Showing 13 open source projects for "tor network"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    OnionShare

    OnionShare

    Securely and anonymously share files of any size

    OnionShare is an open source tool that allows you to securely and anonymously share files of any size, host websites, and chat with friends using the Tor network. There's no need for middlemen that could very well violate the privacy and security of the things you share online. With OnionShare, you can share files directly with just an address in Tor Browser. OnionShare works because it is accessible as a Tor Onion Service. All you need to do is open it and drag and drop the files you want to share into it, and start sharing. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external servers, search engines, or trackers.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    ADAMANT Messenger Progressive Web App

    ADAMANT Messenger Progressive Web App

    ADAMANT decentralized Messenger, progressive web application

    ...Apps have no access to the contact list or geotags, IPs are hidden from chatters and paranoids can use Tor app. All the messages are encrypted with the Diffie-Hellman Curve25519, Salsa20, Poly1305 algorithms and signed by SHA-256 + Ed25519 EdDSA. Private keys are never transferred to the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    BlackBelt WASTE- ipv4 Tor i2p AI Voice

    Modern, AI-Smart, WASTE p2p for ipv4, Tor and i2p + Voice Conference.

    Open Source - GPLv3 inc images. A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable. Voice Conference, Chat, Transfer files and Participate in Forums in a secure environment. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Win 11, Linux (WINE). *** User Based Access Control - for voice, chats, file transfers and uploads. (useful in NULLNETS) *** Distributed...
    Downloads: 13 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Chat of Death
    Chat of Death is an anonymous, peer-to-peer encrypted communication application designed for maximum privacy and security. Maybe you guys will have better luck with it then I do. There's a bit of latency do to the Tor network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    Speek

    Speek

    Privacy focused messenger that doesn't trust anyone with your identity

    Speek is a peer-to-peer, serverless chat application built on Tor that enables anonymous and censorship-resistant communication without any central servers. Every message is end-to-end encrypted and routed through the Tor network, and users are identified only by cryptographic public keys, not usernames or phone numbers. Speek requires no sign-up, no cloud infrastructure, and stores no data—offering a radically private alternative to mainstream chat apps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    AAMDirect II
    A.A.M Direct (formerly NNTP A.A.M Client) is a type of email system whereby two or more people can communicate privately and/or anonymously with strong encryption . It uses the alt.anonymous.messages news group and does not require a usual email address setup. Messages are sent to the news group directly or through the Tor network. Note: If you have AAMDirect II already installed, just download the AAMDirect.exe and replace the old executable. Rename the old executable first and test the new before deleting the old. See WIKI for updates and changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    A WASTE client. Download and create your own WASTE networks. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 10

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    anontwi

    anontwi

    AnonTwi: tool to have more privacy on social networking sites related

    AnonTwi provides you: + AES + HMAC-SHA1 encryption on Tweets and Direct Messages + Secure Sockets Layer (SSL) to interact with API + Proxy Socks (for example, to connect to the TOR network) + Random HTTP header values + Send long messages splitted automatically + Automatic decryption of tweet's urls or raw inputs + Backup messages to your disk (max: 3200) + Send fake geolocation places + Remove data and close account (suicide!) + View global Trending Topics + UTF-8 + Unicode support (chinese, arabic, symbols, etc) + Multiplatform: GNU/Linux, MacOS, Win32 + Detailed colourful output results + Generate tools and modules + GTK+ interface + An IRC bot slave + [...] ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A C#.Net IRCd that uses the TOR network in a distributed manner, connecting any IRC client via the TOR network to other TOR-IRCd instances. IRC clients connected to the local IRCd sees other IRC Proxyed clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB