{
	"id": "345cdf74-4cf5-4148-9a3b-09d391d4eb04",
	"created_at": "2026-04-06T00:11:54.854824Z",
	"updated_at": "2026-04-10T03:21:37.24656Z",
	"deleted_at": null,
	"sha1_hash": "baeb15845caa950365df01be24ce80a0bc1364d9",
	"title": "GitHub - ehang-io/nps: 一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发，可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面，内网dns解析、内网socks5代理等等……，并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 529283,
	"plain_text": "GitHub - ehang-io/nps: 一款轻量级、高性能、功能强大的内网穿\r\n透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转\r\n发，可用来访问内网网站、本地支付接口调试、ssh访问、远程桌\r\n面，内网dns解析、内网socks5代理等等……，并带有功能强大的\r\nweb管理端。a lightweight, high-performance, powerful intranet\r\npenetration proxy server, with a powerful web management\r\nterminal.\r\nBy cnlh\r\nArchived: 2026-04-05 16:39:37 UTC\r\nStars 34k\r\n Forks 6.1k \r\nchat on gitter\r\n Release ddoowwnnllooaaddss 2.7M\r\nREADME|中文文档\r\nNPS is a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web\r\nmanagement terminal.\r\nFeature\r\nhttps://github.com/ehang-io/nps\r\nPage 1 of 3\n\nComprehensive protocol support, compatible with almost all commonly used protocols, such as tcp, udp,\r\nhttp(s), socks5, p2p, http proxy ...\r\nFull platform compatibility (linux, windows, macos, Synology, etc.), support installation as a system\r\nservice simply.\r\nComprehensive control, both client and server control are allowed.\r\nHttps integration, support to convert backend proxy and web services to https, and support multiple\r\ncertificates.\r\nJust simple configuration on web ui can complete most requirements.\r\nComplete information display, such as traffic, system information, real-time bandwidth, client version, etc.\r\nPowerful extension functions, everything is available (cache, compression, encryption, traffic limit,\r\nbandwidth limit, port reuse, etc.)\r\nDomain name resolution has functions such as custom headers, 404 page configuration, host modification,\r\nsite protection, URL routing, and pan-resolution.\r\nMulti-user and user registration support on server.\r\nDidn't find the feature you want? It doesn't matter, click Enter the document to find it!\r\nQuick start\r\nInstallation\r\nreleases\r\nDownload the corresponding system version, the server and client are separate.\r\nServer start\r\nAfter downloading the server compressed package, unzip it, and then enter the unzipped folder.\r\nexecute installation command\r\nFor linux、darwin sudo ./nps install\r\nFor windows, run cmd as administrator and enter the installation directory nps.exe install\r\ndefault ports\r\nThe default configuration file of nps use 80，443，8080，8024 ports\r\n80 and 443 ports for host mode default ports\r\n8080 for web management access port\r\n8024 for net bridge port, to communicate between server and client\r\nstart up\r\nFor linux、darwin sudo nps start\r\nhttps://github.com/ehang-io/nps\r\nPage 2 of 3\n\nFor windows, run cmd as administrator and enter the program directory nps.exe start\r\nAfter installation, the windows configuration file is located at C:\\Program Files\\nps, linux or\r\ndarwin is located at /etc/nps\r\nIf you don't find it started successfully, you can check the log (Windows log files are located in the current\r\nrunning directory, linux and darwin are located in /var/log/nps.log).\r\nAccess server IP:web service port (default is 8080).\r\nLogin with username and password (default is admin/123, must be modified when officially used).\r\nCreate a client.\r\nClient connection\r\nClick the + sign in front of the client in web management and copy the startup command.\r\nExecute the startup command, Linux can be executed directly, Windows will replace ./npc with npc.exe\r\nand execute it with cmd.\r\nIf you need to register to the system service, you can check Register to the system service\r\nConfiguration\r\nAfter the client connects, configure the corresponding penetration service in the web.\r\nFor more advanced usage, see Complete Documentation\r\nContribution\r\nIf you encounter a bug, you can submit it to the dev branch directly.\r\nIf you encounter a problem, you can feedback through the issue.\r\nThe project is under development, and there is still a lot of room for improvement. If you can contribute\r\ncode, please submit PR to the dev branch.\r\nIf there is feedback on new features, you can feedback via issues or qq group.\r\nSource: https://github.com/ehang-io/nps\r\nhttps://github.com/ehang-io/nps\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://github.com/ehang-io/nps"
	],
	"report_names": [
		"nps"
	],
	"threat_actors": [],
	"ts_created_at": 1775434314,
	"ts_updated_at": 1775791297,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/baeb15845caa950365df01be24ce80a0bc1364d9.pdf",
		"text": "https://archive.orkl.eu/baeb15845caa950365df01be24ce80a0bc1364d9.txt",
		"img": "https://archive.orkl.eu/baeb15845caa950365df01be24ce80a0bc1364d9.jpg"
	}
}