Showing 18 open source projects for "tor vpn"

View related business solutions
  • Passwordless authentication enables a secure and frictionless experience for your users | Auth0 Icon
    Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • 1
    Ufficio Zero Linux OS

    Ufficio Zero Linux OS

    Linux Desktop OS for professionals

    Ufficio Zero Linux OS is a desktop operating system offered in many versions based on PCLinuxOS, Linux Mint and Devuan. We also have created Duplica, a Bare Metal Restore Solution. This distro has many packages for professional use. The project is managed by the Italian company SIITE SRLS. Ufficio Zero Linux OS is trademarked through the Linux Mark Institute. All rights reserved. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. website...
    Leader badge
    Downloads: 6,263 This Week
    Last Update:
    See Project
  • 2
    Linux Kodachi 8.27

    Linux Kodachi 8.27

    Secure open source Linux distribution

    Linux Kodachi operating system is based on Ubuntu 18.04.5 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup...
    Leader badge
    Downloads: 1,373 This Week
    Last Update:
    See Project
  • 3
    SysLinuxOS

    SysLinuxOS

    SysLinuxOS for System Integrators

    ... army knife to always carry with us. There are all the major Virtual Private Networks (VPN), several remote control clients, various browsers, as well as Wine, Wireshark, Etherape, Ettercap, PackETH, Packetsender, Putty, Nmap, Packet Tracer 8.2.1, GNS3, Virtualbox 7.0.2, Vmware Player 17, Munin, Zabbix-agent2, Zabbix-fronted, Icinga, Monit, Nagios4 and tools for serial console and the latest stable kernel backports 6.7. Based on Debian 12 Bookworm Mate Desktop Gnome Desktop
    Leader badge
    Downloads: 199 This Week
    Last Update:
    See Project
  • 4
    MOFO Linux

    MOFO Linux

    Linux designed to defeat state censorship and surveillance.

    ... of office, multimedia, web browsing, file sharing, and internet messaging applications assisted by a collection of anonymity and anti-censorship tools. MOFO Linux contains Encrypted DNS over HTTPS, OpenVPN, Tor, Freenet, I2P, and other software tools which provide anonymous and / or secure access to the internet and circumvention of state censorship restrictions.
    Leader badge
    Downloads: 56 This Week
    Last Update:
    See Project
  • AI-powered conversation intelligence software Icon
    AI-powered conversation intelligence software

    Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.

    Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
  • 5
    Knife Fishmonger
    KFishMonger O anonimato em primeiro lugar Build Status Enquanto a sociedade evolui, a liberdade se apaga, KFishMonger é uma solução para um cenário perverso, permite. Automação em montagem de ambientes anônimos Um projeto para se discutir e evoluir o anonimato ✨MNONIMATO✨ Recursos Automação em inicialização de VPN Montagem automática de serviços TOR Configuração de DNSCrypt Layout moderno para monitorar o ambiente De fácil customização PARA INSTALAR veja...
    Leader badge
    Downloads: 17 This Week
    Last Update:
    See Project
  • 6

    BrowserBox

    Remote browser isolation for all

    BrowserBox is an embeddable, multiplayer browser that facilitates RBI (remote browser isolation) and zero trust protection. We've just integrated support for Tor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SaferPuppyLinux

    SaferPuppyLinux

    Safer Puppy Linux for activists, educators, low bandwidth, 32 & 64bit

    Live USB Distros based on Puppy Jammy 32, Fossa9.5 64, Bookworm64 for journalists, activists, teachers with slow computers in repressive environments ~700MB[32bit] ~1.1GB[64bit] RAM 1GB minimum (swap suggested) Live USB stick 2GB[32bit], 4GB[64bit] > VFAT32 encrypted personal storage suggested internet radio with bookmarks Firefox ESR for addons: singlefile, urbanVPN, translate Seamonkey (wysiwyg HTML editor), Palemoon can work with Tor Proxy via FoxyProxy Voice & webcam record Mini File...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    Advantages: Three-tier security system: The use of Tor, VPN, and data obfuscation creates a robust barrier for user data protection. This complex combination of technologies makes tracking user activities considerably more challenging. RAM Disk: All user activity is redirected to a RAM disk, ensuring high operational speed and guaranteeing that no data remains after the computer is rebooted. This ensures 100% deletion of all traces of use
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Sn3rpOs_v7.21: CoNt4g1N

