[go: up one dir, main page]

Showing 25 open source projects for "hide ip"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 1
    Proton VPN Browser Extension

    Proton VPN Browser Extension

    Proton VPN Browser Extension

    The Proton VPN Browser Extension repository houses the code for an official browser extension that lets users quickly secure their web browsing traffic through ProtonVPN from within browsers like Firefox and Chrome without routing all system traffic. This extension provides users with a convenient way to encrypt and anonymize HTTP requests, hide IP addresses, and prevent tracking while browsing, acting independently of the full OS-level VPN clients. Because browser extensions are constrained by browser APIs, this extension focuses on securing in-browser connections, protecting privacy specifically within the browser context rather than across the entire operating system. ...
    Downloads: 53 This Week
    Last Update:
    See Project
  • 2
    Blokada Apps

    Blokada Apps

    Repo for Blokada apps

    ...For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. Available in both Blokada 6 and Blokada 5. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address.
    Downloads: 144 This Week
    Last Update:
    See Project
  • 3
    AIOStreams

    AIOStreams

    One addon to rule them all

    AIOStreams is a “super-add-on” for Stremio that consolidates results from many add-ons and debrid services into a single, customizable feed. Instead of juggling multiple add-ons, you point AIOStreams at them; it then queries, merges, de-duplicates, and re-ranks everything according to your rules. The project includes a powerful filtering and sorting engine—think conditions on resolution, codec, provider, cached status, seed count, and more—so power users can shape results precisely. It also...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 4
    Misago

    Misago

    Misago is fully featured modern forum application

    Misago aims to be a complete, featured and modern forum solution that has no fear to say 'NO' to common and outdated opinions about how forum software should be made and what it should do. Your users may register accounts, set avatars, change options and edit their profiles. They have the option to reset forgotten passwords. Site admins may require users to confirm validity of their e-mail addresses via e-mail sent activation link, or limit user account activation to administrator action....
    Downloads: 16 This Week
    Last Update:
    See Project
  • ACI Learning: Internal Audit, Cybersecurity, and IT Training Icon
    ACI Learning: Internal Audit, Cybersecurity, and IT Training

    Proven skill building for every aspect of your support or IT team.

    Traditional training doesn't equip employees with the practical skills they need to drive business success. ACI Learning provides hands-on IT and cybersecurity training designed to build real-world, on-the-job skills. Our outcome-based programs empower employees with certification prep, industry-recognized credentials, and flexible learning options. With expert-led video training, labs, and scalable solutions, we help businesses, individuals, governments, and academic institutions develop a skilled workforce, align with business goals, and stay ahead in a rapidly evolving digital world.
    Learn More
  • 5
    SPM - Monitoring  system

    SPM - Monitoring system

    Monitoring Tool for your IT Environment

    SPM Monitoring System - Complete Solution for Efficient Monitoring and Alerting SPM Monitoring System is an all-in-one monitoring solution for IT environments that offers comprehensive features to ensure high availability, stability, and optimal performance of your infrastructure. With SPM Monitoring Systems, you can monitor your network, servers, applications, and services with ease, and receive timely alerts when issues arise. Host Availability Monitoring. Agent-Based Monitoring:...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    ZeroNet

    ZeroNet

    Decentralized websites using Bitcoin crypto and BitTorrent network

    ...Page response time is not limited by your connection speed. Real-time updated, multi-user websites. Supports any modern browser on Windows, Linux or Mac platforms. You can easily hide your IP address using the Tor network. Browse the sites you're seeding even if your internet connection is down. Developed by the community for the community. We believe in open, free, and uncensored network and communication.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Ininja

    Ininja

    Maximal protection from computer hacking.

    ...It is necessary for full protection of your personal data and accessibility to websites blocked in your country. It takes just one second, just two clicks to hide your actual location. Proxy autorun. Proxy runs automatically when you open the Chrome browser, there is nothing else should be done. White proxy list. By default proxy runs only for websites added to the white list, so you can visit all other websites from your actual IP-address.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge">
    Downloads: 10 This Week
    Last Update:
    See Project
  • Evertune | Improve Your Brand's Visibility in AI Search Icon
    Evertune | Improve Your Brand's Visibility in AI Search

    For enterprise marketing teams looking for a platform to understand and influence how AI models like ChatGPT recommend their products or services.

    Evertune is the Generative Engine Optimization (GEO) platform that helps brands improve visibility in AI search across ChatGPT, AI Overview, Gemini, Claude and more.
    Learn More
  • 10

    Free Anonymizer hiddenproxies

    Free Anonymizer Which is using proxies of hiddenproxies company

    INFORMATION http://hiddenproxies.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SurfOpenly

    SurfOpenly

    Connect to a vpn server, hide your identity and access every thing.

