Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for anonymity
anonymity
x
281 search results found
Mbp Tails
⭐
9
How to get Tails working on T2 Apple device (e.g. 2019 MacBook Pro) without needing external keyboard/mouse.
Tor2proxy
⭐
9
Arcturus
⭐
9
A pure rust implementation of Arcturus proofs for confidential transactions.
Darkspeak
⭐
9
Secure Instant Messenger over the Tor network
Whirlpool_stats
⭐
9
Set of python scripts allowing to compute Whirlpool statistics
Torghost
⭐
9
This toll is For Kali Linux. This is powerful tool that can connect your whole pc with tor network. Forgot the Tor Browser. Now you can use even apt-get install something ANONYMOUSLY
Badproxy
⭐
9
BadProxy is the tool which show a man in middle attack over the internet over the proxy
Tor Everything
⭐
9
Simple FREE guide to set up TOR stealth and persistence with complete anonymity.
Torcontrol
⭐
9
OCaml client library for the Tor control port [abandoned]
I2p Browser
⭐
8
The I2P Browser source code
Docker Tor
⭐
8
Run TOR conveniently from a docker container.
Instagram Bruteforce
⭐
8
instagram-bruteforce-attack
Whirl
⭐
8
🌀 Fun, anonymous chats with random members of your Slack
Pwnedapi
⭐
8
Library for easily interfacing with Have I Been Pwned API v2
Ozcoin
⭐
8
Anonymous + Confidential Cryptocurrency
Documentation And Guides
⭐
8
All documentation and guides for software provided by Duality Blockchain Solutions
Privacy Project
⭐
8
Make your devices yours. - A decalogue of things to do to increase privacy on the Internet.
Linkedtales.github.io
⭐
8
data statistics from professionals
Mac Camo
⭐
8
👤 Disguise your MAC Address as that of any manufacturer as you want.
Secretpeek
⭐
8
Anonymity is taken Seriously. It is a webpage to confess your secrets.
Pqm Client
⭐
8
Quantum-safe anonymous encrypted emails
Kabutops
⭐
8
Dead simple yet powerful Ruby crawler for easy parallel crawling with support for an anonymity.
Datascienceresources_draft
⭐
8
NOTE: migrating to ebook form at https://github.com/MonkmanMH/DataScienceResources
Dpow Blur
⭐
8
A rewrite of Komodo's Delayed Proof of Work mechanism for compatibility with The Blur Network (BLUR) and, by extension, all RingCT-capable coins. An attempt at the first-ever cross-chain security mechanism between XMR, ZEC, and BTC worlds.
Aiootp
⭐
8
An asynchronous pseudo one-time pad based crypto and anonymity library.
F.a.g.u.t
⭐
7
Glitch/Compress Your Webcam & Microphone To Obscure Your Identity Or Whatever
Proxychecker
⭐
7
Check proxies anonymity
Tor
⭐
7
Privacidad y anonimato en línea - América Latina
Data Anonymization
⭐
7
K-anonymity and l-diversity implementation
Bye_vk
⭐
7
Удаление своей активности из социальной сети ВКонтакте
Pretsa
⭐
7
Event log preprocessing for privacy-aware process discovery
Instanon
⭐
7
🖼 Download Instagram stories or highlights anonymously
Qubes Tor
⭐
7
DEPRECATED . DO NOT USE . torified proxyvm for QubesOs
My Anonymity
⭐
7
Practices of resistance as well as activism, civil disobedience, conspiracy, countercultural articulations, crypsis, denial, disbelief, disruptive action, dissidence, insurgency, issurection, masquerade, mimicry, mistrust, omerta, subversion.