    Sn3rpOs_v7.21: CoNt4g1N

    TinFoilSec Presents: Sn3rpOs_v7.21 (CoNt4g1N)

    *Updated 11/05/2021 TinfoilSec Presents: Sn3rpOs [Codename: CoNt4g1N] Features: Xfce4 Desktop Kali Linux Full System Torified with Privoxy & Tor bleachbit Wire Signal Veracrypt All repos transported through Privoxy&Tor dnscrypt-proxy (no-logs) Tor Browser Custom Tor Switcher and Pyloris Firefox-esr (configured with tor) Thunderbird ProtonVPN (Free VPN no-logs) Sn1per Vault Scanner RED_HAWK Fork of Kali Rolling, Debian Stretch/Buster -No Back Doors- Now with UEFI boot support and of course...
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 10
    Do you find someone claiming they use a proxy / vpn / tor? Download our program and see if it detects a Proxy/VPN/Tor connection! Or, Did you find some user on your site breaking rules? Track them using our IP look up software, You can easily gain alot of information of your users! Including ISP, Country, City, LATLONG, And proxy/vpn detection and others! Our software is one of the most powerful proxy/vpn detection tools and also a good ip look up software! We hope you enjoy your experience...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Tiny Security Suite is a software that consists of encryption, shredding, VPN, folder hiding, Firewall, and Tor Browser. Tiny Security Suite has: - File Encryption (AES and Triple DES) - Text Encryption (AES and Triple DES) - Shredder - Secure Folder (Folder Hider) - VPN (uses OpenVPN configuration files, need openVPN installed on computer) - Tor Browser - Firewall (Firewall PaPI)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    Internet Security Tools

    Internet Security Tools

    A set of internet security tools

    This is a set of internet security tools with a custom GUI. Its main features include an easy to use GUI frontend for openVPN and Dnscrypt-proxy (DNS Encryption). This module also includes Tor - connect to the onion router, Bleachbit - Clears browser history and other unused files similar to ccleaner, as well as one click installs for disconnect + noscript firefox addons. It can be run from the menu or from terminal using "internet-security-tools" A new "I.D" tab is available to change MAC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    MAYA STUDIO 13.07-32bit

    MAYA STUDIO 13.07-32bit

    Linux Mint based A/V-System

    MAYA STUDIO is an optimized Linux System with a lot of applications for Audio/Video and Photo-Production based on Ubuntu 12.04/Linux Mint 13 with Mate-Desktop! It was designed for older hardware, netbooks and modern hardware as well. First focus is stability, compability and an user-friendly Linux-Environment to be creative. Special feature: Maya Studio uses ALSA as the default soundsystem without Pulse and comes with the Jack Sound Server as an advanced option for professional 24/32-bit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Dork Searcher

    Search Google Dorks for SQLi Vulnerabilities

    Dork Searcher is a small utility that enables you to easily use Google to search for SQLi vulnerable web servers. Saves the results in a text or XML file. Uses the Tor VPN/Proxy client or your own Socks 4a or 5 proxy server for anonymity. Over 350 Google Dorks included. Easily add your own to the list by simply editing a text file. THE AUTHOR OF THIS SOFTWARE IN NO WAY CONDONES THE USE OF IT FOR ANY ILLEGAL ACTIVITIES.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 18

    X-RAP: RaspberyPi Acess Point

    Turn your RaspberryPi into a TOR/VPN Wifi Access Point

    X-RAP is a script that turns your Raspberry PI into a wifi access point for guest users. Their connections will be routed through TOR or a VPN gateway. A basic captive portal provides a web page for first time users. A ticket system can be used to restrict access. This project aims to provide a script to automate most of the setup process and make it easy to create your own X-RAP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next