[go: up one dir, main page]

Results for: tor java

Suggested Categories:

Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.

1210 Products for "tor java"

  • 1
    Java

    Java

    Oracle

    The Java™ Programming Language is a general-purpose, concurrent, strongly typed, class-based object-oriented language. It is normally compiled to the bytecode instruction set and binary format defined in the Java Virtual Machine Specification. In the Java programming language, all source code is first written in plain text files ending with the .java extension.
    Starting Price: Free
  • 2
    Tor Browser

    Tor Browser

    The Tor Project

    Protect yourself against tracking, surveillance, and censorship. f you are in a country where Tor is blocked, you can configure Tor to connect to a bridge during the setup process. Select "Tor is censored in my country." If Tor is not censored, one of the most common reasons Tor won't connect is an incorrect system clock. Please make sure it's set correctly. Tor Browser will block browser plugins such as Flash, RealPlayer, QuickTime, and others: they can be manipulated into revealing your IP address. ...
  • 3
    TorRefresher

    TorRefresher

    Assist AI, Inc.

    TorRefresher is a lightweight Windows tray application designed to make using Tor simple and efficient. Built to work with the official Tor Expert Bundle, it gives you full control over your Tor connection without needing to touch the command line. 🔄 Automatic IP Rotation – Refresh your Tor circuit on a timer of your choice 🖱 One-Click Manual Refresh – Instantly change your IP from the tray 🌍 Exit Node Info – See your current IP and country at a glance 🔒 Bridge Mode Support – Works in censored regions with custom bridges ⚡ Fast & Lightweight – Runs silently in the background Setup is simple: download the Tor Expert Bundle, point TorRefresher to your tor.exe, and you’re ready to go. ...
    Starting Price: $15.99
  • 4
    TorGuard

    TorGuard

    TorGuard VPN

    ...Don't risk your personal privacy! Install TorGuard VPN service within minutes on any device. TorGuard software is pre-configured to protect your data with 256-bit AES encryption, DNS/IPV6/WebRTC leak blocking, kill switch, and more. TorGuard offers a massive network of 3000+ global VPN servers in over 50+ countries. Get unlimited bandwidth and zero throttling anywhere in the world.
    Starting Price: $9.99 per month
  • 5
    TORS Travel
    The TORS.Travel Back Office enables Tour Operators to cost and book bespoke/tailor-made/dynamically packaged itineraries. The design builds on the creation and use of a variety of travel reservation systems over many years. This system is in production use today. Price an itinerary in real-time while talking to your customer or as the customer views your website.
    Starting Price: $275 per month
  • 6
    Cloaken URL Unshortener
    Quickly expand shortened URLs and obtain a rasterized image of the website. By leveraging the power of TOR exit nodes you maintain anonymity. Cloaken URL Unshortener leverages the power of TOR to unshorten URLs which have been shortened using services such as Bit.ly or TinyUrl all while maintaining operational security. Operational security is maintained through the power of the TOR networks anonymity characteristics. Cloaken allows for a self contained and self managed URL unshortener service to be deployed within the AWS Cloud. ...
    Starting Price: $0.05 per hour
  • 7
    Maxim

    Maxim

    TOR Systems

    TOR’s real-time integrated booking and ticketing system is known as “Maxim.” It supports museums, zoos, galleries, theme parks, castles, heritage sites and gardens by providing the very best in ticketing, membership, retail and catering and CRM functionality. Maxim’s core strengths are flexibility, stability, reliability, and speed and ease.
  • 8
    Onion Browser

    Onion Browser

    Onion Browser

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Tor offers the highest standard of privacy. You are not linked to your browsing activity.
  • 9
    Anonymous Messenger

    Anonymous Messenger

    Anonymous Messenger

    A peer-to-peer private anonymous and secure messenger that works over Tor. It's also free and open source software which gives users the freedom of changing it and redistributing it under the terms of the GNU General Public License v3. Anonymous Messenger utilizes Tor for its anonymity network and data transport security using the onion v3 protocol and the ability to run onion services on any device and connect directly and anonymously without having to set up any servers, also it uses the signal protocol to encrypt all data before sending it over the Tor network directly to the intended receiver, which means we get two layers of end-to-end encryption without using any server or service. ...
    Starting Price: Free
  • 10
    Zeus

