Showing 13 open source projects for "search tor"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    Whoogle Search

    Whoogle Search

    A self-hosted, ad-free, privacy-respecting metasearch engine

    ...Randomly generated User Agent. Easy to install/deploy. DDG-style bang (i.e. !<tag> <query>) searches. Optional location-based searching (i.e. results near <city>). Optional NoJS mode to view search results in a separate window with JavaScript blocked. If routing your request through Tor you will need to make the following adjustments. Due to the nature of interacting with Google through Tor we will need to be able to send signals to Tor.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    UFONet

    UFONet

    UFONet - Denial of Service Toolkit

    UFONet is a powerful and controversial Python-based toolkit for testing and conducting Distributed Denial of Service (DDoS) attacks using unconventional methods, such as leveraging third-party web applications as attack vectors. It automates the discovery of vulnerable targets and enables attackers or researchers to launch large-scale amplification attacks without directly using botnets. While primarily intended for penetration testing and educational purposes, UFONet emphasizes anonymity...
    Downloads: 66 This Week
    Last Update:
    See Project
  • 3
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external servers, search engines, or trackers.
    Downloads: 181 This Week
    Last Update:
    See Project
  • 4
    Wayback

    Wayback

    An archiving tool with an IM-style interface that prioritizes privacy

    Wayback is a web archiving and playback tool that allows users to capture and preserve web content. It provides an IM-style interface for receiving and presenting archived web content, and a search and playback service for retrieving previously archived pages. Wayback is designed to be used by web archivists, researchers, and anyone who wants to preserve web content and access it in the future. Wayback is an open-source web archiving application written in Go. With a modular and customizable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 6
    ACHE Focused Crawler

    ACHE Focused Crawler

    ACHE is a web crawler for domain-specific search

    ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to a given domain or that contain a user-specified pattern. ACHE differs from generic crawlers in sense that it uses page classifiers to distinguish between relevant and irrelevant pages in a given domain. A page classifier can be defined as a simple regular expression (e.g., that matches every page that contains a specific word) or a machine-learning-based classification model....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    searx

    searx

    Privacy-respecting metasearch engine

    Searx is a free and open source internet metasearch engine that respects your privacy. It aggregates results from over 70 search services, providing accurate, relevant results with absolutely no user tracking or profiling going on. It’s like having your very own private search engine. It has secure, encrypted connections and does not use cookies by default, giving you the assurance that your searches are 100% private and secure. Searx can also be used over Tor, providing you online anonymity. ...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 8
    X-RAY

    X-RAY

    The next web scraper, see through the <html> noise

    Supports strings, arrays, arrays of objects, and nested object structures. The schema is not tied to the structure of the page you're scraping, allowing you to pull the data in the structure of your choosing. The API is entirely composable, giving you great flexibility in how you scrape each page. Paginate through websites, scraping each page. X-ray also supports a request delay and a pagination limit. Scraped pages can be streamed to a file, so if there's an error on one page, you won't...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    ...The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. ...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10

    FurView

    Tool for grabbing and organizing pictures from e621.net

    Tool for grabbing and organizing pictures from e621.net It uses tor for connecting e621 anonymously and search; and grabs images from e926 (a mirror of e621) using ordinary internet connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Anon on the Go

    portable anonymity pack

    contents: 1.bleachbit portable cleans cache data and browsing data and useless logs 2.proxifier 3.15 portable used to set rules for routing ALL traffic through a proxyy for tor set to 127.0.0.1 port :9050 in rules 3.true crypt portable encrypt your harddrive 4.u torrent portable 5.thunderbird portable email cliet which is tor freindly 6.putty ssh client 7.tor browser 8. xchat portable 9.pidgin portable secure IM client tor and off the record messaging freindly 10. torchat 11. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Dork Searcher

    Search Google Dorks for SQLi Vulnerabilities

    Dork Searcher is a small utility that enables you to easily use Google to search for SQLi vulnerable web servers. Saves the results in a text or XML file. Uses the Tor VPN/Proxy client or your own Socks 4a or 5 proxy server for anonymity. Over 350 Google Dorks included. Easily add your own to the list by simply editing a text file. THE AUTHOR OF THIS SOFTWARE IN NO WAY CONDONES THE USE OF IT FOR ANY ILLEGAL ACTIVITIES.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    i-Tor is a set of Tools and Technologies for Open Repositories, based on Linux, Java, MySQL, Mirage and other free components. It harvests OAI and turns databases into Open Archives. It includes similarity, backlinks and related search based on Lucene.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next