Showing 69 open source projects for "tor network"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies โ€” all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    Tor Browser

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked.
    Downloads: 1,445 This Week
    Last Update:
    See Project
  • 2
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs donโ€™t hang around. They close when youโ€™re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 138 This Week
    Last Update:
    See Project
  • 3
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When โ€œstartโ€ is issued, it sets up the necessary rules; when โ€œstopโ€ is used, it attempts to remove those rules. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    OnionShare

    OnionShare

    Securely and anonymously share files of any size

    OnionShare is an open source tool that allows you to securely and anonymously share files of any size, host websites, and chat with friends using the Tor network. There's no need for middlemen that could very well violate the privacy and security of the things you share online. With OnionShare, you can share files directly with just an address in Tor Browser. OnionShare works because it is accessible as a Tor Onion Service. All you need to do is open it and drag and drop the files you want to share into it, and start sharing. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do bestโ€”building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    RoboSats

    RoboSats

    A simple and private bitcoin exchange

    RoboSats is a privacy-preserving, peer-to-peer Bitcoin exchange that allows users to buy and sell Bitcoin using Lightning Network payments without requiring identity verification. It uses Tor by default and leverages a simple robot-based user interface to facilitate one-time trades between anonymous users. Each trade session is isolated, and no long-term accounts or KYC are needed, making RoboSats one of the most private Bitcoin P2P tools available. Designed with a strong focus on usability and anonymity, it's especially popular among privacy advocates and Bitcoin maximalists.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 6
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    Robin is an AI-powered open source tool designed to assist investigators and researchers in conducting dark web OSINT (Open Source Intelligence) investigations. It combines automated dark web search capabilities with large language models (LLMs) to analyze and summarize information discovered across hidden services and Tor-based search engines. The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven processing. Robin also performs scraping of discovered pages through Tor sessions, allowing users to gather additional context from dark web sites while maintaining the required network routing. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external servers, search engines, or trackers.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 8
    Wasabi Wallet

    Wasabi Wallet

    Open-source, non-custodial, privacy focused Bitcoin wallet for Windows

    Wasabi is an open-source, non-custodial, privacy-focused Bitcoin wallet for desktop, that implements trustless coinjoin. Wasabi creates trustless coinjoin transactions over the Tor anonymity network. The coinjoin coordinator cannot steal from, nor breach the privacy of the participants. Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bisq

    Bisq

    A decentralized bitcoin exchange network

    Buy and sell bitcoin for fiat (or other cryptocurrencies) privately and securely using Bisq's peer-to-peer network and open-source desktop software. No registration is required. Get started in minutes. No need to wait for approval from a central authority. Trading takes place on a global P2P network of users running Bisq on their own machines. Bisq never holds your funds. Deposits held in 2-of-2 multi-sig wallets encourage safe, successful trades.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    Raccoon is a high-performance offensive security tool designed to assist with reconnaissance and vulnerability scanning during penetration testing and security assessments. It automates several common reconnaissance tasks, allowing security professionals to quickly gather information about a target system or web application. The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    ADAMANT Messenger Progressive Web App

    ADAMANT Messenger Progressive Web App

    ADAMANT decentralized Messenger, progressive web application

    ...Apps have no access to the contact list or geotags, IPs are hidden from chatters and paranoids can use Tor app. All the messages are encrypted with the Diffie-Hellman Curve25519, Salsa20, Poly1305 algorithms and signed by SHA-256 + Ed25519 EdDSA. Private keys are never transferred to the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Kali-Proxy
    ...Right-click to access all options. Icon colours indicate current proxy state: White No proxy active Red SOCKS proxy active Purple Tor routing active Orange Transparent proxy active SOCKS4 / SOCKS5 Proxy Routes traffic through a SOCKS4 or SOCKS5 proxy of your choice. Configure host, port, and version via Configure SOCKS... in the menu. Tor Routing Routes traffic through the Tor network via 127.0.0.1:9150. Manages the tor systemd service automatically (starts on enable, stops on disable). ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    Modern, AI-Smart, WASTE p2p for ipv4, Tor and i2p + Voice Conference.

