Detecting your location...
A Product by InTech Solutions

Expose Your Local Services
To The World

Create secure HTTPS tunnels to your local servers in seconds. No monthly fees, no limits. Your data stays on your infrastructure.

$ ./InTech-Tunnel
[✓] Connected successfully!
[⚡] Your tunnel is now live at:
https://myapp.intunnel.cloud
[i] Forwarding to localhost:3000

How InTunnel Works

Your local service exposed to the world in seconds

💻 Local :3000 🔗 InTunnel Client ☁️ InTunnel Server 🌍 Internet Users Secure Tunnel HTTPS Public Access
Fig. 1

Traffic flows securely from your local service to users worldwide

Features

features_subtitle

HTTPS Encryption

All tunnels are automatically secured with SSL/TLS certificates. Your traffic is always encrypted.

Device Binding

Lock your tunnel tokens to specific devices for enhanced security.

IP Whitelisting

Restrict tunnel access to specific IP addresses for maximum security.

Multi-Language

Available in English, French, and Arabic. Use InTunnel in your preferred language.

Easy to Use

Simple GUI and CLI clients. Get started in minutes with no complex configuration.

Real-time Stats

Monitor your tunnel usage with live connection counts and traffic statistics.

Tunnel Architecture

A detailed look at how InTunnel creates secure connections

🔒 Encrypted Tunnel (TLS 1.3) YOUR COMPUTER 🌐 Web App :3000 🔗 InTunnel Client v2.0.0 🔑 Auth Token 🔐 TLS 1.3 🔀 Route Proxy ☁️ InTunnel Server intunnel.cloud INTERNET 🌍 myapp.intunnel.cloud HTTPS 🔒 Device Binding Lock tunnel to specific device 🛡️ IP Whitelist Restrict access by IP address 📊 Real-time Stats Monitor traffic & connections 🔐 2FA Protection Secure your account
Fig. 2

Detailed anatomy of an InTunnel connection showing all security layers

Enterprise Security

Cryptographic protection for your tunnels and data

Security Status: All Systems Secure

InTunnel uses advanced cryptographic techniques to ensure your tunnel connections are protected with the same security standards used by financial institutions.

Ed25519 Signatures

All tokens are cryptographically signed using Ed25519, providing unforgeable authentication with 128-bit security.

128-bit

Merkle Audit Logs

Every security event is logged in a tamper-evident chain, ensuring complete accountability and forensic capability.

Merkle Tree

Hash-Chain Integrity

Sequential cryptographic hashing ensures any modification to audit logs is immediately detectable.

SHA-256

Real-time Verification

Tokens are verified in microseconds using high-performance cryptographic operations.

<1ms

Cryptographic Security in Action

Explore how our security mechanisms protect your data

Ed25519
Merkle Tree
Hash Chain
🔑 Key Generation Private + Public ✍️ Sign Message Private Key 📝 Signature 64 bytes Verify Public Key 🔐 Why Ed25519? • 128-bit security level • Small signatures (64 bytes) ⚡ Performance • Fast key generation • Quick verification 🛡️ Security • Immune to timing attacks
Fig. 3

Ed25519 digital signature flow: key generation, signing, and verification

🔒 ROOT H(1,2) Hash H(3,4) Hash D1 Verify ✓ D2 Data D3 Data D4 Data Root Hash Intermediate Data Blocks Verification Path 🔍 O(log n) verification
Fig. 4

Merkle Tree structure with highlighted verification path for efficient data integrity checking

✓ Valid Chain Block 1 prev: 0x0000 hash: 0xa3f2... Block 2 prev: 0xa3f2 hash: 0xb7e1... Block 3 prev: 0xb7e1 hash: 0xc9d4... Block 4 prev: 0xc9d4 hash: 0xd2a8... Block 5 prev: 0xd2a8 hash: 0xe5f3... ✗ Tampered Chain Block 1 prev: 0x0000 hash: 0xa3f2... Block 2 prev: 0xa3f2 hash: 0xb7e1... Block 3 ⚠️ MODIFIED! hash: 0x????... Block 4 prev: 0xc9d4 ✗ Invalid chain Block 5 prev: 0xd2a8 ✗ Invalid chain 🚨 Tampering Detected!
Fig. 5

Hash chain integrity: valid chain vs tampered chain showing automatic detection

Cryptographic Security
Tamper-Evident Logs
Verified Tokens

Download

Get the InTunnel client for your platform

GUI Client RECOMMENDED
CLI Client

Version 1.0.0 - Modern web-based interface, no terminal required

Chrome may show a warning for new downloads. Click "Keep" to proceed - our files are safe.
Platform SHA256 Checksum
Windows 18e5a17ba271042338e3e6a4c28babf8e2590d541ce3f813fe4e99251494a6a7
macOS ARM 38cfbbb7cce2a7c20dd6019f2258d1da591f0dfbdc414b9e4651985f7e6aa95d
macOS Intel cc6ab10d5e56220f6be9f3d87fcbbbe4505f9e18bd33c1108f3bb2048bb310da
Ubuntu b78589194c0a4fa2ac18137fe69d3f8b1881612eec356e0c9c9ab25cf696989d
Linux b78589194c0a4fa2ac18137fe69d3f8b1881612eec356e0c9c9ab25cf696989d

How to verify

Windows (PowerShell): Get-FileHash ./InTunnel-GUI-Windows.exe -Algorithm SHA256 macOS/Linux: shasum -a 256 InTunnel-GUI-*

Usage Guide

Learn how to use InTunnel with our step-by-step guides

GUI Client RECOMMENDED

Perfect for beginners and everyday use. No terminal knowledge required.

  1. Download the GUI client for your operating system
  2. Run the application (double-click on Windows/macOS)
  3. Open your browser - it will automatically open the interface
  4. Enter your tunnel token (get it from your dashboard)
  5. Click Connect - your tunnel is now live!

Features: Visual interface, one-click connect/disconnect, real-time status

CLI Client ADVANCED

For power users who prefer terminal. Great for automation and scripts.

  1. Download the CLI client for your OS
  2. Open terminal in the download directory
  3. Make executable
    chmod +x InTech-Tunnel-CLI-*
  4. step_run_client:
    ./InTech-Tunnel-CLI-1.3.0-Linux
  5. Select language and enter your token

Features: Multi-language, auto-reconnect, device binding, lightweight

Manual Setup DEVELOPER

Full control with manual configuration. For developers and custom setups.

  1. Download FRP GitHub
  2. Get config from your tunnel details page
  3. Save as frpc.toml
  4. Run InTunnel client:
    ./frpc -c frpc.toml

Sample frpc.toml:

serverAddr = "213.32.23.250"
serverPort = 7000
auth.token = "YOUR_TOKEN"

[[proxies]]
name = "myapp"
type = "http"
localPort = 3000
subdomain = "myapp"

Pro Tips

Device Binding

Each tunnel token is automatically bound to the first device that connects. This prevents unauthorized use of your token.

IP Whitelist

Enable IP whitelist in tunnel settings to restrict access to specific IP addresses only.

Auto Reconnect

Both GUI and CLI clients automatically reconnect if the connection drops. Keep the client running for uninterrupted access.

Technology Stack

Built with modern, reliable technologies

InTunnel is built using industry-standard open-source technologies, ensuring reliability, security, and high performance. Our architecture combines a powerful tunneling engine with a modern web interface, delivering a seamless experience across all platforms.

Tunnel Technology

Built on FRP (Fast Reverse Proxy), a high-performance tunneling solution.

  • FRP v0.66.0
  • HTTP/HTTPS tunneling
  • Token-based authentication
  • Subdomain routing
Web Application

Modern Flask application with responsive design and real-time features.

  • Python Flask
  • SQLAlchemy ORM
  • Flask-Login
  • Gunicorn WSGI
Client Applications

Cross-platform native clients built with Go for maximum performance.

  • Go 1.21+
  • Embedded InTunnel client
  • Web-based GUI (HTML5)
  • Multi-language support
Security Features

Enterprise-grade security with multiple layers of protection.

  • bcrypt
  • 2FA (Email & TOTP)
  • CSRF & Rate Limiting
  • Device binding
Infrastructure

Robust server infrastructure with high availability and performance.

  • Linux Server
  • Nginx
  • Let's Encrypt SSL
  • Wildcard SSL certificates
Frontend Design

Modern glassmorphism UI with dark theme and responsive design.

  • Bootstrap 5
  • Custom CSS variables
  • RTL support (Arabic)

Open Source Technologies

InTunnel is built on top of amazing open-source projects. We thank the communities behind these technologies.

FRP Flask Go Bootstrap Python SQLite

Ready to Get Started?

Join hundreds of developers who trust InTunnel for their tunneling needs.

Create Free Account