Showing 11 open source projects for "tor"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 1
    Toxic

    Toxic

    A Tox-based instant messaging and video chat client

    Toxic is a Tox protocol-based command-line messenger for Linux, offering fully encrypted, decentralized, and serverless instant messaging. It includes features such as text messaging, file transfer, and audio calls—all without requiring user accounts or central servers. Toxic is designed for power users who prefer a minimalist interface, operating entirely within a terminal while delivering strong privacy through the Tox peer-to-peer protocol. It’s lightweight, fast, and ideal for use in...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    ADAMANT Messenger Progressive Web App

    ADAMANT Messenger Progressive Web App

    ADAMANT decentralized Messenger, progressive web application

    ...Privacy is the main concept of ADAMANT, neither phone numbers nor emails are required. Apps have no access to the contact list or geotags, IPs are hidden from chatters and paranoids can use Tor app. All the messages are encrypted with the Diffie-Hellman Curve25519, Salsa20, Poly1305 algorithms and signed by SHA-256 + Ed25519 EdDSA. Private keys are never transferred to the network.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    BlackBelt WASTE - ipv4/Tor/i2p +AI+Voice

    BlackBelt WASTE - ipv4/Tor/i2p +AI+Voice

    Modern, AI-Smart, WASTE p2p for ipv4, Tor and i2p + Voice Conference.

    Open Source - GPLv3 inc images. A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable. Voice Conference, Chat, Transfer files and Participate in Forums in a secure environment. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Win 11, Linux (WINE). *** User Based Access Control - for voice, chats, file transfers and uploads. (useful in NULLNETS) *** Distributed...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ufdbGuard - URL filter for Squid

    ufdbGuard - URL filter for Squid

    URL filter to block unwanted content on the internet

    ufdbGuard is a URL filter to block unwanted web content on the internet. ufdbGuard can also enforce Google SafeSearch, detect UltraSurf, Tor, Skype and other chat applications, proxy tunnels and enforce safer HTTPS traffic. ufdbGuard is a redirector for the Squid web proxy with 200,000 URL verifications/second. ufdbGuard integrates with user authorities like LDAP, Kerberos and Active Directory to assign different policies to different groups of users. Contact the support desk at www.urlfilterdb.com for information about the ufdbGuard API which can be integrated in 3rd party applications.
    Leader badge
    Downloads: 24 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 6
    Briar
    ...Unlike traditional messaging tools such as email, Twitter or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices. If the Internet's down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and their relationships from surveillance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    A WASTE client. Download and create your own WASTE networks. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    ChatSecure

    ChatSecure

    ChatSecure is a free and open source encrypted chat client for iOS

    ChatSecure is a free and open source messaging app that features OMEMO encryption and OTR encryption over XMPP. You can connect to your existing Google accounts or create new accounts on public XMPP servers (including via Tor), or even connect to your own server for extra security. Unlike other apps that keep you stuck in their walled garden, ChatSecure is fully interoperable with other clients that support OMEMO or OTR and XMPP, such as Conversations (Android), CoyIM (Desktop), and more. ChatSecure only uses well-known open-source cryptographic libraries to keep your conversations private. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Tor Chat

    Tor Chat

    TorChat is a peer to peer instant messenger with a completely decentra

    ...(It can run on Linux and Mac too, in fact it was developed on Linux with cross platform usability in mind from the very first moment on, but the installation on other platforms than Windows is a bit more complicated at the moment) Tor location hidden services basically means: Nobody will be able to find out where you are. If they are already observing you and sniff your internet connection they will not be able to find out what you send or receive (everything is end-to-end encrypted) to whom you are sending or receiving from where your contacts are located
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy-to-use Business Software for the Waste Management Software Industry Icon
    Easy-to-use Business Software for the Waste Management Software Industry

    Increase efficiency, expedite accounts receivables, optimize routes, acquire new customers, & more!

    DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
    Learn More
  • 10

    Anon on the Go

    portable anonymity pack

    contents: 1.bleachbit portable cleans cache data and browsing data and useless logs 2.proxifier 3.15 portable used to set rules for routing ALL traffic through a proxyy for tor set to 127.0.0.1 port :9050 in rules 3.true crypt portable encrypt your harddrive 4.u torrent portable 5.thunderbird portable email cliet which is tor freindly 6.putty ssh client 7.tor browser 8. xchat portable 9.pidgin portable secure IM client tor and off the record messaging freindly 10. torchat 11. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    A C#.Net IRCd that uses the TOR network in a distributed manner, connecting any IRC client via the TOR network to other TOR-IRCd instances. IRC clients connected to the local IRCd sees other IRC Proxyed clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next