zlacker

Tunnl.gg

submitted by klipit+(OP) on 2025-12-04 10:15:53 | 247 points 107 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
1. klipit+1[view] [source] 2025-12-04 10:15:53
>>klipit+(OP)
Built another localhost tunneling tool because I kept forgetting my ngrok auth token.

What it does:

- Expose localhost to the internet (HTTP/TCP/WebSockets) - Zero signup – just works immediately - Free

Nothing groundbreaking, just scratching my own itch for a no-friction tunnel service. Written in Go.

Link: https://tunnl.gg

Happy to answer questions or hear how you'd improve it.

11. stevek+5a[view] [source] 2025-12-04 11:47:23
>>klipit+(OP)
If you keep this up you'll want to add yourself to the public suffix list:

https://publicsuffix.org/

You should also consider grouping your random hostnames under a dedicated subdomain. e.g. "xxx-xxx-xxx.users.tunnl.gg", that separates out cookies and suchlike.

22. bashy+Lc[view] [source] 2025-12-04 12:04:23
>>klipit+(OP)
Shell function;

``` tunnl() { if [ -z "$1" ]; then echo "Usage: tunnl <local-port>" return 1 fi

  ssh -t -R 80:localhost:"$1" proxy.tunnl.gg
} ```

There's also https://tunnelmole.com but requires binary or npm install

24. madeth+Oc[view] [source] 2025-12-04 12:04:29
>>klipit+(OP)
I used ngrok when it was the to-go answer for serving localhost (temporarily, not permanent) to the public, but the last time I searched for alternatives I stumbled upon the following jewel.

   > tailscale funnel 3000

   Available on the internet:

   https://some-device-name.tail12345.ts.net/
   |-- proxy http://127.0.0.1:3000

   Press Ctrl+C to exit.

I've tailscale installed on my machine anyway for some connected devices. But even without this would convince me using it, because it's part of the free tier, dead simple and with tailscale it's coming from kind of a trusted entity.
29. tarasy+je[view] [source] 2025-12-04 12:14:44
>>klipit+(OP)
Is this any different from localtunnel? Nice thing about that one is that its oss, actually we forked it in my company to do some more custom stuff.

Any plan to make it oss?

https://github.com/desplega-ai/localtunnel-server

◧◩◪◨
33. keepam+Ue[view] [source] [discussion] 2025-12-04 12:19:17
>>frizla+Ac
I have a demo with working GitHub runner workflow code here: https://github.com/BrowserBox/ariadne

Specifically: https://github.com/BrowserBox/ariadne/blob/f07e3b0d445f5d4a8...

35. gnyman+4f[view] [source] 2025-12-04 12:20:53
>>klipit+(OP)
This is nice and for those who's asking, it's different from ngrok and the others in that you don't need a separate client, (almost) everyone has ssh installed.

To the author, I wish you best of luck with this but be aware (if you aren't) this will attract all kind of bad and malicious users who want nothing more than a "clean" IP to funnel their badness through.

serveo.net [2] tried it 8 years ago, but when I wanted to use it I at some point I found it was no longer working, as I remember the author said there was too much abuse for him to maintain it as a free service

I ended up self-hosting sish https://docs.ssi.sh instead.

Even the the ones where you have to register like cloudflare tunnels and ngrok are full of malware, which is not a risk to you as a user but means they are often blocked.

Also a little rant, tailscale has their own one also called funnel. It has the benefit of being end-to-end encrypted (in theory) but the downside that you are announcing your service to the world through the certificate transparency logs. So your little dev project will have bots hammering on it (and trying to take your .git folder) within seconds from you activating the funnel. So make sure your little project is ready for the internet with auth and has nothing sensitive at guessable paths.

[2] >>14842951

◧◩
36. qudat+cf[view] [source] [discussion] 2025-12-04 12:21:56
>>stevek+5a
I run a similar site (https://pico.sh) with public urls and thought the same thing for us. The public suffix has some fuzzy limits on usage size before they will add domains (e.g. on the scale of thousands of active users).

I don’t have tunnl.gg usage numbers but I’m going to guess they are no where near the threshold — we were also rejected.

65. 1vuio0+Zy1[view] [source] 2025-12-04 19:42:46
>>klipit+(OP)
"We cooperate with law enforcement agencies when required by law. While we do not inspect traffic content, we will provide connection logs and IP address information in response to valid legal process (such as a subpoena or court order) to assist in investigations regarding illegal activity."

https://tunnl.gg/assets/index-Bjpn0hFX.js

If the requesting party knows it's possible they might ask for traffic to be logged

◧◩
72. apitma+hJ1[view] [source] [discussion] 2025-12-04 20:26:32
>>gnyman+4f
A few other options as well: https://github.com/anderspitman/awesome-tunneling
◧◩◪◨
74. kiloba+aP1[view] [source] [discussion] 2025-12-04 20:54:31
>>pcthro+Uu
The tunnel host appears to be a Hetzner server, they are pretty generous with bandwidth but the interesting thing I learned about doing some scalability improvements at a similar company [0] is that for these proxy systems, each direction’s traffic is egress bandwidth. Good luck OP, the tool looks cool. Kinda like pinggy.

[0] https://localxpose.io

◧◩
75. bomewi+yP1[view] [source] [discussion] 2025-12-04 20:56:09
>>madeth+Oc
Hey really recommend using a big long random string in that URL, because as you will have read above TAILNET NAMES ARE PUBLIC. You can find them here: https://crt.sh/?Identity=ts.net [warning, this will probably crash browser if you leave it open too long -- but you can see it's full of tailnet domains].

So anyway try it like:

tailscale funnel --set-path=/A8200B0F-6E0E-4FE2-9135-8A440DB9469D http://127.0.0.1:8001 or whatever

I use uuidgen and voila.

◧◩◪◨⬒
80. kiloba+MR1[view] [source] [discussion] 2025-12-04 21:07:00
>>keepam+Ue
Hey if you are interested in re-using any of this GitHub Action, feel free to: https://github.com/LocalXpose/localxpose-action
◧◩◪
86. patric+g52[view] [source] [discussion] 2025-12-04 22:18:20
>>klipit+Mg
I run playit.gg. Abuse is a big problem on our free tier. I’d get https://github.com/projectdiscovery/nuclei setup to scan your online endpoints and autoban detections of c2 servers.
◧◩
105. sorz+2E6[view] [source] [discussion] 2025-12-06 07:40:08
>>gnyman+4f
Random thoughts: one can get user's ssh public keys from GitHub on the fly (from `https://github.com/<username>.keys`), so that it requires a valid GitHub account to use this service, without (extra) auth process.
[go to top]