Showing 284 open source projects for "tor-buddy"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    Tor Browser

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked.
    Downloads: 1,141 This Week
    Last Update:
    See Project
  • 2
    Baby Buddy

    Baby Buddy

    Helps caregivers track sleep, feedings, diaper changes, and tummy time

    A buddy for babies! Helps caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guesswork. A buddy to help caregivers track sleep, feedings, diaper changes, and tummy time to learn about and predict baby's needs without (as much) guess work. A demo of Baby Buddy is available on Heroku.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Byte Buddy

    Byte Buddy

    Runtime code generation for the Java virtual machine

    ...Furthermore, Byte Buddy offers a convenient API for changing classes either manually, using a Java agent or during a build. In order to use Byte Buddy, one does not require an understanding of Java byte code or the class file format. In contrast, Byte Buddy's API aims for code that is concise and easy to understand for everybody. Nevertheless, Byte Buddy remains fully customizable down to the possibility of defining custom byte code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 112 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    user.js

    user.js

    Firefox privacy, security and anti-tracking: a comprehensive user.js

    ...Everyone, experts included, should at least read the wiki, as it contains important information regarding a few user.js settings. Note that we do not recommend connecting over Tor on Firefox. Use the Tor Browser if your threat model calls for it, or for accessing hidden services. Also be aware that the arkenfox user.js is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 7
    OnionShare

    OnionShare

    Securely and anonymously share files of any size

    OnionShare is an open source tool that allows you to securely and anonymously share files of any size, host websites, and chat with friends using the Tor network. There's no need for middlemen that could very well violate the privacy and security of the things you share online. With OnionShare, you can share files directly with just an address in Tor Browser. OnionShare works because it is accessible as a Tor Onion Service. All you need to do is open it and drag and drop the files you want to share into it, and start sharing. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    Whoogle Search

    Whoogle Search

    A self-hosted, ad-free, privacy-respecting metasearch engine

    ...Optional location-based searching (i.e. results near <city>). Optional NoJS mode to view search results in a separate window with JavaScript blocked. If routing your request through Tor you will need to make the following adjustments. Due to the nature of interacting with Google through Tor we will need to be able to send signals to Tor.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9
    UFONet

    UFONet

    UFONet - Denial of Service Toolkit

    ...It automates the discovery of vulnerable targets and enables attackers or researchers to launch large-scale amplification attacks without directly using botnets. While primarily intended for penetration testing and educational purposes, UFONet emphasizes anonymity through the use of proxies, TOR, and encrypted command channels.
    Downloads: 22 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    Robin is an AI-powered open source tool designed to assist investigators and researchers in conducting dark web OSINT (Open Source Intelligence) investigations. It combines automated dark web search capabilities with large language models (LLMs) to analyze and summarize information discovered across hidden services and Tor-based search engines. The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven processing. Robin also performs scraping of discovered pages through Tor sessions, allowing users to gather additional context from dark web sites while maintaining the required network routing. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 11
    RoboSats

    RoboSats

    A simple and private bitcoin exchange

    RoboSats is a privacy-preserving, peer-to-peer Bitcoin exchange that allows users to buy and sell Bitcoin using Lightning Network payments without requiring identity verification. It uses Tor by default and leverages a simple robot-based user interface to facilitate one-time trades between anonymous users. Each trade session is isolated, and no long-term accounts or KYC are needed, making RoboSats one of the most private Bitcoin P2P tools available. Designed with a strong focus on usability and anonymity, it's especially popular among privacy advocates and Bitcoin maximalists.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 12
    Sparrow Wallet

    Sparrow Wallet

    Desktop Bitcoin Wallet focused on security and privacy

    ...Sparrow supports advanced workflows such as Partially Signed Bitcoin Transactions (PSBT), multisignature setups, customizable fee selection, and comprehensive coin control — making it suitable for power users, privacy advocates, and those running their own full nodes. It integrates with a wide range of hardware wallets (e.g., Ledger, Trezor, Coldcard) and connects to Bitcoin Core or Electrum servers, including via Tor for enhanced anonymity.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 13
    Wasabi Wallet

    Wasabi Wallet

    Open-source, non-custodial, privacy focused Bitcoin wallet for Windows

    Wasabi is an open-source, non-custodial, privacy-focused Bitcoin wallet for desktop, that implements trustless coinjoin. Wasabi creates trustless coinjoin transactions over the Tor anonymity network. The coinjoin coordinator cannot steal from, nor breach the privacy of the participants. Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 14
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Quiet

    Quiet

    A private, p2p alternative to Slack and Discord built on Tor & IPFS

    Quiet is an alternative to team chat apps like Slack, Discord, and Element that does not require trusting a central server or running one's own. In Quiet, all data syncs directly between a team's devices over Tor with no server required. Quiet is not audited and should not be used when privacy and security are critical. It lacks basic features and probably won't replace your Slack or Discord yet. That said, it works surprisingly well and we use it daily as a Slack replacement. Quiet is for fans of software freedom, decentralization and privacy tech, and for anyone craving a future where humanity can collaborate effectively online without trusting our communities, networks, and data to giant corporations. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external servers, search engines, or trackers.
    Downloads: 45 This Week
    Last Update:
    See Project
  • 18
    HiddenVM

    HiddenVM

    HiddenVM — Use any desktop OS without leaving a trace

    If at any time Tails pushes an unexpected update, and HiddenVM is not yet updated for it, and you are stuck with a new Tails and no working HiddenVM version, you can re-download and temporarily use an earlier version of Tails until HiddenVM is updated. There are archived direct HTTP download mirrors of Tails images, archived official torrents with PGP signatures, or third-party archives at linuxtracker.org or fosstorrents.com, etc. (Always verify third-party torrents with archived official...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Clicky

    Clicky

    AI teacher that lives as a buddy next to your cursor

    Clicky is an experimental AI-powered desktop companion designed to act as an interactive, real-time teaching assistant that lives directly alongside the user’s cursor on macOS. It functions as a menu bar application that can observe the user’s screen, interpret context, and provide guidance through both voice and visual cues, effectively simulating the experience of having a human tutor sitting next to you. The system captures screenshots and combines them with voice input to send contextual...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 20
    FreeTube

    FreeTube

    An Open Source YouTube app for privacy

    ...The app provides many features similar to the official YouTube experience — such as subscribing to channels, exploring trending content, and organizing playlists — while also offering privacy-centric options like using Tor or external proxies and hiding elements via distraction-free settings.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 21
    Toxic

    Toxic

    A Tox-based instant messaging and video chat client

    Toxic is a Tox protocol-based command-line messenger for Linux, offering fully encrypted, decentralized, and serverless instant messaging. It includes features such as text messaging, file transfer, and audio calls—all without requiring user accounts or central servers. Toxic is designed for power users who prefer a minimalist interface, operating entirely within a terminal while delivering strong privacy through the Tox peer-to-peer protocol. It’s lightweight, fast, and ideal for use in...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    Bisq

    Bisq

    A decentralized bitcoin exchange network

    ...Deposits held in 2-of-2 multi-sig wallets encourage safe, successful trades. Your data is stored locally on disk, and is never sent to a central server. Every Bisq node is a Tor hidden service by default. Code is open-source, and project strategy is discussed openly on Keybase and GitHub. We've made all this sophistication simple, make your first trade in under 10 minutes! Decentralized governance for a decentralized exchange, built on top of Bitcoin.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    Open Directory Downloader

    Open Directory Downloader

    Indexes open directories

    Indexes open directories listings in 130+ supported formats, including FTP(S), Google Drive, Bhadoo, GoIndex, Go2Index (alternatives), Dropbox, Mediafire, GoFile, GitHub. Written in C# with .NET (Core), which means it is cross-platform! Downloading is not (yet) implemented, but is already possible when you use the resulting file into another tool (for most of the formats). When you are NOT using the self-contained releases, you need to install the latest/current Runtime version of .NET 7....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Wayback

    Wayback

    An archiving tool with an IM-style interface that prioritizes privacy

    Wayback is a web archiving and playback tool that allows users to capture and preserve web content. It provides an IM-style interface for receiving and presenting archived web content, and a search and playback service for retrieving previously archived pages. Wayback is designed to be used by web archivists, researchers, and anyone who wants to preserve web content and access it in the future. Wayback is an open-source web archiving application written in Go. With a modular and customizable...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    Raccoon is a high-performance offensive security tool designed to assist with reconnaissance and vulnerability scanning during penetration testing and security assessments. It automates several common reconnaissance tasks, allowing security professionals to quickly gather information about a target system or web application. The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB