Gfw Softwares and Apps

Discover best Gfw softwares, apps and websites.

Filter by Platform

Platforms:

Gfw Applications

Sort:
Freegate

Freegate

Free

Freegate is a robust anti-censorship software designed to bypass internet firewalls and access blocked websites securely and anonymously. Developed by Dynamic Internet Technology (DIT), it utilizes dynamic encryption and a network of proxy servers to provide uncensored internet access primarily to users in regions with strict internet controls.

Highly effective in bypassing strict internet censorship.
Anticensorship
Security & Privacy
Shadowsocks

Shadowsocks

Open Source

Shadowsocks is an open-source, lightweight SOCKS5 proxy designed to bypass internet censorship. It provides a secure tunnel between your device and the internet, helping users access blocked content and surf anonymously by encrypting traffic and making it appear as regular HTTPS traffic.

Effective at bypassing sophisticated firewalls like the GFW.
Anticensorship
Development Security & Privacy
UltraSurf

UltraSurf

Free

UltraSurf is a freeware tool designed to help users bypass internet censorship and access blocked websites. It routes traffic through its own network of proxy servers, providing a degree of anonymity and enabling users to circumvent geographical restrictions and firewalls.

Bypasses censorship effectively.
Anticensorship
Security & Privacy
Codinn SSH Proxy

Codinn SSH Proxy

Commercial

Codinn SSH Proxy is a powerful yet user-friendly application designed to transform remote SSH servers into secure SOCKS or HTTPS proxies. It simplifies the process of creating SSH tunnels, providing a reliable way to bypass network restrictions and enhance online privacy and security.

Easy to configure SSH proxies (SOCKS/HTTPS).
SSH
Security & Privacy
Codinn SSH Tunnel

Codinn SSH Tunnel

Commercial

Codinn SSH Tunnel is a powerful and user-friendly SSH tunneling application designed to provide secure and flexible network connections. It allows users to bypass firewalls and access resources securely by creating SSH tunnels.