    Zeus

    Zeus

    The best way to take your Bitcoin/Lightning node on the go. Connect to your node over VPN or Tor, make payments with lightning or on-chain, manage your channels, and more. Send traditional Bitcoin payments on-chain or take advantage of Lightning and experience near-instant settlement. Zeus connects to your node remotely over a VPN connection or Tor so you can buy that beer even when you're on the other side of the globe. No need to wait till you get home to connect to a storefront or newly made acquaintance. ...
  • 11
    PrizmDoc for Java
    Take your viewing to the next level with Accusoft’s PrizmDoc® for Java—a powerful document viewer with support for all popular document and image types. The HTML5 document viewer streamlines your processes with robust functionality, including annotation, redaction, split & merge, and so much more.
  • 12
    Conholdate.Total for Java
    Conholdate.Total for Java includes all file format Java APIs as a single suite that are offered by Aspose & GroupDocs. It enables software developers to build an incredibly versatile file processing system capable of handling many popular file formats and performs a wide range of document handling operations from within their own Java (J2SE, J2EE, J2ME) applications.
    Starting Price: from US$ 4,999
  • 13
    TorFX

    TorFX

    TorFX

    Every business is different, but our range of currency transfer services can be adapted to suit your company’s needs and help you protect your profit. We secure you the most competitive exchange rate available whenever you need to make an immediate transfer. Budget effectively and protect your funds from negative market shifts by fixing an exchange rate for up to two years in advance of making a transfer. Limit Order, target an exchange rate higher than the current rate and we’ll...
  • 14
    Briar

    Briar

    Briar

    ...Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices. If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance. Briar uses the Tor network to prevent eavesdroppers from learning which users are talking to each other. Each user’s contact list is encrypted and stored on her own device. All communication between devices is encrypted end-to-end, protecting the content from eavesdropping or tampering.
  • 15
    Nutrient SDK
    Nutrient is the comprehensive solution for all your PDF needs, offering tools that effortlessly integrate and operate PDF functionality across any platform. 1. SDK PRODUCTS Integrate robust PDF functionality into iOS, Android, Windows, web (JavaScript), or any cross-platform technology, providing capabilities such as PDF viewing, markup, collaboration, and more. 2. LIBRARIES Utilize our potent .NET and Java libraries to boost your backend applications with batch processing of redactions and PDF forms, OCR’d scanned text, and editing of PDF documents, directly from your application server. 3. ...
  • 16
    Lokinet

    Lokinet

    Lokinet

    Lokinet is a decentralized onion router that enables anonymous internet access by leveraging the Oxen service node network as relays, providing market-based Sybil attack resistance through the Oxen blockchain. It supports web browsing, onion-routed real-time voice communications, and other applications without requiring specialized software or custom patches. Unlike Tor, Lokinet operates on the network layer, allowing it to onion-route any IP-based protocol, including TCP, UDP, and ICMP, facilitating activities such as media streaming and video conferencing. Lokinet's infrastructure is built on the Low-Latency Anonymous Routing Protocol (LLARP), designed to address issues present in other networks like Tor and I2P. ...
    Starting Price: Free
  • 17
    MINT Browser

    MINT Browser

    BetaTap Apps

    ...MINT Browser's architecture is designed to be speedy like a lightweight browser, but not lightweight in features. Not only does MINT Browser support proxying through Tor, but it also patches the infamous WebRTC bug that leaks sensitive information when Tor is used.
    Starting Price: Free
  • 18
    Jscrambler

    Jscrambler

    Jscrambler

    ...Jscrambler’s Code Integrity product safeguards first-party JavaScript through state-of-the-art obfuscation and exclusive runtime protection. Jscrambler’s Webpage Integrity product mitigates threats and risks posed by third-party tags, while ensuring compliance with PCI DSS v4 and protecting payment pages. Jscrambler serves a diverse range of customers, including top Fortune 500 companies, online retailers, airlines, media outlets, and financial services firms.
  • 19
    NexVision

    NexVision

    NexVision Lab

    ...It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. ...
    Starting Price: Free
  • 20
    JOpt.TourOptimizer

