Showing 10 open source projects for "tor security"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    HiddenVM

    HiddenVM

    HiddenVM — Use any desktop OS without leaving a trace

    If at any time Tails pushes an unexpected update, and HiddenVM is not yet updated for it, and you are stuck with a new Tails and no working HiddenVM version, you can re-download and temporarily use an earlier version of Tails until HiddenVM is updated. There are archived direct HTTP download mirrors of Tails images, archived official torrents with PGP signatures, or third-party archives at linuxtracker.org or fosstorrents.com, etc. (Always verify third-party torrents with archived official...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2

    TheSSS (The Smallest Server Suite)

    Lightweight Server Suite for LAN

    ...It is designed for system administrators who need an extremely tiny and fast set of server software. The supported servers are: FSP, FTP/SFTP, HTTP/HTTPS, NBD, NFS, NTP, rlogin, SSH, Telnet, and TFTP. A proxy server (Polipo) with Tor anonymizer is also included. The main security components are 4MLinux Firewall (based on iptables) and Clam AntiVirus. TheSSS iso images are fully compatible with UNetbootin, which can be used to create an easy-to-use TheSSS Live USB.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    MeanOS

    MeanOS

    The smallest and the most powerful operating system.

    The first decentralized, artificially intelligent, MEAN.js stack, operating system. Mean OS is the only operating system hosted anonymous using a P2P network and a suite of non-standard in-browser delivery mechanisms. Mean OS is specifically designed to support both Brave and Tor but is compatible with all other major browsers. Mean OS is Proud to be a BRAVE and TOR supporter, be free!!
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Sn3rpOs_v7.21: CoNt4g1N

    Sn3rpOs_v7.21: CoNt4g1N

    TinFoilSec Presents: Sn3rpOs_v7.21 (CoNt4g1N)

    *Updated 11/05/2021 TinfoilSec Presents: Sn3rpOs [Codename: CoNt4g1N] Features: Xfce4 Desktop Kali Linux Full System Torified with Privoxy & Tor bleachbit Wire Signal Veracrypt All repos transported through Privoxy&Tor dnscrypt-proxy (no-logs) Tor Browser Custom Tor Switcher and Pyloris Firefox-esr (configured with tor) Thunderbird ProtonVPN (Free VPN no-logs) Sn1per Vault Scanner RED_HAWK Fork of Kali Rolling, Debian Stretch/Buster -No Back Doors- Now with UEFI boot...
    Downloads: 60 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box....
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    JadeOak-OS

    An operating system for those who value security and privacy.

    Welcome to JadeOak OS, an operating system for those that value simplicity and privacy. It has the deep web browser, also known as the Tor browser, added to it as a default internet browser. It is linux-based and will work on a virtual machine, such as VirtualBox. For Installation Instructions or any issues with the OS, please go to the wiki. There is more detailed information about the OS on the wiki also.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. ...
    Leader badge
    Downloads: 39 This Week
    Last Update:
    See Project
  • 9

    atcacl

    Misc sysv boot scripts and wrappers for security and/or convienence

    atcacl: Atcacl is a collection of scripts and c wrapper programs that help make disappearing into the mists of IP land easier from userland. Once set up the commands are; dhcp0, dhcp1, idown, torstart, and torstop. dhcp0 and dhcp1 take down the eth0 and eth1 interfaces, randomize the MACs, bring the interfaces back up, and connect with dhcp again. idown shuts the interfaces down (including wlan0, wlan1), randomizes the MACs, and takes no further action. torstart starts tor and privoxy....
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Chrubix

    Chrubix

    Secure Linux distributions for Chromebooks

    (1) Software that generates a customized, secure Linux distribution (Debian, ArchLinux, Kali, ...) for your Chromebook. (2) Images for download, to save you the trouble. (3) More to come...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB