Skip to main content

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project description

NordVPN WireGuard Configuration Generator

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project Philosophy: A Focus on Quality

This project has been fundamentally refocused. Previously, multiple versions existed across several programming languages. This approach divided development effort and resulted in inconsistent quality.

The new directive is singular: to provide one exceptionally engineered tool that is robust, maintainable, and correct.

To this end, all previous language implementations have been archived. Development is now concentrated on two platforms:

  1. This Command-Line Tool: A complete rewrite in Python, packaged for professional use.
  2. A Web Interface: For users who require a graphical frontend.

This consolidated effort ensures a higher standard of quality and a more reliable end-product.

Core Capabilities

  • Package Distribution: The tool is a proper command-line application, installable via PyPI. This eliminates manual dependency management.
  • Performance: Asynchronous architecture processes the entire NordVPN server list in seconds.
  • Optimization: Intelligently sorts servers by current load and geographic proximity to the user, generating configurations for the most performant connections.
  • Structured Output: Automatically creates a clean directory structure containing standard configurations, a best_configs folder for optimal servers per location, and a servers.json file with detailed metadata for analysis.
  • Interactive and Non-Interactive: A guided rich-CLI for interactive use. The core logic is structured to be scriptable.

Installation

Prerequisites: Python 3.9+

Install the package using pip:

pip install nord-config-generator

Usage

Generate Configurations (Default Action)

Execute the application without any arguments. This is the primary function.

nordgen

The application will prompt for the required access token and configuration preferences.

Retrieve Private Key

To retrieve and display your NordLynx private key without generating configurations, use the get-key command:

nordgen get-key

Web Version

A graphical alternative is available for direct use in a web browser.

Support

Project visibility and continued development are supported by two actions:

  1. Star the Repository: Starring the project on GitHub increases its visibility.
  2. NordVPN Referral: Using the referral link for new subscriptions provides support at no additional cost. Link: https://ref.nordvpn.com/MXIVDoJGpKT

License

This project is distributed under the GNU General Public License v3.0. See the LICENSE file for full details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nord_config_generator-1.0.2.tar.gz (10.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

nord_config_generator-1.0.2-py3-none-any.whl (9.2 kB view details)

Uploaded Python 3

File details

Details for the file nord_config_generator-1.0.2.tar.gz.

File metadata

  • Download URL: nord_config_generator-1.0.2.tar.gz
  • Upload date:
  • Size: 10.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for nord_config_generator-1.0.2.tar.gz
Algorithm Hash digest
SHA256 236a392a0b1b2924d020c6aeaef9e9e36bc6209d422619d9aa497c4e99fac191
MD5 126228de90007588deda00f9b8b70cec
BLAKE2b-256 7982344493d67a8284c04fa23816ace1813ac91e28c84ec12eea7c63c098948f

See more details on using hashes here.

File details

Details for the file nord_config_generator-1.0.2-py3-none-any.whl.

File metadata

File hashes

Hashes for nord_config_generator-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 2f990183ba8e9ecc2d27b4627050b9f345ba2492a07a9c23e1d69bec2a54fe17
MD5 bcbedf0c95b120ddc565e404b7e25ad8
BLAKE2b-256 c56b1037759a9c2cdf876a3ed7271c36d6e799a2598daf485d5ed65f61d43a87

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page