[go: up one dir, main page]

Showing 19 open source projects for "anonymous-doser"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • The fastest way to host, scale and get paid on WordPress Icon
    The fastest way to host, scale and get paid on WordPress

    For developers searching for a web hosting solution

    Lightning-fast hosting, AI-assisted site management, and enterprise payments all in one platform designed for agencies and growth-focused businesses.
    Learn More
  • 1
    i2pd

    i2pd

    I2P: End-to-End encrypted and anonymous Internet

    i2pd (I2P Daemon) is a lightweight, full-featured C++ implementation of the I2P (Invisible Internet Project) protocol, designed for enabling anonymous, encrypted, and censorship-resistant communication. It functions as a router node in the I2P network, supporting services like anonymous websites (eepsites), email, file sharing, and secure messaging. i2pd is designed to be resource-efficient and suitable for running on embedded systems or routers while maintaining compatibility with the wider I2P ecosystem.
    Downloads: 40 This Week
    Last Update:
    See Project
  • 2
    S3Proxy

    S3Proxy

    S3Proxy implements the S3 API and proxies requests

    ...Developers can build the project by running mvn package which produces a binary at target/s3proxy. S3Proxy requires Java 8 or newer to run. Configure S3Proxy via a properties file. An example using the local file system as the storage backend with anonymous access. S3Proxy can be configured to assign buckets to different backends with the same credentials. In addition to the explicit names, glob syntax can be used to configure many buckets for a given backend.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Privacy and Anonymity in the Internet

    Privacy and Anonymity in the Internet

    System for anonymous Web browsing

    Our goal is to develop, implement, evaluate and provide a secure and scaleable technical infrastructure for anonymous communication. This project is supported by Deutsche Forschungsgemeinschaft (DFG).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Dimensional Rift OS

    Dimensional Rift OS

    Privacy,Security Focused Distro For I2P

    ... - root0emir _________________________________________________ Dimensional Rift is a Debian-based GNU/Linux distribution focused on privacy and security. The system is built entirely around I2P (Invisible Internet Project), a peer-to-peer (P2P) anonymous communication network.
    Leader badge">
    Downloads: 3 This Week
    Last Update:
    See Project
  • Self-hosted n8n: No-code AI workflows Icon
    Self-hosted n8n: No-code AI workflows

    Connect workflows. Integrate data

    A free-to-use workflow automation tool, n8n lets you connect all your apps and data in one customizable, no-code platform. Design workflows and process data from a simple, unified dashboard.
    Learn More
  • 5
    surge

    surge

    Surge is a p2p filesharing app designed to utilize blockchain

    Surge is a peer-to-peer file-sharing application that leverages blockchain technologies to facilitate anonymous and secure file transfers. It employs end-to-end encryption and a decentralized network to ensure user privacy and data integrity. Surge's design focuses on simplicity and anonymity, making it a suitable choice for users seeking private file-sharing solutions.​
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    MeanOS

    MeanOS

    The smallest and the most powerful operating system.

    The first decentralized, artificially intelligent, MEAN.js stack, operating system. Mean OS is the only operating system hosted anonymous using a P2P network and a suite of non-standard in-browser delivery mechanisms. Mean OS is specifically designed to support both Brave and Tor but is compatible with all other major browsers. Mean OS is Proud to be a BRAVE and TOR supporter, be free!!
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. ...
    Leader badge">
    Downloads: 10 This Week
    Last Update:
    See Project
  • Wiz: #1 Cloud Security Software for Modern Cloud Protection Icon
    Wiz: #1 Cloud Security Software for Modern Cloud Protection

    Protect Everything You Build and Run in the Cloud

    Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
    Learn More
  • 10
    ASProxyWing
    ASProxyWing is a handy, easy to use client / server desktop distributed proxy, which works as a HTTP-tunnel for clients. Provides high secure, easy to integrate proxy servers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    ...Plinko should identify and parse the data completely without the sending system caring what it sent. The latest version supports named fields in the STL files for tagging data parsed in the Prefix Tree and anonymous functions for parsing dynamic message payloads. We now output JSON objects and I'm working on HBase integration. By outputting to JSON it also leaves open the possibility for on the fly in memory correlation between events. Read the included README before starting, it has a quick start guide and info on the constructors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps. NOTE: The ISO is currently VERY out of date! Sorry for my absence. I may try to update the project soon. The SFS file IS up to date as of this change. 03/2013
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    Lazy File Sorter

    This feature rich program sorts files by their extensions.

    ...The binary in the /bin/Linux folder contains a platform independent jar file that should work on macs. Use only version 1.1 or above as 1.0 will not work properly on macs. Anonymous posting is allowed everywhere and is encouraged. Write something! See tickets for known issues and things to be done. If you find any bugs please post them to the forums or create a ticket and please include the OS you are using in your post.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JADIF
    JAva DIstributed Framework provides a secure and flexible Framework for distributed grid and volunteer computing applications (separate client & server Framework). For more informations take a look at the project page http://jadif.sourceforge.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Plone Authentication Plugin (requires PAS) to authenticate users against Microsoft Active Directory, without needing anonymous binds or a fixed username/password to query LDAP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The TorWeb project aims to develop comprehensive web controller interfaces for the Tor Anonymous Internet System's controller specification, providing easy remote maintenance of a Tor server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TunnelTools is a set of perl scripts to allow anonymous rsync and CVS access from machines inside a firewall by tunneling over an ssh connection to a host outside the firewall.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WWW interface to LDAP server allows to administer LDAP directory using WWW interface. It uses certificates a10n, has search, edit, administer capabilities and also anonymous read-only access. wpLDAP depends on Apache, PHP, OpenLDAP and OpenSSL packages
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ANet is a peer-to-peer networking protocol that implements an anonymous distributed network. With a common framework, it allows to do things similar to Gnutella, Freenet, "chat rooms", file transfer protocols, newsgroups, and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next