wireguard-ui VS mistborn

Compare wireguard-ui vs mistborn and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
wireguard-ui mistborn
29 63
3,543 -
- -
7.8 -
4 days ago -
Go
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

wireguard-ui

Posts with mentions or reviews of wireguard-ui. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-14.
  • IPv6 Breaks Android Apps
    1 project | /r/WireGuard | 11 Dec 2023
    # This file was generated using wireguard-ui (https://github.com/ngoduykhanh/wireguard-ui) # Please don't modify it manually, otherwise your change might get replaced. [Interface] Address = 10.25.0.1/24,2001:db8:abcd:AA10::1/60 ListenPort = 51820 PrivateKey = MTU = 1420 PostUp = iptables -A FORWARD -i wg0 -o wg0 -j ACCEPT PostUp = iptables -t nat -A POSTROUTING -s 10.25.0.0/24 -o eth0 -j MASQUERADE PostUp = iptables -A INPUT -p udp -m udp --dport 51820 -j ACCEPT PostDown = Table = auto [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.2/32,192.168.32.0/24,192.168.56.0/24,2001:db8:abcd:aa11::/64 # AllowedIPs are for site to site connection [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.3/32,10.0.0.0/16,2001:db8:abcd:aa12::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.4/32,2001:db8:abcd:aa13::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.5/32,2001:db8:abcd:aa14::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.6/32,2001:db8:abcd:aa15::/64
  • Wireguard - how are you generating client configurations for your users?
    1 project | /r/TPLink_Omada | 26 Aug 2023
    My previous experience was using this wireguard-ui container, super easy to create clients, and spits out a config file and/or QR code. Couldn't be any easier and removes all of the mumbo jumbo from the client's hands. And how that I'm looking at that package again I think I could potentially map it to the router's API, assuming there is one available for the VPN configs.
  • wireguard not connecting
    1 project | /r/WireGuard | 15 Aug 2023
    Wireguard log Uname info: Linux wireguard 6.2.0-20-generic #20-Ubuntu SMP PREEMPT_DYNAMIC Thu Apr 6 07:48:48 UTC 2023 x86_64 GNU/Linux 2023-08-13 22:01:40 **** It seems the wireguard module is already active. Skipping kernel header install and module compilation. **** 2023-08-13 22:01:41 **** Server mode is selected **** 2023-08-13 22:01:41 **** PersistentKeepalive will be set for: all **** 2023-08-13 22:01:42 **** SERVERURL var is either not set or is set to "auto", setting external IP to auto detected value of 78.72.85.114 **** 2023-08-13 22:01:42 **** External server port is set to 51820. Make sure that port is properly forwarded to port 51820 inside this container **** 2023-08-13 22:01:42 **** Internal subnet is set to 10.13.13.0 **** 2023-08-13 22:01:42 **** AllowedIPs for peers 0.0.0.0/0 **** 2023-08-13 22:01:42 **** PEERDNS var is either not set or is set to "auto", setting peer DNS to 10.13.13.1 to use wireguard docker host's DNS. **** 2023-08-13 22:01:42 **** Server mode is selected **** 2023-08-13 22:01:42 **** No changes to parameters. Existing configs are used. **** 2023-08-13 22:01:42 [custom-init] No custom files found, skipping... 2023-08-13 22:01:46 .:53 2023-08-13 22:01:46 CoreDNS-1.10.1 2023-08-13 22:01:46 linux/amd64, go1.20.7, 2023-08-13 22:01:47 [#] ip link add wg0 type wireguard 2023-08-13 22:01:47 [#] wg setconf wg0 /dev/fd/63 2023-08-13 22:01:47 [#] ip -4 address add 10.13.13.1 dev wg0 2023-08-13 22:01:47 [#] ip link set mtu 1420 up dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.5/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.4/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.3/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.2/32 dev wg0 2023-08-13 22:01:47 [#] iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth+ -j MASQUERADE 2023-08-13 22:01:47 [ls.io-init] done. wireguard ui logs 2023-08-13 21:50:03 ⇨ http server started on [::]:5000 2023-08-13 22:01:20 [#] ip link delete dev wg0 2023-08-13 22:01:21 [#] iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o wg0 -j MASQUERADE 2023-08-13 22:01:27 [#] ip link add wg0 type wireguard 2023-08-13 22:01:27 [#] wg setconf wg0 /dev/fd/63 2023-08-13 22:01:27 [#] ip -4 address add 10.252.1.0/24 dev wg0 2023-08-13 22:01:27 [#] ip link set mtu 1450 up dev wg0 2023-08-13 22:01:27 [#] iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o wg0 -j MASQUERADE 2023-08-13 22:01:29 Wireguard UI 2023-08-13 22:01:29 App Version : dev 2023-08-13 22:01:29 Git Commit : b55543f 2023-08-13 22:01:29 Git Ref : N/A 2023-08-13 22:01:29 Build Time : 08-13-2023 20:01:29 2023-08-13 22:01:29 Git Repo : https://github.com/ngoduykhanh/wireguard-ui 2023-08-13 22:01:29 Authentication : true 2023-08-13 22:01:29 Bind address : 0.0.0.0:5000 2023-08-13 22:01:29 Email from : 2023-08-13 22:01:29 Email from name : WireGuard UI 2023-08-13 22:01:29 Custom wg.conf : 2023-08-13 22:01:29 Base path : / 2023-08-13 22:01:29 ⇨ http server started on [::]:5000
  • Remote multi user editing
    1 project | /r/unrealengine | 19 May 2023
    you can always setup wireguard on your vps. its not that hard, this article by digital ocean article is quite thorough. That article has a lot on information so it looks harder than it actually is. You could also use something like this to help set things up faster. ive used that ui before but dont actively host it, only when i need to add peers. If you do actively host the ui make sure you dont expose it to the internet. Not because there is some security issue just because its imo not best practice. You can also use hamachi or any of the other hamachi like services
  • Wireguard without VPS?
    7 projects | /r/selfhosted | 14 May 2023
    Maybe this, https://github.com/ngoduykhanh/wireguard-ui
  • unable to route traffic via Wireguard tunnel
    1 project | /r/WireGuard | 26 Mar 2023
    I have 2 VPS servers running Debian 11. I have installed Wireguard, and Wureguard UI I can connect those two sites, but there is no traffic going between them. I want to create Site to site tunnel. And than later I Will also want to create Client VPN so I can use it on my laptop when needed. but currently I am not able to get any traffic between those 2 VPS servers.
  • Help needed with setup to local network
    1 project | /r/WireGuard | 21 Feb 2023
    A couple of days ago I stumbled upon this awesome project (https://github.com/ngoduykhanh/wireguard-ui). I immediately tried to get it running in order to access my local home network from the outside.
  • ngoduykhanh / wireguard-ui - Default Client Subnet
    1 project | /r/WireGuard | 14 Feb 2023
    # This file was generated using wireguard-ui (https://github.com/ngoduykhanh/wireguard-ui)
  • Wireguard container and ngoduykhanh / wireguard-ui
    1 project | /r/WireGuard | 21 Nov 2022
    Hello, i am running wireguard in a container on a raspberry4 with the docker-compose.yml from linuxserver. I'd like now to use a gui but I am stuck with the docker-compose example from ngoduykhanh / wireguard-ui
  • Add WireGuard VPN on my exicting PI-hole+unbound ubuntu DNS server on my old laptop.
    3 projects | /r/pihole | 23 Oct 2022
    Personally, I’ve stopped using pi VPN quite a while ago. I’ve only used there console interface. Don’t know if there’s a official GUI by now. But there are a few gui alternatives available. I’ve been using this: https://github.com/ngoduykhanh/wireguard-ui

