository.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 14
    cunicu

    cunicu

    A zeroconf peer-to-peer mesh VPN using Wireguard

    cunīcu is a user-space daemon managing WireGuard interfaces to establish a mesh of peer-to-peer VPN connections in harsh network environments. To achieve this, cunīcu utilizes a signaling layer to exchange peer information such as public encryption keys, hostname, advertised networks, and reachability information to automate the configuration of the networking links. From a user perspective, cunīcu alleviates the need of manual configuration such as exchange of public keys, IP addresses, endpoints, etc.. Hence, it adopts the design goals of the WireGuard project, to be simple and easy to use. Thanks to Interactive Connectivity Establishment (ICE), cunīcu is capable of establishing direct connections between peers that are located behind NAT firewalls such as home routers. In situations where ICE fails, or direct UDP connectivity is not available, cunīcu falls back to using TURN relays to reroute traffic over an intermediate hop or encapsulate the WireGuard traffic via TURN-TCP.
    Downloads: 38 This Week
    Last Update:
    See Project
  • 15
    EdgeVPN

    EdgeVPN

    The immutable, decentralized, statically built p2p VPN

    Fully Decentralized. Immutable. Portable. Easy to use Statically compiled VPN and a reverse proxy over p2p. EdgeVPN uses libp2p to build private decentralized networks that can be accessed via shared secrets.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 16
    Rclone

    Rclone

    Rsync for cloud storage

    Rclone is a command line program for syncing files and directories to and from various cloud storage providers, including Google Drive, Amazon Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Cloudfiles, Google Cloud Storage, Yandex Files and many more.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 17
    GoProxy

    GoProxy

    High performance proxy server implemented by golang

    The GoProxy is a high-performance http proxy, https proxy, socks5 proxy, ss proxy, websocket proxies, tcp proxies, udp proxies, game shield, game proxies. Supports forward proxies, reverse proxy, transparent proxy, internet nat proxies, https proxy load balancing, http proxy load balancing , socks5 proxies load balancing, socket proxy load balancing, ss proxy load balancing, TCP / UDP port mapping, SSH transit, TLS encrypted transmission, protocol conversion, anti-pollution DNS proxy, API authentication, speed limit, limit connection. Reverse proxy to help you expose a local server behind a NAT or firewall to the internet so that you or your visitors can access it directly and easily. Chained proxies, the program itself can be used as a proxy, and if it is set up, it can be used as a secondary proxy or even an N-level proxy.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 18
    bombardier

    bombardier

    Fast cross-platform HTTP benchmarking tool written in Go

    bombardier is an HTTP(S) benchmarking tool. It is written in Go programming language and uses excellent fast HTTP instead of Go's default HTTP library, because of its lightning-fast performance. With bombardier v1.1 and higher, you can now use the net/HTTP client if you need to test HTTP/2.x services or want to use a more RFC-compliant HTTP client.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 19
    croc

    croc

    Easily and securely send things from one computer to another

    Yet another way to transfer files that strikes a good balance between speed, security or simplicity by using relay-assisted peer-to-peer transactions and end-to-end encryption via password-authenticated key exchange. There are a lot of ways to transfer files. Above the basic necessity of preserving the data during the transfer, sharing data should be fast, secure, and most of all, easy. Most file transfer utilities I’ve used encompass two thirds of these qualities. I’ve wanted to make a utility that encompasses all three, without compromising any one of them. A common way to transfer a file is to first upload data to a server, and then, once uploaded, the link is shared with someone who goes to download it. This method is easy, but slow, the transfer rate of the file is half the harmonic mean of the upload and download speeds which makes it slower than either just uploading or downloading.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 20
    NPS

    NPS

    Lightweight, high-performance, powerful intranet penetration proxy

    NPS is a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal. Comprehensive protocol support, compatible with almost all commonly used protocols, such as tcp, udp, http(s), socks5, p2p, http proxy. Full platform compatibility (linux, windows, macos, Synology, etc.), support installation as a system service simply. Comprehensive control, both client and server control are allowed. Https integration, support to convert backend proxy and web services to https, and support multiple certificates. Just simple configuration on web ui can complete most requirements. Complete information display, such as traffic, system information, real-time bandwidth, client version, etc. Powerful extension functions, everything is available (cache, compression, encryption, traffic limit, bandwidth limit, port reuse, etc.) Domain name resolution has functions such as custom headers, 404 page configuration, host modification, etc.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 21
    Telegraf

    Telegraf

    The plugin-driven server agent for collecting and reporting metrics

    Telegraf is an agent for collecting, processing, aggregating, and writing metrics. Design goals are to have a minimal memory footprint with a plugin system so that developers in the community can easily add support for collecting metrics. Telegraf is plugin-driven and has the concept of 4 distinct plugin types. Input Plugins collect metrics from the system, services, or 3rd party APIs. Processor Plugins transform, decorate, and/or filter metrics. Aggregator Plugins create aggregate metrics (e.g. mean, min, max, quantiles, etc.). Output Plugins write metrics to various destinations. New plugins are designed to be easy to contribute, pull requests are welcomed and we work to incorporate as many pull requests as possible. You can try Telegraf right in your browser in the Telegraf playground. Telegraf shares the same minimum requirements as Go.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 22
    Helm Diff Plugin

    Helm Diff Plugin

    Plugin that shows a diff explaining what a helm upgrade would change

    This is a Helm plugin giving you a preview of what a helm upgrade would change. It basically generates a diff between the latest deployed version of a release and a helm upgrade --debug --dry-run. This can also be used to compare two revisions/versions of your helm release.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 23
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 24
    shell2http

    shell2http

    Executing shell commands via HTTP server

    HTTP server to execute shell commands. Designed for development, prototyping or remote control. Settings through two command line arguments, path and shell command. With -the form-check option you can specify the regular expression for checking the form fields. To setup multiple auth users, you can specify the -basic-auth option multiple times. The credentials for basic authentication may also be provided via the SH_BASIC_AUTH environment variable. You can specify the preferred HTTP-method.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 25
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure. Pomerium uses identity and context to ensure secure access to internal applications, servers, and infrastructure even from untrusted networks. Pomerium adds authentication and authorization to any application or server, giving IT Management a centralized panel for organization-wide control. Assert compliance in your current architecture without giving up control over data tenancy. Pomerium supports your infrastructure and can be deployed in all environments: cloud, hybrid, or on-prem. From AWS to Kubernetes and more, your internal and 3rd-party apps are covered.
    Downloads: 16 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next