Free, unlimited VPN solution with a server in France. Fully open source and customizable.
Download the Shadowguard Setup 1.0.0.exe.
Run the installer and complete the installation.
After installation, navigate to:
C:\Program Files\Shadowguard
Place your wg-client.conf file inside this folder alongside the other Shadowguard files.
Important: The VPN cannot connect without this configuration file.
Right-click on Shadowguard.exe and select:
Run as Administrator
The app requires admin permissions to control VPN connections.
In some cases, WireGuard is not automatically installed.
If this happens:
Follow these steps to set up your personal VPN server on any VPS provider.
Connect to your VPS via SSH:
ssh root@your_vps_ip
Enter your password when prompted.
apt update apt install wireguard -y
wg genkey | tee server_privatekey | wg pubkey > server_publickey
View and save your server private key:
cat server_privatekey
Tip: Keep your private keys secure! Never share them.
nano /etc/wireguard/wg0.conf
Paste the following configuration (replace with your private key):
[Interface] PrivateKey = YOUR_SERVER_PRIVATE_KEY Address = 10.0.0.1/24 ListenPort = 51820 PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
Save and exit (Ctrl+X, Y, Enter).
echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf sysctl -p
ufw allow 51820/udp ufw allow OpenSSH ufw enable
wg-quick up wg0 systemctl enable wg-quick@wg0
Check the status:
wg
Generate client keys:
wg genkey | tee client_privatekey | wg pubkey > client_publickey
Add the client to the server config:
nano /etc/wireguard/wg0.conf
Add at the bottom (replace with client public key):
[Peer] PublicKey = CLIENT_PUBLIC_KEY AllowedIPs = 10.0.0.2/32
Restart WireGuard:
wg-quick down wg0 wg-quick up wg0
Create the client configuration file:
[Interface] PrivateKey = CLIENT_PRIVATE_KEY Address = 10.0.0.2/24 DNS = 1.1.1.1 [Peer] PublicKey = SERVER_PUBLIC_KEY Endpoint = YOUR_VPS_IP:51820 AllowedIPs = 0.0.0.0/0 PersistentKeepalive = 25
Save this as wg-client.conf
and use it with ShadowGuard VPN.
The ShadowGuard VPN client is built using Electron, allowing it to run as a standalone desktop application on Windows, macOS, and Linux.
Note: While Electron provides a convenient way to build cross-platform desktop apps, there are other approaches to creating VPN clients, such as native applications or browser extensions. The Electron approach was chosen for its cross-platform capabilities and ease of development.
Status: Disconnected
Simulation only — download the full version to connect.
Electron main process
Application UI
UI interaction logic
IPC bridge
VPN configuration
Project configuration
To build the ShadowGuard application:
npm install npm run build
Development Note: The application is developed in Visual Studio Code and built using electron-builder to create installers for different platforms.
Unrestricted VPN access for everyone
Fast and reliable connection
Set up on any provider
Minimal resource usage
Fully transparent code
Runs on Windows, macOS, Linux
You are free to use, inspect, and modify the files included in the installation directory.
This VPN is provided as is, without any restrictions or limits.
Final Note: WireGuard is a modern VPN protocol that's fast and secure. If you allow multiple clients, speed may drop - this is normal for VPNs.