82 Open Source Anonymity Software Projects
Free and open source anonymity code projects including engines, APIs, generators, and tools.
Onionbrowser 1380 ⭐
An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
I2p.i2p 1102 ⭐
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is a mirror of the official Monotone repository.
Globaleaks 803 ⭐
GlobaLeaks is free, open souce software enabling anyone to easily set up and maintain a secure whistleblowing platform.
Whonix 447 ⭐
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
Dothq Browser 358 ⭐
🌍 Take back your privacy with Dot Browser, the privacy-conscious web browser that protects you from being tracked and monitored online. Based on Firefox.
Tholian Network Stealth 171 ⭐
:rocket: Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy
Conet 72 ⭐
What is possible, not what is What it could be, not what it is A more secure way of doing… everything
Darknet.py 65 ⭐
darknet.py is a network application with no dependencies other than Python and Tor, useful to anonymize the traffic of linux servers and workstations.
Tor_ip_switcher 54 ⭐
tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.
Kali Anonymous 42 ⭐
:bust_in_silhouette: The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.sh` and then it will install and configure Tor, `macchanger`, and the `anonymous` script.
Blur Network Blur 35 ⭐
The Blur Network is a privacy-oriented peer-to-peer network, built upon the premise that privacy is incompatible with centralization. BLUR employs a custom mining algorithm called CryptoNight-Dynamic. Iterations adjust approximately once every five seconds, with a goal of maintaining CPU advantages over specialized mining hardware.
Obscurix 30 ⭐
Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forces all traffic through the Tor network, has support for other networks such as I2P and is hardened a lot for security. All data is lost at shutdown as it is run from RAM.
I2pchat 23 ⭐
🌀 i2pchat's old repo. This repo is deprecated in favor of https://github.com/i2pchat/i2pchat which is now the main repo.
Element Protocol 20 ⭐
The decentralized, completely anonymous, lightweight, peer-to-peer network communication protocol.
Var Cnn 18 ⭐
Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)
Soxy Driver 17 ⭐
A docker networking driver that transparently tunnels docker containers TCP traffic through a proxy
Onion Grater 12 ⭐
Whitelisting filter for dangerous Tor control protocol commands - https://www.whonix.org/wiki/Dev/CPFP - For example it allows using Tor Browser's New Identity feature on Anonymity Distribution Workstations, fixes Tor Browser's about:tor default homepage and Tor Button status indicator without exposing commands that are dangerous for anonymity.
Privacy Preserving Primitives 12 ⭐
primitives and protocols for implementing privacy preserving networks
Uwt 11 ⭐
Use Applications over Tor with Stream Isolation and Time Privacy - for better anonymity / privacy.
Pluracoin 10 ⭐
PluraCoin - Anonymous cryptocurrency with higher resistance against blockchain analysis.
Cloakspace 10 ⭐
An anonymous platform for everyone to share their thoughts freely without the fear of being tracked or the prying eyes of social media.