Showing 6 open source projects for "tor"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    OnionShare

    OnionShare

    Securely and anonymously share files of any size

    OnionShare is an open source tool that allows you to securely and anonymously share files of any size, host websites, and chat with friends using the Tor network. There's no need for middlemen that could very well violate the privacy and security of the things you share online. With OnionShare, you can share files directly with just an address in Tor Browser. OnionShare works because it is accessible as a Tor Onion Service. All you need to do is open it and drag and drop the files you want to share into it, and start sharing. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    searx

    searx

    Privacy-respecting metasearch engine

    ...It has secure, encrypted connections and does not use cookies by default, giving you the assurance that your searches are 100% private and secure. Searx can also be used over Tor, providing you online anonymity. Searx can be easily integrated with any search engine of your choice. Start searching with absolute privacy and peace of mind with Searx!
    Downloads: 31 This Week
    Last Update:
    See Project
  • 3
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    ...KeexyBox acts as a default gateway and DNS server for the devices in your home network. It thus intercepts all connections to the Internet to carry out website filtering or to activate browsing via the Tor anonymity network according to connection profiles which you have configured.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Streisand

    Streisand

    Streisand sets up a new server running your choice

    ...With just a cloud provider account and basic Unix command-line knowledge, Streisand can provision a server and configure multiple VPN and proxy protocols almost automatically. This includes OpenVPN, WireGuard, Shadowsocks, OpenConnect, and Tor bridges, often with optional add-ons like obfuscation or stunnel to resist throttling and detection. The result is a private website that hosts client software downloads and setup instructions for easy access. Streisand supports major cloud providers like AWS, Azure, Google Cloud, Linode, DigitalOcean, and Rackspace, while also offering installation options for advanced users with their own servers.
    Downloads: 162 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 5

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 62 This Week
    Last Update:
    See Project
  • 6
    Enable onion routing over HTTP, i.e. Tor on HTTP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next