NetBird

Best Self-hosted Alternatives to NetBird

A curated collection of the 9 best self hosted alternatives to NetBird.

NetBird is a cloud-managed, WireGuard-based zero-trust networking service that creates encrypted overlay networks to connect users and devices. It provides access control, device management, SSO integration, and secure remote access to private resources.

Alternatives List

#1
Headscale

Headscale

Headscale is an open source, self-hosted implementation of the Tailscale control server for managing a private tailnet, nodes, keys, IPs, and routes.

Headscale screenshot

Headscale is an open source, self-hosted implementation of the Tailscale control server. It coordinates a WireGuard-based overlay network by exchanging node keys, assigning addresses, and managing routes and sharing within a tailnet.

Key Features

  • Implements core control-plane functions for a Tailscale-compatible network (tailnet)
  • Node registration and coordination via Tailscale clients
  • WireGuard key exchange and IP address management
  • User/namespace boundaries and machine sharing between users
  • Route advertisement and management for subnet routing
  • Designed for a single tailnet suited to personal use or small organizations

Use Cases

  • Run a private Tailscale-compatible VPN without relying on the hosted control server
  • Connect homelab, servers, and remote devices via a WireGuard-based overlay network
  • Provide secure remote access and subnet routing for a small team or community project

Limitations and Considerations

  • Focused on a narrow scope: a single tailnet rather than large multi-tenant deployments
  • Some Tailscale features may be unavailable or behave differently depending on client support and Headscale version

Headscale is a practical choice for self-hosters who want the Tailscale experience with an open control plane. It emphasizes a lean, hobbyist-friendly approach while supporting common coordination features needed for a private overlay network.

35.8kstars
1.9kforks
#2
wg-easy

wg-easy

Run a WireGuard VPN server with an easy web admin UI to manage clients, generate configs and QR codes, and monitor connections and traffic.

wg-easy screenshot

wg-easy is an all-in-one WireGuard VPN solution that bundles a WireGuard server with a web-based admin interface. It simplifies provisioning and managing VPN clients while providing visibility into connected peers and traffic.

Key Features

  • All-in-one deployment: WireGuard plus web admin UI
  • Create, edit, enable/disable, and delete VPN clients
  • Generate and display client QR codes and download configuration files
  • Connection status and per-client traffic statistics with Tx/Rx charts
  • One-time links and client expiration support
  • Prometheus metrics support
  • IPv6 and CIDR support
  • Optional 2FA support
  • Light/dark mode and multilingual UI

Use Cases

  • Managing a home lab or small team VPN without manual config editing
  • Quickly onboarding devices via QR code configuration
  • Monitoring VPN usage and traffic per client with basic metrics

wg-easy is well-suited for users who want a straightforward way to deploy WireGuard and handle day-to-day client administration through a browser. It combines simple operations with useful visibility features while keeping WireGuard management approachable.

24.7kstars
2.4kforks
#3
Pangolin

Pangolin

Open-source identity-based remote access platform combining WireGuard VPN and tunneled reverse proxy access with granular zero-trust controls.

Pangolin screenshot

Pangolin is an identity-based remote access platform built on WireGuard that securely routes traffic to private and public resources across multiple networks. It combines VPN-style connectivity with browser-based reverse proxy access to applications, using zero-trust access controls.

Key Features

  • WireGuard-based tunnels to connect remote networks (“sites”) without exposing ports or requiring public IPs
  • Browser-based access to web applications via identity- and context-aware tunneled reverse proxy
  • Client-based access to private resources (for example SSH, databases, RDP, and network ranges)
  • Granular zero-trust access controls so users only reach explicitly allowed resources
  • SSO and OIDC support, plus additional authentication options such as PIN and passwords
  • Centralized dashboard to manage applications across networks, with access logging and policy enforcement
  • Automatic TLS/SSL certificate handling for proxied apps

Use Cases

  • Provide secure access to internal tools (Grafana, Bitwarden, admin panels) across offices, cloud VPCs, and edge locations
  • Replace or complement traditional VPNs with per-application access and stronger identity enforcement
  • Publish self-hosted web apps safely without directly exposing the underlying network

Limitations and Considerations

  • Dual-licensed: Community Edition under AGPL-3, with separate enterprise/commercial licensing terms

Pangolin is well-suited for teams and homelabs that need identity-aware access to distributed networks and apps. It emphasizes minimizing network exposure while still enabling convenient browser and client access to protected resources.

19.2kstars
578forks
#4
Amnezia

Amnezia

Open-source VPN client for desktop and mobile that can automatically set up a private VPN server and connect using WireGuard, OpenVPN, IKEv2, and obfuscated modes.

Amnezia screenshot

Amnezia is an open-source VPN client for desktop and mobile that helps you connect to a VPN and, notably, deploy your own private VPN server on a VPS. It automates server setup and supports multiple VPN protocols, including options designed to help in restrictive networks.

