41 projects for "java anonymous proxy" with 2 filters applied:

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Anonycat is web-based software that allows you to surf the web anonymously and bypass overly restrictive corporate firewalls or monitoring/blocking software. It can be used online (http://anonycat.com), or run as a service on your own webserver.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Multi-platform spam filtering proxy, designed to be used on the client side. Can be launched as faceless server or with a GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CarrierPigeon enables intelligent, transparent and secure usage of data sources across networked sites. The underlying, distributed Java-framework is built on the concept of proxy drivers to provide a real VPN experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Enables a user to view & alter all aspects of comunications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development. Seen as part of a hacker toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A web proxy that provides Single Sign-On (SSO) into websites in a manner that protects your passwords and other sensitive information from untrusted network access devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Freemail enables secure, anonymous, two-party communication over Freenet. The use of flexible channel initiation protocols and secure message transport allows allows cultivation of anonymous identities with reliable reputations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Next generation reverse proxy : provides authentication and authorization services for all incoming HTTP traffic, in addition to offering transparent web SSO to protected applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Team MONICA's effort: - general JAVA environment - general JAVA cryptography environment - SSH client/server in JAVA - secure & anonymous communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The K Network will provide a network infrastructure for encrypted anonymous distibuted communication. Distributed chat will be the first application. Goals are anonymity for both sender and receiver, no central point of failure, and scalability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A multipurpose filtering HTTP proxy written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
    Downloads: 0 This Week
    Last Update:
    See Project