    JOpt.TourOptimizer

    DNA Evolutions GmbH

    ...It can be customized to meet special requirements or adapt to the industries’ specific needs in which your software products are used. JOpt.TourOptimizer – enables you to enhance your product or project by seamlessly integrating DNA’s tour and resource optimization engine. It comes as a Java library or in Docker Container utilizing the Spring Framework and Swagger.
    Leader badge">
    Starting Price: €995
    Partner badge
  • 21
    Zenlogin

    Zenlogin

    Zenlogin

    Zenlogin detects suspicious logins so you don't have to. A single API to notify your users when there's been suspicious login activity on their account. This threat detection includes observing VPN, TOR and Botnet traffic, to ensure any authentication or login attempts made by your users are legitimate.
  • 22
    DataMelt

    DataMelt

    jWork.ORG

    ...DataMelt can be used to plot functions and data in 2D and 3D, perform statistical tests, data mining, numeric computations, function minimization, linear algebra, solving systems of linear and differential equations. Linear, non-linear and symbolic regression are also available. Neural networks and various data-manipulation methods are integrated using Java API. Elements of symbolic computations using Octave/Matlab scripting are supported. DataMelt is a computational environment for Java platform. It can be used with different programming languages on different operating systems. Unlike other statistical programs, it is not limited to a single programming language. This software combines the world's most-popular enterprise language, Java, with the most popular scripting language used in data science, such as Jython (Python), Groovy, JRuby.
    Starting Price: $0
  • 23
    DHTMLX

    DHTMLX

    DHTMLX

    ...DHTMLX is also designed with performance in mind. Its components are optimized for fast rendering. A comprehensive and rich API provides a straightforward way to manipulate JavaScript/HTML5 UI widgets. The library has detailed API documentation, tutorials, and examples that help developers quickly get up to speed and start building their apps.
    Starting Price: $79
  • 24
    Enkrypt Wallet
    ...The core component of Enkrypt is a mix-net that protects network traffic meta-data for applications, providing communication privacy that is superior to both VPNs and Tor against global adversaries that can watch the entire internet.
  • 25
    Source Defense

    Source Defense

    Source Defense

    ...The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. ...
  • 26
    Searx

    Searx

    Searx

    ...Searx is a free internet metasearch engine which aggregates results from more than 70 search services. Users are neither tracked nor profiled. Additionally, Searx can be used over Tor for online anonymity. Get started with Searx by using one of the Searx-instances. If you don’t trust anyone, you can set up your own.
  • 27
    SurveyJS

    SurveyJS

    SurveyJS

    SurveyJS is a product family of four open-source JavaScript libraries that provide you with all the advantages of a custom-built in-house survey application while significantly reducing time-to-market and resources required to get the system up and running. The libraries are compatible with most popular JavaScript frameworks and can communicate with any server that can post and get a request in JSON format, which makes them server- and database-agnostic.
    Starting Price: 499/once
  • 28
    JxBrowser

    JxBrowser

    TeamDev

    JxBrowser is a cross-platform Java library that integrates a Chromium-based web browser component into Java applications. It offers a comprehensive API for DOM access, Java-to-JavaScript communication, printing, file downloads, and more. It includes lightweight visual components for Swing, JavaFX, SWT, and Compose Desktop (coming soon) UI toolkits to display HTML, PDF, and WebGL content in Java desktop apps.
    Starting Price: $1799 per Indie license
  • 29
    Bitrise

    Bitrise

    Bitrise

    Bitrise is a CI/CD platform built for mobile development, helping teams speed up builds, automate testing, and deliver high-quality apps faster. It supports native languages like Swift, Objective-C, Java, and Kotlin, as well as cross-platform frameworks including React Native, Flutter, Xamarin, Cordova, and Ionic. Setup takes minutes, with customizable workflows that adapt to any project. Bitrise integrates with GitHub, GitLab, and other industry-standard tools, while its cloud infrastructure removes the need for manual processes or maintenance overhead. ...
    Starting Price: $89/month
  • 30
    ProGuard

    ProGuard

    Guardsquare

    ProGuard: Open Source Optimizer for Java and Kotlin. ProGuard is the most popular optimizer for Java bytecode. ProGuard also provides minimal protection against reverse engineering by obfuscating the names of classes, fields and methods. ProGuard reduces the download and startup time of Android applications and improves their performance on mobile devices. ProGuard obfuscates Java applications and pre-verifies the processed code for Java Micro Edition and for Java 6 and higher. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next