Key Features

  • Automated VPN server deployment via SSH, including installing required Docker containers
  • Supports classic VPN protocols: WireGuard, OpenVPN, and IKEv2
  • Traffic masking/obfuscation options such as OpenVPN over Cloak, OpenVPN over Shadowsocks, AmneziaWG, and XRay
  • Split tunneling for selected sites (and apps on Android and desktop)
  • Cross-platform clients for Windows, macOS, Linux, Android, and iOS

Use Cases

  • Quickly deploying a personal VPN on a rented server for privacy and safer browsing
  • Connecting from networks with VPN restrictions using obfuscation-capable modes
  • Enabling VPN only for specific apps or websites via split tunneling

Limitations and Considerations

  • Requires access to a remote server (VPS) and working SSH credentials to automate deployment
  • Some protocols and masking methods may require extra troubleshooting depending on network censorship and ISP behavior

Amnezia is a practical choice for users who want a single client that both provisions and manages a private VPN server and provides multi-protocol connectivity across major operating systems. Its protocol variety and masking options make it especially useful in challenging network environments.

10.2kstars
720forks
#5
iodine

iodine

iodine is a DNS tunneling tool that forwards IPv4 traffic through DNS queries and replies, providing a TUN interface to route IP traffic when only DNS is allowed.

iodine screenshot

iodine is a tunnel application that transports IPv4 traffic through DNS, using a client and server to create a virtual network interface and route IP packets over DNS queries and replies. It is commonly used in constrained networks where direct internet access is blocked but DNS is still permitted.

Key Features

  • Client/server IP-over-DNS tunnel using a TUN/TAP virtual interface
  • Works across multiple platforms (Linux, BSDs, macOS, and Windows)
  • Supports multiple DNS record types for transport, with autodetection for best throughput
  • Automatic probing of fragment/packet sizes to optimize performance
  • Challenge-response login and basic peer filtering to reduce unauthorized injection
  • Can fall back to raw UDP tunneling when direct UDP to port 53 is possible

Use Cases

  • Remote connectivity from restricted networks that only allow DNS traffic
  • Creating a temporary backchannel for administration and troubleshooting
  • Running a second-layer VPN or SSH-over-tunnel for more secure transport

Limitations and Considerations

  • Carries IPv4 payload only; tunneled traffic is not encrypted by default
  • Throughput is constrained and often asymmetric, depending on DNS relays and policies
  • Client and server typically need matching versions due to protocol compatibility

iodine is a pragmatic tool for establishing connectivity over DNS when other protocols are blocked, offering portability and performance-focused DNS transport choices. For security-sensitive scenarios, it is best used as a transport for an encrypted layer such as VPN or SSH.

7.7kstars
575forks
#6
OpenZiti

OpenZiti

OpenZiti is an open-source zero trust networking platform that builds an identity-based overlay mesh with SDKs, tunnelers, and policy-based access controls.

OpenZiti screenshot

OpenZiti is an open-source, programmable zero trust networking platform for connecting applications using an identity-based overlay network instead of IP-based trust. It provides a fabric (mesh), edge components, and SDKs/tunnelers to securely connect users, devices, and services with policy-driven access.

Key Features

  • Identity-based connectivity with certificate-backed identities and policy-based authorization
  • Application segmentation and “deny by default” access controls for services
  • Overlay mesh fabric with smart routing and pluggable capabilities
  • “Dark” services and routers that can operate without inbound listening ports by using outbound connections into the fabric
  • End-to-end encryption options, including application-embedded connectivity via SDKs
  • REST management APIs and a web-based admin console for managing the network
  • Support for integrating existing apps through tunnelers and proxies when embedding SDKs is not feasible

Use Cases

  • Zero trust access to internal applications across hybrid and multi-cloud environments
  • Secure machine-to-machine or service-to-service communications without exposing ports
  • Replacing or reducing traditional VPN access with per-application access policies

Limitations and Considerations

  • Some advanced capabilities (for example, true process-to-process protection) are best achieved when applications embed the OpenZiti SDKs rather than relying only on tunnelers
  • Designing policies, identity lifecycle, and PKI can add operational complexity compared to simple IP allowlists

OpenZiti is well-suited for teams that want a flexible, open-source foundation for zero trust application access. It combines a scalable overlay fabric with strong identity controls and multiple integration options, ranging from SDK embedding to tunneling and proxying.

3.9kstars
237forks
#7
WGDashboard

WGDashboard

Self-hosted web dashboard for WireGuard and AmneziaWG to manage configs, peers, and access with a simple UI and optional 2FA.

WGDashboard is a lightweight web interface for managing and monitoring WireGuard VPN servers without relying on manual command-line checks. It discovers existing WireGuard and AmneziaWG configurations and provides a central place to administer peers and view key status details.

