Showing 56 open source projects for "tor security"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Parrot Project

    Parrot Project

    Security, Development and Privacy Defense, all in one place.

    Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.
    Leader badge
    Downloads: 102 This Week
    Last Update:
    See Project
  • 2
    libertyOS

    libertyOS

    The worlds first Blockchain Operating System

    LibertyOS is the first Blockchain Operating System. Heavily focused on user privacy, security, speed, stability and accessibility, LibertyOS combines a novel token model with a blockchain-centric advertising platform to radically transform user experiences. Users get smoother, faster, cleaner, secure, data-safe systems, and can earn cash by opting in to pre-screened, anonymous, non-intrusive ads. Advertisers, publishers receive better ad reporting and increased revenue shares. Built by...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    A WASTE client. Download and create your own WASTE networks. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4

    JadeOak-OS

    An operating system for those who value security and privacy.

    Welcome to JadeOak OS, an operating system for those that value simplicity and privacy. It has the deep web browser, also known as the Tor browser, added to it as a default internet browser. It is linux-based and will work on a virtual machine, such as VirtualBox. For Installation Instructions or any issues with the OS, please go to the wiki. There is more detailed information about the OS on the wiki also.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    cintruder

    cintruder

    CIntruder - OCR Bruteforcing Toolkit

    Captcha Intruder is an automatic pentesting tool to bypass captchas. -> CIntruder-v0.4 (.zip) -> md5 = 6326ab514e329e4ccd5e1533d5d53967 -> CIntruder-v0.4 (.tar.gz) ->md5 = 2256fccac505064f3b84ee2c43921a68 --------------------------------------------
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,480 This Week
    Last Update:
    See Project
  • 7
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Librefox

    Librefox

    Firefox with privacy enhancements

    This project aims at enforcing the privacy and security of Firefox without forking the project. Librefox uses more than 500 privacy/security/performance settings, patches, Librefox-Addons (optional) and a cleaned bundle of Firefox (updater, crashreporter and Firefox's integrated addons that don't respect privacy are removed). Updated browser: because this project is not a fork, it is kept updated with the latest Firefox version. Limit internet access for extensions (firewall-test-feature)....
    Downloads: 14 This Week
    Last Update:
    See Project
  • 9
    Kantpoll

    Kantpoll

    A free and open-source election management system.

    Kantpoll was built with a focus on voting secrecy and auditability. After starting the server, create and manage campaigns in the browser (accessing http: //localhost:1985/home.html) Our principles: Transparency - people should not be fooled or manipulated. Privacy - people should not fear being observed, measured and analyzed. Anonymity - which ensures that people will not be subjected to sanctions or reprimands. Security - protection of voters' data and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. ...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11

    TorVM

    A VM for using Tor

    Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12

    GoodCrypto private server

    Secure mail + Tor gateway

    Protect your company's email and browsing with your GoodCrypto private server. * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    PcapsE-OS X
    PcapsE-OS X is a wrapper of tcpreplay directly integrated on Mac OS X Mavericks 10.9.3 for the execution of caps files that generate simulated malware traffic to test IDS Mac OS X based or redirecting simulated malware traffic on the interface of the IDS to other devices that perform correlation of events. Options:(1) Chat (2) Unix (3) Microsoft (4) Mac OS X (5) Network (6) DHCP (7) Firewalls (8) Routers (9) Proxy (10) Switches (11) HTTP (12) HTTPS (13) DNS (14) SW (15) Nessus (16) Tacacs+...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    torssh

    Makes a SSH conection through TOR

    A simple bash script to make a secure shell (SSH) connection using the TOR network. This script requires Tor and proxychains installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    atcacl

    Misc sysv boot scripts and wrappers for security and/or convienence

    atcacl: Atcacl is a collection of scripts and c wrapper programs that help make disappearing into the mists of IP land easier from userland. Once set up the commands are; dhcp0, dhcp1, idown, torstart, and torstop. dhcp0 and dhcp1 take down the eth0 and eth1 interfaces, randomize the MACs, bring the interfaces back up, and connect with dhcp again. idown shuts the interfaces down (including wlan0, wlan1), randomizes the MACs, and takes no further action. torstart starts tor and privoxy....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Internet Security Tools

    Internet Security Tools

    A set of internet security tools

    This is a set of internet security tools with a custom GUI. Its main features include an easy to use GUI frontend for openVPN and Dnscrypt-proxy (DNS Encryption). This module also includes Tor - connect to the onion router, Bleachbit - Clears browser history and other unused files similar to ccleaner, as well as one click installs for disconnect + noscript firefox addons.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Chrubix

    Chrubix

    Secure Linux distributions for Chromebooks

    (1) Software that generates a customized, secure Linux distribution (Debian, ArchLinux, Kali, ...) for your Chromebook. (2) Images for download, to save you the trouble. (3) More to come...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ESSPEE - Penetration Testing & Forensics

    ESSPEE - Penetration Testing & Forensics

    (Android Forensics & Malware Analysis Included)

    ESSPEE - Extreme Security Scanning Penetration testing & Exploitation Environment Ubuntu 12.04 LTS (Precise Pangolin) is purposefully selected as the base Operating System to obtain supports from Ubuntu for a long duration (till Apr 2017). It is packed with featured security tools with very less resource consumption and higher degree of stability. Thanks to Back Track, Blackbuntu, CAINE and DEFT and many others for inspiration. Being a sole developer to this distro, I wish it...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 48 This Week
    Last Update:
    See Project
  • 22
    AttackVector Linux

    AttackVector Linux

    linux distro for anonymized penetration based on Kali and TAILS

    AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project's TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may compromize anonymity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Proxychain

    Proxychain

    Surf anonymously: Hide and change your IP with proxychain.

    With proxychain you can easily redirect your webtrafic via multiple SOCKS5 servers and hide your real IP address. Works fine with TOR as first proxy. If you define a second, third, or fourth proxy, nobody will see that you're using TOR.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB