AlternativeTo Logo

Apps with 'Bypass Firewall' feature

  1. Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
  2. A fast tunnel proxy that helps you bypass firewalls.


    • Mac
    • Windows
    • Online
    • Android
    • iPhone
    • Chrome OS
    • Android Tablet
    • iPad
    • Microsoft Edge
    • Vivaldi Browser
    • Google Chrome
    • Maxthon
    • Yandex.Browser
    • Opera
    • Chromium
    • Firefox
    More
    ZenMate is an easy to use Browser plugin that provides a VPN solution - encrypting all your browser traffic and routing it through our ZenMate cloud to provide a secure and private browsing experience. Forget internet restrictions!
  3. Freegate is an anti-censorship software for secure and fast Internet access. It was developed and maintained by Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention operation.

    Warning

    The installer is detected as malicious by some antiviruses: https://www.virustotal.com/gui/file/20017fd064a42e743ecb6f6fd5b8b60efc21e7f3979b07fcd23a811514f23111

  4. FreePN is the first completely free, completely open network dedicated to protecting your online privacy. Joining the network is easy: just download and install the app. No accounts, no registration, no setup. Once you start the app, you're already protected.
    No screenshots yet
  5. Remote Utilities is a remote PC access program for connecting to a remote PC over LAN or via the Internet. The program is used by system administrators, home users and helpdesks for remotely managing PCs in their corporate or home network, or providing customer support.
  6. UltraSurf is a free software which enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. Users in countries without internet censorship also use it to protect their internet privacy and security.

    Warning

    This app is suspected of malicious behavior, though these accusations are in dispute. The software allegedly connects to websites of financial and government institutions, and uses the PC for attacks against them. It disables SSL certificate checks and allows man-in-the-middle attacks to steal authentication credentials. It hooks into the browser and uses suspicious compression to hide parts of the program.

  7. LambdaTest is a cloud-based cross browser testing platform that helps enterprises run web automation tests at scale (through parallel testing).
    • FreemiumProprietary
    • Mac
    • Windows
    • Android
    • iPhone
    • Android Tablet
    • iPad
    • Fire TV
    More
    Turbo VPN is an unlimited VPN (Virtual Private Network) proxy with no registration needed.
  8. Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier.
  9. Packetriot makes it simple to expose services and data on local and private networks to the Internet. You can serve static websites, dynamic web applications, test single-sign-on work-flows or build webhooks.
  10. n2n is a VPN project that supports p2p. Its goal is to provide mobile version support.
    No screenshots yet
  11. "Private Network Master" is a browser extension to route all the browser traffic through an external server.
    • Mac
    • Windows
    • Linux
    • Online
    • Android
    • iPhone
    • Android Tablet
    • iPad
    • Google Chrome
    • Android TV
    • Kodi
    • Playstation
    • Fire TV
    • Xbox
    • Firefox
    More
    Ivacy has completely transformed its service, and are better than ever. Ivacy now offers servers in 44+ countries, along with additional protocols. Moreover, the whole website is revamped to make navigation user-friendly and interactive.
  12. CT-Assist is a cloud managed VPN, remote access and support tool. It allows users to remotely control and manage computers over the internet using a secure encrypted virtual private network.