mistborn

Posts with mentions or reviews of mistborn. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-16.
  • Mistborn Selfhosted
    1 project | /r/selfhosted | 8 Dec 2023
    Guys, anyone has experience with Mistborn ?
  • I want to run Nextcloud on my server running Jellyfin
    1 project | /r/NextCloud | 28 May 2023
    There is a github project that rolls a Nextcloud instance and Jellyfin together in a docker install. It also rolls a bunch more stuff as well. https://gitlab.com/cyber5k/mistborn
  • Cannot get WireGuard and Pi-hole working for the life of me
    1 project | /r/WireGuard | 27 Mar 2023
    try mistborn: https://gitlab.com/cyber5k/mistborn
  • vault warden behind vpn
    1 project | /r/selfhosted | 8 Mar 2023
    https://gitlab.com/cyber5k/mistborn has wireguard and valtwarden built-in
  • Firewall settings, any advice for my setup?
    1 project | /r/pihole | 8 Mar 2023
    So there is one other option you can run with - mistborn. Now, fair warning - if you want to run this on a pi....flash at least 100GB of storage space on a microssd and then for the OS I recommend a Ubuntu flavor of your choice. Ideally the latest one he has listed as successful on his table of distros that he successfully installed it on.
  • Ask HN: Share your new devbox setup process My own setup is included here
    4 projects | news.ycombinator.com | 16 Jan 2023
    I find the fundamental problem with this sort of server setup script/config management is that they inevitably get quite personal. Nobody really wants to use another devs and when you try to allow for a lot of customisation they tend get byzantine and complex.

    That said I still think it's worth sharing. If nothing else we can all usually cherry pick nice ideas from each other.

    I had an entirely private set of Ansible roles I'd cobbled together that I started to put in a more shareable state a couple of years ago. It has little overlap with what you're putting together, but I do think you might find the way it separates personal Ansible config and the main project roles into separate directories (and thus different git repos) useful.

    I really need to dust off my project and get it to a releasable state this year [momod](https://github.com/adrinux/momod).

    I assume you've come across the many similar projects like [Sovereign](https://github.com/sovereign/sovereign), [Mistborn](https://gitlab.com/cyber5k/mistborn)

  • Wireguard Multihop VPN wg0 > wg1
    1 project | /r/WireGuard | 10 Jan 2023
    https://gitlab.com/cyber5k/mistborn on my endpoint but route my traffic thru another another WG server first thus creating a multihop VPN in the interests of security
  • Folks, it's happening. The day I dreaded might be here soon.
    1 project | /r/consulting | 1 Dec 2022
    I've been using selfhosted Nextcloud with OnlyOffice for years. I've yet to encounter something it can't handle. In fact I opened up my setup at the beginning of the pandemic so others could host their own: https://gitlab.com/cyber5k/mistborn
  • minecraft server
    1 project | /r/HomeServer | 10 Nov 2022
  • What’s some self hosted applications you can’t live without?
    6 projects | /r/HomeServer | 4 Nov 2022

What are some alternatives?

When comparing wireguard-ui and mistborn you can also consider the following projects:

wg-ui - WireGuard Web UI for self-serve client configurations, with optional auth.

tailscale - The easiest, most secure way to use WireGuard and 2FA.

wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]

wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.

wg-portal - WireGuard Configuration Portal with LDAP connection

porn-vault - 💋 Manage your ever-growing porn collection. Using Vue & GraphQL

wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.

selfhosted-apps-docker - Guide by Example

firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.

rustdesk - An open-source remote desktop, and alternative to TeamViewer.

Wireguard-Manager-and-API - A Wireguard VPN Server Manager and API to add and remove clients

Open and cheap DIY IP-KVM based on Raspberry Pi - Open and inexpensive DIY IP-KVM based on Raspberry Pi