Key Features

  • Seamless integration with existing WireGuard and AmneziaWG setups
  • Automatic discovery of configurations under common server paths
  • Web UI to manage configurations and peers
  • Add single or multiple peers with auto-generated configuration details
  • Edit, restrict, and delete peers
  • Share peer access via QR code or shareable link, with email sharing support
  • Optional TOTP-based multi-factor authentication (2FA)
  • Job scheduling for actions like restricting or deleting peers based on conditions

Use Cases

  • Administer a small-to-medium WireGuard VPN for a homelab, family, or team
  • Quickly onboard and rotate client devices by generating and sharing peer configs
  • Monitor and manage multiple WireGuard configurations from a single UI

Limitations and Considerations

  • Not affiliated with the official WireGuard project
  • Feature set and compatibility depend on the underlying WireGuard/AmneziaWG environment and server configuration

WGDashboard is a practical choice for operators who want a simple, self-hosted control panel for WireGuard peer lifecycle management and basic monitoring. It focuses on the most important operational tasks while keeping setup and day-to-day administration straightforward.

3.4kstars
404forks
#8
ShellHub

ShellHub

Centralized SSH gateway to remotely manage Linux servers, containers and IoT devices via web or native SSH; offers key auth, firewall rules, audit logging and session recording.

ShellHub screenshot

ShellHub is a centralized SSH gateway that lets teams remotely access and manage Linux servers, containers and embedded devices using a web UI, mobile app or standard SSH clients. It aggregates devices behind a single gateway and provides centralized access controls, logging and session playback.

Key Features

  • Native SSH access (supports OpenSSH/standard SSH clients) for web and terminal connections.
  • Web-based terminal and mobile access with session recording and built-in replay player.
  • Public-key authentication and configurable SSH firewall rules for granular access control.
  • SCP/SFTP support and container (Docker) access integration for remote container management.
  • Microservices deployment using Docker Compose; production guidance includes HTTPS/NGINX and persistent MongoDB volumes.

Use Cases

  • Centralized remote administration of distributed Linux servers and IoT/embedded fleets.
  • Secure remote troubleshooting and maintenance of Docker containers and edge devices.
  • Compliance and auditing through recorded SSH sessions and audit logs for forensic review.

Limitations and Considerations

  • Certain advanced features (enterprise/cloud capabilities) vary by edition: HTTP/Web Endpoints, SAML improvements and some session-recording backend behaviors are highlighted as Enterprise/Cloud features in the project releases. Implementation and storage of large recordings can require S3-compatible storage (e.g., MinIO) for scale.

  • The recommended self-hosted deployment expects Docker Engine / Docker Compose and a MongoDB service; production setups require additional configuration for volumes, HTTPS termination and proxy protocol handling.

ShellHub provides a focused, open-source platform to centralize SSH access for cloud, edge and IoT environments. It is available as a Community (open-source) edition plus paid Cloud and Enterprise editions that add managed and enterprise features.

1.9kstars
173forks
#9
Wiredoor

Wiredoor

Self-hosted ingress platform that exposes internal HTTP/TCP services to the internet through reverse WireGuard tunnels, with NGINX routing and automatic TLS certificates.

Wiredoor screenshot

Wiredoor is a self-hosted ingress-as-a-service platform for securely exposing applications and services running in private networks to the public internet. It creates reverse VPN tunnels using WireGuard and routes inbound traffic through a built-in NGINX reverse proxy.

Key Features

  • Reverse VPN tunneling powered by WireGuard for connecting private nodes to a public entrypoint
  • Built-in NGINX reverse proxy to publish HTTP services and route traffic by domain
  • Expose both HTTP and TCP services, including support for WebSocket connections
  • Automatic TLS certificates via Let’s Encrypt, with self-signed fallback for internal/local domains
  • Web UI to manage nodes, domains, and exposed services
  • CLI-driven setup for registering nodes and creating/revoking exposures
  • Optional OAuth2-based authentication per domain/service via an OAuth2 proxy
  • Designed to work across environments (Kubernetes, Docker/Compose, VMs, legacy servers, and IoT)

Use Cases

  • Publish internal dashboards (for example monitoring tools) without opening inbound firewall ports
  • Provide temporary external access to a private service for support, maintenance, or demos
  • Expose services running inside Kubernetes clusters, Docker hosts, or on-prem networks through a single public gateway

Wiredoor fits teams and homelabs that want cloud-like ingress control while keeping networking and access fully under their own infrastructure. It provides a consistent way to connect private nodes, map domains, and expose services securely with minimal operational overhead.

1.6kstars
74forks

Why choose an open source alternative?

  • Data ownership: Keep your data on your own servers
  • No vendor lock-in: Freedom to switch or modify at any time
  • Cost savings: Reduce or eliminate subscription fees
  • Transparency: Audit the code and know exactly what's running