npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@lamalibre/create-portlama

v1.0.29

Published

One-command setup for secure reverse tunnels with a management dashboard

Readme

@lamalibre/create-portlama

One-command setup for secure reverse tunnels with a management dashboard.

Quick Start

ssh root@<droplet-ip> "apt install -y npm && npx @lamalibre/create-portlama"

The installer runs unattended on a fresh Ubuntu 24.04 droplet and provisions the full Portlama stack with zero prompts. When finished it prints:

  • An SCP command to download the mTLS client certificate (.p12)
  • The p12 password
  • The panel URL (https://<ip>:9292)

Import the certificate into your browser and open the URL to begin onboarding.

What It Provisions

  • OS hardening — swap, UFW, fail2ban, SSH lockdown
  • Node.js 20 LTS
  • mTLS PKI — CA, server cert, client cert + PKCS12 bundle
  • nginx — TLS on port 9292 with ssl_verify_client on
  • Panel server + client — systemd service, static frontend

Domain setup, Chisel tunnels, Authelia, and Let's Encrypt certificates are configured through the browser-based onboarding wizard after installation.

Requirements

| Requirement | Details | | ----------- | ----------------------- | | OS | Ubuntu 24.04 LTS | | Access | root | | Node.js | >= 20.0.0 | | RAM | 512 MB minimum | | Recommended | DigitalOcean $4 droplet |

Further Reading

See the main repository for architecture, development plan, and full documentation: https://github.com/lamalibre/portlama

Disclaimer

This software is provided "as is", without warranty of any kind, express or implied. The authors and contributors accept no liability for any damages, data loss, security incidents, or legal consequences arising from the use of this software.

Portlama is designed for self-hosted use cases — personal projects, development environments, demos, and internal tools. It is not a substitute for production infrastructure. Production workloads require dedicated hosting, load balancing, redundancy, monitoring, and operational expertise that are beyond the scope of this project.

You are solely responsible for what you expose through Portlama. By tunneling an application to the public internet, you grant anyone with access the ability to interact with that application as if they were on your local network. This carries inherent risks:

  • Arbitrary code execution: If the tunneled application contains vulnerabilities or backdoors, remote attackers may exploit them to execute code on your machine, access your file system, or compromise your operating system.
  • Data exposure: Misconfigured or insecure applications may leak sensitive data, credentials, or private files to the internet.
  • Lateral movement: A compromised tunneled application may be used as an entry point to attack other devices and services on your local network.
  • Resource abuse: Publicly accessible applications may be used for cryptocurrency mining, spam relaying, botnet hosting, or other abuse that could result in legal action against you.

Portlama provides authentication and access control mechanisms, but no security measure is absolute. It is your responsibility to understand the software you expose, keep it updated, and assess the risks of making it publicly accessible. The authors of Portlama bear no responsibility for the consequences of tunneling untrusted, vulnerable, or malicious software.

License

Polyform Noncommercial 1.0.0 — see LICENSE.md for details.