    SurfOpenly is a reliable and lightweight application designed to help you connect to a VPN server from anywhere in the world. The software allows you to connect to the VPN server in order to navigate the Internet under the server address, instead of your system’s IP, thus protecting your privacy. With SurfOpenly, connecting your station to a VPN server is made easy and safe. A VPN, or a virtual private network is designed to extend a private network across the Internet, using dedicated connections, virtual tunneling protocols or traffic encryption. Navigating the Internet through a VPN presents with several advantages, one of which is that you can hide your system’s IP. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    IP Viewer
    A program that displays information about the adapters on your computer. This includes ip address, MAC address, host name, etc.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    csmake

    csmake

    Cloud Service Make.

    To make the native application to support cloud service, csmake will genarate a client stub and the service application, it's similar with the webservice, COBAR, omniORB, SOAP, gsoap etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Tor Distribution

    This is a distrobution of the Tor Browser. Unblock all blocked sites.

    This distribution is for people who don't have access to torproject.org. If it's blocked, get Tor for free here! Also check out our web site at https://sites.google.com/site/anonymizerinformationcenter. You can learn how to use this great software in school, work, or in repressive countries like China. We offer the Windows, Mac, and Linux versions of Tor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CyberDragon Browser

    CyberDragon Browser

    CyberDragon Browser - privacy enhanced, portable browser

    ... - Ability to Spoof Google PREF cookies if needed - Does not store cookies to hard drive, ever. - Proxy fetcher. Will allow you to fetch high-anonymous proxies that you can use to hide you IP-address with just 2-clicks (one click to fetch proxies and second click to select proxy from the list). Also proxy checker that list working proxies, their latency, country, SSL support and anonymity level is included. - Supports SOCKS5 proxies. Can be used with Tor
    Downloads: 13 This Week
    Last Update:
    See Project
  • 16
    Silver07

    Silver07

    Runescape 2007 / oldschool client with many features.

    Silver 07 - Rs 2007 client made by quho Have you been looking for an RSoldschool client which takes little space and is fast? This is the thing you seek. Silver07 is tiny, fast, simple and clear and has tons of features, such as world select, autotalker, timer, fast hiscores window and autoscreenshotsaving(can be disabled). Doesn't have keyloggers, malware or anything like that. Open source - licenced under GNU GPLv3 http://www.gnu.org/licenses/gpl.html Disclaimer: Runescape...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Baka Admin
    Baka Admin is a modern Soldat Server remote management application for Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    C-Kiosk #1 Anonymous Browser

    Anonymous Web Proxy Server

    C-Kiosk Anonymous Browser is a lightweight web-scripted interface to browse the World Wide Web Anonymously . It is purposefully built to be simple HTTP proxy easy to use. It is used in programs requiring a interface design over a normal web browser.See blocked websites like facebook twitter youtube....Anonymous Web Proxy Server our Pro service will be available soon our product will be available for Android ==================================== V2 Features: Using Webkit HTML5...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    Ripper Rom

    I9305 Custom Rom

    Ripper Rom for the I9305
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Proxychain

    Proxychain

    Surf anonymously: Hide and change your IP with proxychain.

    With proxychain you can easily redirect your webtrafic via multiple SOCKS5 servers and hide your real IP address. Works fine with TOR as first proxy. If you define a second, third, or fourth proxy, nobody will see that you're using TOR.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ...On clicking on the hostname, it will ask for server port number of the host name, then accept message will be displayed on the other user window, if the user accepts, then connection will be established. It also displays a talk dialog window. The talk dialog consists various features like send instant message, write and send, send and close, hide, save, open etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Soundbox
    Soundbox is a radio system application for IP.Board that displays your SHOUTcast Radio on the community, and manage it through AdminCP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Danny's Tool Box
    A useful Multi-function Tool box. Clean Up System Drive, Print Task Quick Cancle,Schedule Auto Shutdown Computer,Schedule Auto Run Programs or Open files,IE (Internet Explorer) Repair and more funtion...(Only For Windows XP Vista Win7 X86 and X64)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine by cleaning or modifing the intruder's ip from all the logfiles in /var bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    FilterDriver

    File activities monitor and file access control, file encryption

    ...Protect the sensitive files, you can verify the user identity, authenticate them, authorize the file access, prevent the confidential files from being accessed, modified, renamed, deleted, or read by unauthorized users, you also hide your sensitive files to the unauthorized users, protect intellectual property from being copied.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next