Disclaimer: I wrote a similar tool that is self-hosted and uses SSH as the tunneling service. Does HTTP(S) with TLS termination, TCP, TLS (via SNI), and internal tunneling (unexposed tunnels that are authenticated using SSH) [0].
For reference though, all that is needed are some poorly written POSTROUTING rules and ip forwarding enabled on the client to allow access to the local network. More people have these set than you think!
https://github.com/anderspitman/awesome-tunneling
Great to see more WireGuard implementations popping up. Most of the "no install" options are based on SSH tunnels, which are great, but WireGuard should have much better performance under certain conditions.
P.S. I've added your list to my curated list of startup tools - https://startuptoolchain.com/#software-testing as tunneling is quite essential for software development.
All the heavy lifting and reverse proxying is done by Wireguard and Caddy! Very slick.
Though of course all traffic will be ran through pyjam.as. As this isn't a company with an income stream, I fear if its gets too popular it'll be infeasible for the author to keep it up and available for free long term.
It would be very handy for say a website designer to quickly bring up and share a demo website running on their development laptop no matter where they happen to be (home, work, the client's office or Starbucks) and everyone involved can "just access" everything through a web browser.
With ngrok you need to trust their binary, with this I suppose you need to trust the generated config file.
Fly.io version using it https://github.com/superfly/flyctl/tree/master/pkg/wg
net.Dialer using gVisor https://git.zx2c4.com/wireguard-go/tree/tun/netstack/tun.go#...