Identity-aware VPN and proxy for remote access to anything, anywhere.
-
Updated
Jan 29, 2026 - TypeScript
Identity-aware VPN and proxy for remote access to anything, anywhere.
A lightweight, cryptography-powered, open-source toolkit built to enforce Zero Trust security for infrastructure, applications, and data in the AI-driven world.
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history
8 Lessons, Kick-start Your Cybersecurity Learning.
Pomerium is an identity and context-aware access proxy.
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
Boundary enables identity-based access management for dynamic infrastructure.
The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @openziti
Secure internet sharing made simple.
đź’š Secure remote browsing anywhere.
A next-gen FOSS self-hosted unified zero trust secure access platform that can operate as a remote access VPN, a ZTNA platform, API/AI/MCP gateway, a PaaS, an ngrok-alternative and a homelab infrastructure.
DockFlare: Automate Cloudflare Tunnels with Docker Labels
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Warrant is a highly scalable, centralized authorization service based on Google Zanzibar. Use it to define, enforce, query, and audit application authorization and access control.
Single Packet Authorization > Port Knocking
OpenAM is an open-source access management solution for identity authentication, authorization, and federation. It provides single sign-on, adaptive authentication, and centralized policy control, enabling secure access to web, mobile, and cloud applications
A curated collection of awesome resources for the zero-trust security model.
zero trust opensource network management and observability platform
Add a description, image, and links to the zero-trust topic page so that developers can more easily learn about it.
To associate your repository with the zero-trust topic, visit your repo's landing page and select "manage topics."