A high-performance tun2socks implementation that transparently routes all network traffic through various proxy protocols using the gVisor TCP/IP stack.
tun2socks is a network tunneling tool that intercepts system-level traffic and transparently redirects it through various proxy servers. It solves the problem of routing all network connections from any application through proxies without requiring individual application configuration, using Google's gVisor TCP/IP stack for performance and reliability.
Network engineers, security professionals, and developers who need to route all system traffic through proxies for privacy, security testing, or bypassing network restrictions.
Developers choose tun2socks for its high performance, cross-platform compatibility, and support for multiple proxy protocols, all while leveraging the robust gVisor network stack for reliable user-space networking.
tun2socks - powered by gVisor TCP/IP stack
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Routes all network traffic from any application without modifications, as emphasized in the universal proxying feature, making it ideal for system-wide privacy or debugging.
Supports HTTP, SOCKS, Shadowsocks, SSH, and Relay proxies with optional authentication, offering flexibility for various proxy setups.
Runs on Linux, macOS, Windows, FreeBSD, and OpenBSD with platform-specific optimizations, ensuring broad deployment options.
Leverages Google's gVisor network stack for enhanced performance, with benchmarks showing it outperforms other tools in various scenarios.
Natively supports IPv6, tunnels IPv4 over IPv6 and vice versa, and can act as a Layer 3 gateway to route traffic from other devices.
Requires configuration of TUN/TAP interfaces and proxy settings, which can be challenging for users unfamiliar with network tunneling, as hinted by the separate installation and quickstart documentation.
Does not provide built-in proxy servers; it only redirects traffic to external proxies, which may add dependency and security concerns for end-to-end solutions.
Primarily a command-line tool, lacking a GUI for easier configuration and real-time monitoring, making it less accessible for non-technical users.
Using the gVisor network stack in user-space, while flexible, may introduce latency compared to kernel-level implementations, especially on resource-constrained systems.