    Open Source - GPLv3 inc images. A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable. Voice Conference, Chat, Transfer files and Participate in Forums in a secure environment. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Win 11, Linux (WINE). *** User Based Access Control - for voice, chats, file transfers and uploads. (useful in NULLNETS) *** Distributed...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 14
    Chat of Death
    Chat of Death is an anonymous, peer-to-peer encrypted communication application designed for maximum privacy and security. Maybe you guys will have better luck with it then I do. There's a bit of latency do to the Tor network.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Cyrethium

    Cyrethium

    Cyrethium GNU/Linux Debian Based Privacy and Security Focused OS

    ARCHIVAL NOTICE: Cyrethium Project This project has been long discontinued and is no longer being maintained by the developer. Please note that: Status: This distribution was officially abandoned some time ago. There are no plans for future updates, security patches, or support. Liability Disclaimer: The developer accepts no responsibility for any damages, security vulnerabilities, or data loss resulting from the use of this outdated software. Use it strictly at your own...
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 16
    Linux Kodachi 9

    Linux Kodachi 9

    Secure open source Linux distribution

    A minimal, terminal-only live ISO based on Debian 13 (Trixie) crafted for two critical missions: bulletproof testing of the full Kodachi toolchain and operating as a dedicated SOCKS proxy gateway for your network. Built for power users, hardened servers, and elegant headless deployments. https://www.kodachi.cloud/wiki/bina/terminal-version.html https://www.kodachi.cloud/wiki/bina/index.html
    Leader badge
    Downloads: 2,463 This Week
    Last Update:
    See Project
  • 17
    Cerberix Linux
    A security-focused, desktop-ready Arch Linux derivative. Hardened by default with XFCE, firewall, IDS, and VPN tooling preconfigured.
    Leader badge
    Downloads: 21 This Week
    Last Update:
    See Project
  • 18
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 19
    Robolinux

    Robolinux

    Announcing Robolinux Cinnamon 14.1

    Announcing The New Robolinux Series 14 Mate LTS - 2034 Robolinux is very pleased to announce a completely new 14.1 Mate privacy centered 1inux operating system you can download freely while also offering our users an optional 14+ advanced upgrade which comes with our Untracker and FAAST Boot along with one click popular privacy software installers like Tor and I2p, Wireshark and Bleachbit plus many more for a fair and reasonable price. Robolinux14.1-Mate is ideal for beginners and...
    Leader badge
    Downloads: 70 This Week
    Last Update:
    See Project
  • 20
    OnionSearch

    OnionSearch

    Search multiple Tor .onion engines at once and collect hidden links.

    OnionSearch is a Python-based command-line tool designed to collect and aggregate links from multiple search engines on the Tor network. The script works by scraping results from a variety of .onion search services, allowing users to perform a single query while gathering results from many sources at once. This approach helps researchers and investigators locate hidden services more efficiently without manually querying each individual search engine. It is primarily intended for educational use and open-source intelligence (OSINT) research involving the Tor network. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 21
    SaferPuppyLinux

    SaferPuppyLinux

    Safer Puppy Linux for activists, educators, low bandwidth, 32 & 64bit

    Live USB Distros based on Puppy Jammy 32, Fossa9.5 64, Bookworm64 for journalists, activists, teachers with slow computers in repressive environments ~700MB[32bit] ~1.1GB[64bit] RAM 1GB minimum (swap suggested) Live USB stick 2GB[32bit], 4GB[64bit] > VFAT32 encrypted personal storage suggested internet radio with bookmarks Firefox ESR for addons: singlefile, urbanVPN, translate Seamonkey (wysiwyg HTML editor), Palemoon can work with Tor Proxy via FoxyProxy Voice & webcam...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Anti_ransomware
    ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—บ / ๐˜‡๐—ฒ๐—ฟ๐—ผ๐—ฑ๐—ฎ๐˜† ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† _ Contains advanced security within the kernel, denying use of user memory not allowing user identification / This security allows to stop ransomware attacks _ ! Remove memory / wipe user-space and kernel after system shutdown * Browse anonymously without leaving a trace / tor / privoxy > Sign all operating system and boot verification . Integrity Measurement Architecture _ Subsystem is responsible for calculating the hashes of files...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Speek

    Speek

    Privacy focused messenger that doesn't trust anyone with your identity

    Speek is a peer-to-peer, serverless chat application built on Tor that enables anonymous and censorship-resistant communication without any central servers. Every message is end-to-end encrypted and routed through the Tor network, and users are identified only by cryptographic public keys, not usernames or phone numbers. Speek requires no sign-up, no cloud infrastructure, and stores no dataโ€”offering a radically private alternative to mainstream chat apps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    MeanOS

    MeanOS

    The smallest and the most powerful operating system.

    The first decentralized, artificially intelligent, MEAN.js stack, operating system. Mean OS is the only operating system hosted anonymous using a P2P network and a suite of non-standard in-browser delivery mechanisms. Mean OS is specifically designed to support both Brave and Tor but is compatible with all other major browsers. Mean OS is Proud to be a BRAVE and TOR supporter, be free!!
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    Briar
    ...Unlike traditional messaging tools such as email, Twitter or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices. If the Internet's down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and their relationships from surveillance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB