Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Whonix

Compare

  No analysis available

Whonix is an anonymous general purpose operating system based on Virtual Box, Debian GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.

0 lines of code

3 current contributors

0 since last commit

3 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: gpl3_or_l...

bisq

Compare

  Analyzed 4 months ago

Bisq is a safe, private and decentralized way to exchange bitcoin for national currencies and other digital assets. Bisq uses peer-to-peer networking and multi-signature escrow to facilitate trading without a third party. Bisq is non-custodial and incorporates a human arbitration system to resolve disputes.

442K lines of code

127 current contributors

4 months since last commit

2 users on Open Hub

Activity Not Available
4.5
   
I Use This

spreadit.io

Compare

  Analyzed 1 day ago

link sharing and bullshit aggregator

36.4K lines of code

0 current contributors

almost 9 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

torsocks

Compare

  Analyzed about 15 hours ago

Torsocks: use socks-friendly applications with TorTorsocks allows you to use most socks-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you're using. Torsocks is known to work on Linux and some ... [More] distributions of Unix. Mac OSX is currently not supported. Once you have installed torsocks, just launch it like so: usewithtor [application]So, for example you can use ssh to a some.ssh.com by doing: usewithtor ssh username @ some.ssh.com or launch pidgin by doing: usewithtor pidgin An alternative to usewithtor is torsocks: torsocks pidginThe tables below list applications that usewithtor/torsocks will send through Tor. At the moment a 100% guarantee of safe interoperability with Tor can only be given for a few of them. This is because the operation of the applications and the data they transmit has not been fully researched, so it is possible that a given application can leak user/system data at a level that neither Tor nor torsocks can control. The following administrative applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments ssh M Y Potential for identity leaks through login. telnet M Y Potential for identity leaks through login and password. svn M Y gpg M Y gpg --refresh-keys works well enough. The following messaging applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments pidgin M Y Potential for identity leaks through login and password. kopete M Y Potential for identity leaks through login and password. konversation M Y Potential for identity leaks through login and password. irssi M Y Potential for identity leaks through login and password. silc M Y Potential for identity leaks through login and password. The following email applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments claws-mail M Y http://rorschachstagebuch.wordpress.com/2008/11/02/claws-mail-zweit-profil-fur-tor/ thunderbird N Y Probable identity leaks through javascript, mail headers. Potential for identity leaks through login, password. The following file transfer applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments wget N Y Probable identity leaks through http headers. Privoxy and polipo a better solution. ftp M Y Passive mode works well generally. Table legend: DNS: DNS requests safe for Tor? N - The application is known to leak DNS requests when used with torsocks. Y - Testing has shown that application does not leak DNS requests. 100% Safe: Fully verified to have no interoperability issues with Tor? N - Anonymity issues suspected, see comments column. M - Safe enough in theory, but either not fully researched or anonymity can be compromised through indiscreet use (e.g. email address, login, passwords). Y - Application has been researched and documented to be safe with Tor.Differences between torsocks and tsocksA complete history of changes is maintained in the Changelog. The initial working copy of torsocks was obtained through the following steps in June 2008: Tsocks was downloaded from the project's sourceforge repository. All patches listed at TSocksPatches in March 2008 were applied. In particular, the patch from Total Information Security that hooks DNS requests and passesthem to Tor. The original link for this patch is now dead and the authors are no longer available at the email addresses supplied in the patch's source. Weasel's getpeername() patch and some build-related patches from Ruben Garcia were applied. All references to tsocks in the project source files were renamed to torsocks. The project was then migrated to an automake/autoconf build system. To help with reconstructing the above steps a list of applied patches is available in the patches subdirectory of the torsocks source tree. Enhancements unique to torsocksThe first release of torsocks contained the following enhancements: Torifying reverse dns requests through gethostbyaddr() Blocking of UDP traffic from sendto() and its variants. Use of Tor-friendly defaults if no configuration file available. The addition of all RFC defined private address ranges to the default configuration. [Less]

8.94K lines of code

2 current contributors

7 months since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This
Tags proxy socks tor

txtorcon

Compare

  Analyzed about 15 hours ago

Twisted-based asynchronous Tor control protocol implementation. Unit-tests, abstractions for Tor's state, launch Tor instances. Twisted endpoint support.

18.3K lines of code

3 current contributors

almost 4 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

BitWasp

Compare

  Analyzed 1 day ago

BitWasp Marketplace is a light weight, completely open source, anonymous bitcoin marketplace specifically built for use in conjunction with Tor or I2P via the hidden services such as .onion websites and eepsites (for I2P).

261K lines of code

0 current contributors

over 6 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: No declared licenses

PyLoris

Compare

  Analyzed 1 day ago

PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.

951 lines of code

0 current contributors

over 10 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This

torchecker

Compare

  Analyzed about 18 hours ago

node package that checks whether a request is coming from a tor exit node.

101 lines of code

0 current contributors

over 7 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This

Torride TOR Ram-based Init DEbian filesystem.

Compare

  No analysis available

TOR Ram-based Init DEbian filesystem. This tool, based on the Debirf, is designed to make it dead simple to run tor on spare machines you have lying around.

0 lines of code

0 current contributors

0 since last commit

1 users on Open Hub

Activity Not Available
5.0
 
I Use This
Mostly written in language not available
Licenses: No declared licenses
Tags live tor

scotty transporter

Compare

  Analyzed 1 day ago

Scotty is a free opensource proxy software for bypassing filter and censorship systems. A free and unrestricted web is one of the most important values our society has. This software helps people who are victims of censorship of governments or private organizations.

9.84K lines of code

0 current contributors

over 9 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This