ropi
wg-easy
ropi | wg-easy | |
---|---|---|
1 | 20 | |
4 | 12,056 | |
- | 8.0% | |
2.3 | 9.8 | |
about 1 year ago | 4 days ago | |
Shell | JavaScript | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ropi
-
Build your own private WireGuard VPN with PiVPN
https://github.com/nolanl/ropi
There are commands to enable/disable read-write mode, so you can still make changes and do upgrades.
I've had 0 problems with SDcard death after I started using it.
wg-easy
-
PiHole after wireguard install?
Check out wg-easy on GitHub. There is also a wg with pinole on their page. Works so easily together. https://github.com/wg-easy/wg-easy
-
Alternative to Headscale?
sounds like you just want wg-easy.
-
WireHole is a combination of WireGuard, Pi-hole, and Unbound
This wg-easy?
Definitely not an OSI approved license, but does look like they made an attempt in the spirit of GPL, no?
https://github.com/wg-easy/wg-easy/blob/master/LICENSE.md
> You may:
Use this software for yourself;
Use this software for a company;
Modify this software, as long as you:
Publish the changes on GitHub as an open-source & linked fork;
Don't remove any links to the original project or donation pages;
You may not:
Use this software in a commercial product without a license from the original author;
- The Tailscale Universal Docker Mod
-
Who do you use for port forwarding?
wg-easy running in Docker. Then access it using WireGuard on my mobile devices.
-
Netmaker/Tailscale Vs Traditional VPNs
Just plain wg-easy (wireguard with frontend). No 3rd parties involved, just me & my endpoint
-
Is it possible to make a phone connect to a server without having to open any ports on the server side ?
I suggest running a VPN server like wireguard (very easy to install on phone and set up using https://github.com/wg-easy/wg-easy) and have the port open only to that. The VPN will do the rest in terms of NATing ports and whatnot.
- Which is more of a pain in the ass: connecting to databases via SSH tunnels, or whitelisting IP addresses?
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/wg-easy/wg-easy (7.6k stars)
-
Changing Private IP to domain or something locally for selfhosted RSS-Bridge?
I use wg-easy for now https://github.com/wg-easy/wg-easy
What are some alternatives?
wg-setup - Scripts to better manage a WireGuard server
wireguard-ui - Wireguard web interface
easy-wg-quick - Creates Wireguard configuration for hub and peers with ease
pivpn - The Simplest VPN installer, designed for Raspberry Pi
VxWireguard-Generator - Utility to generate VXLAN over Wireguard mesh SD-WAN configuration
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
gpn - 'guard Private Network
wg-manager - A easy to use WireGuard dashboard and management tool
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
wg-gen-web - Simple Web based configuration generator for WireGuard
dumbproxy - Dumbest HTTP proxy ever
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask