Showing 9 open source projects for "tor network"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external servers, search engines, or trackers.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 2
    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    Modern, AI-Smart, WASTE p2p for ipv4, Tor and i2p + Voice Conference.

    Open Source - GPLv3 inc images. A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable. Voice Conference, Chat, Transfer files and Participate in Forums in a secure environment. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Win 11, Linux (WINE). *** User Based Access Control - for voice, chats, file transfers and uploads. (useful in NULLNETS) *** Distributed...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 3
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    Speek

    Speek

    Privacy focused messenger that doesn't trust anyone with your identity

    Speek is a peer-to-peer, serverless chat application built on Tor that enables anonymous and censorship-resistant communication without any central servers. Every message is end-to-end encrypted and routed through the Tor network, and users are identified only by cryptographic public keys, not usernames or phone numbers. Speek requires no sign-up, no cloud infrastructure, and stores no data—offering a radically private alternative to mainstream chat apps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 5
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    A WASTE client. Download and create your own WASTE networks. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    anontwi

    anontwi

    AnonTwi: tool to have more privacy on social networking sites related

    AnonTwi provides you: + AES + HMAC-SHA1 encryption on Tweets and Direct Messages + Secure Sockets Layer (SSL) to interact with API + Proxy Socks (for example, to connect to the TOR network) + Random HTTP header values + Send long messages splitted automatically + Automatic decryption of tweet's urls or raw inputs + Backup messages to your disk (max: 3200) + Send fake geolocation places + Remove data and close account (suicide!) + View global Trending Topics + UTF-8 + Unicode support (chinese, arabic, symbols, etc) + Multiplatform: GNU/Linux, MacOS, Win32 + Detailed colourful output results + Generate tools and modules + GTK+ interface + An IRC bot slave + [...] ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A C#.Net IRCd that uses the TOR network in a distributed manner, connecting any IRC client via the TOR network to other TOR-IRCd instances. IRC clients connected to the local IRCd sees other IRC Proxyed clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB