net2share

net2share / dnstm

Public

DNS Tunnel Manager

208
18
100% credibility
Found Feb 02, 2026 at 110 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

A command-line manager for setting up and running DNS-based tunnels on Linux servers with support for multiple encryption methods and endpoints.

How It Works

1
🔍 Discover the secure tunnel tool

You find a simple way to create private internet tunnels using everyday domain names on your Linux server.

2
📥 Get it running quickly

Run a one-click setup script to prepare your server for tunnels.

3
🔧 Set up your connection endpoint

Choose where incoming traffic goes, like a built-in proxy or your SSH server.

4
🌉 Build your first tunnel

Pick a fast encrypted method, link it to your endpoint, and assign a unique web address.

5
🚀 Launch your tunnel to the world

Start it with one command and watch your secure path come alive on the internet.

6
🔄 Add more or switch as needed

Easily create extra tunnels or flip between them for different needs.

Enjoy private, unstoppable access

Your data now flows freely through your custom DNS tunnel, safe from blocks.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 110 to 208 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is dnstm?

dnstm is a Go CLI tool for deploying and managing DNS tunnel servers on Linux, letting you route traffic through public DNS resolvers like 1.1.1.1 to bypass firewalls. Set up NS records pointing to your server, then use commands like `sudo dnstm tunnel add` or an interactive menu to configure Slipstream or DNSTT transports forwarding to SOCKS, SSH, Shadowsocks, or custom backends. It handles single tunnels or multi-tunnel routing via a built-in DNS router, auto-generating TLS certs/keys, firewall rules, and systemd services.

Why is it gaining traction?

It simplifies dns tunneling wikipedia-style setups—no manual scripting for certs, keys, or services like with iodine—while supporting multi-tunnel dns github server routing for scaling. The one-command install script, config file loading, and TUI make it dead simple versus cobbling together dnstt-server or slipstream binaries. Devs dig the auto-updates, logs, and status checks for dns tunnel detection evasion in restricted nets.

Who should use this?

Network engineers building dns tunnel vpn apk proxies for censored regions, or ops folks running dns tunneling wsl on servers for remote access. Ideal for devs testing github dns blocklist bypasses or needing quick SOCKS over DNS without Wireshark pcap debugging hassles. Skip if you're just doing dns github check or github dns pages hosting.

Verdict

Solid for dns tunneling prevention testing or production proxies—polished CLI and docs punch above 158 stars—but the 1.0% credibility score flags low adoption/maturity risks. Try it if you need managed dns github ios-like tunnels; otherwise, stick to battle-tested alts until more stars roll in.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.