Awesome Health Data Anonymity
⭐
7
医疗数据的匿名化研究
Prism Overlay
⭐
7
Overlay for apps related to secure communication, cryptography and anonymity
Wildfire
⭐
7
Anonymous P2P messaging app for Android
Constrainted_fingerprinting
⭐
7
Code repository for paper entitled as 'Near-Optimal Fingerprinting with Constraints'
Spark Privacy Preserver
⭐
7
Anonymizing Library for Apache Spark
Txmix
⭐
7
twisted python mix network library
Understeem
⭐
7
A fork of Steemit, with anonymity features
Tor Traffic Labeling
⭐
6
Labeling traffic inside Tor anonymity network
Pbot
⭐
6
command line version of proxybot; you can either scrape for a new proxy, check if existing proxies are up, or check the anonymity level of a proxy
Location Privacy Protection
⭐
6
Location Privacy Protection System Based on K-Anonymous
Lethe
⭐
6
Secure self-destructing messaging service for the privacy conscious user. Designed to be deployed over anonymity networks such as Tor and I2P.
Retro Ken
⭐
6
A slack bot for doing retrospectives with the team
Paranoidhack
⭐
6
This is a repository to provide documentation on anonymity.
Isitpwned
⭐
6
Provides a simple interface (netstandard1.3 and .net461) to the I Have Been Pwned V2 breached password endpoint using the enhanced anonymity provided by the k-Anonymity method (/range endpoint). See Troy Hunt's blog for more details (https://www.troyhunt.com/ive-just-launched-pwned-
Ip_proxy_pool
⭐
6
使用 Django2 作为接口后端,scrapy 作为爬虫的一个代理 IP 池
Fak3r.com
⭐
6
This repository contains the source code for my long running blog, fak3r, since 2005.
Tsunami
⭐
6
An Experimental BitTorrent Client. Ignore this for now.
Anon Meta Packages
⭐
6
Meta Packages for Anonymity Distributions - Selections of packages required/recommended to have installed on Anonymity Distributions.
Pwnedpasswords
⭐
6
A client for HaveIBeenPwned.com's compromised passwords API. Written in Swift, with no dependencies.
Androidanonymitychat
⭐
6
A secure and serverless chat application that uses the TOR network (Deep Web) to send the messages
Goodproxy
⭐
6
A Multithreaded Proxy Checker With Anonymity Analysis
Torgap
⭐
6
Torgap architecture & products
Python_dark_web
⭐
5
python_dark_web
Tor2tun
⭐
5
tor2tun
Elli
⭐
5
Kote
⭐
5
😽 kote: Invisible Messaging
Armr
⭐
5
Private from the ground up, designed around security and anonymity.
Milenage
⭐
5
MILENAGE algorithm for Node.js
Mac_changer
⭐
5
Change the MAC addres of the connection and become anonymous untill the connection fails. #MAC
Flinkanonymity
⭐
5
The aim of the research project is to investigate the potential in using Apache Flink's strengths of parallelizing data streams, in order to anonymize streamed data according to the K-Anonymity and L-Diversity models.
Insta Onion
⭐
5
insta-onion: Create a Tor Onion service in 20 seconds
Anomy
⭐
5
Anomy is a Tor anonymiser to aid in Threat Intelligence and Malware Analysis Investigations.
1m5 Core
⭐
5
DEPRECATED. See https://github.com/1m5/1m5
Stats
⭐
5
Pokémon Showdown battle log processing and usage stats generation logic
Subshard
⭐
5
Chrome based proxy, built with Golang & Python.
Zeta
⭐
5
A Blockchain and IPFS based WistleBlowing Platform.
Anonml
⭐
5
Anonymous machine learning on the edge.
Packet Headers
⭐
5
A daemon for sniffing and archiving packet headers of all flows for a system.
Silvertunnel Ng
⭐
5
SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network.
Primo
⭐
5
Protocol and software to pay for access using monero mining
Cobalt Strike 4.8
⭐
5
COBALT STRIKE 4.8
Freehp
⭐
5
Providing free http proxies & verifying availability of them
Code
⭐
5
Tools for generating General Data Anonymity Scores (www.gda-score.org)
Aescryptor
⭐
5
Powerful Tool to encrypt and decrypt files using AES.
Myproxy
⭐
5
使用mysql+flask(Restful API风格设计)实现的IP代理池
Anonboot
⭐
5
Proof-of-concept implementation of AnonBoot, our medium to securely bootstrap anonymity services
Prawler
⭐
5
Advanced Proxy Scraper written in Python3
201-281 of 281 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.