tholian-network / stealth
Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy
☆1,072Updated last year
Alternatives and similar repositories for stealth:
Users that are interested in stealth are comparing it to the libraries listed below
- HiddenVM — Use any desktop OS without leaving a trace.☆2,421Updated 8 months ago
- Youtube and Twitter with privacy.☆464Updated 3 years ago
- Firefox Reader View as a command line tool☆866Updated 5 months ago
- Access files on the decentralized, unblockable torrent swarm and visit links using Handshake domains. Decentralized internet is here.☆587Updated 3 years ago
- 💾 dn - offline full-text search and archiving for your Chromium-based browser.☆3,823Updated last month
- A 1-1 end-to-end encrypted internet pipe powered by Hyperswarm☆519Updated last year
- Web clipper browser extension for saving highlights, screenshots, and automatically extracting content from web pages.☆372Updated 3 years ago
- Hide your scrapers IP behind the cloud. Provision proxy servers across different cloud providers to improve your scraping success.☆1,443Updated 3 weeks ago
- A Firefox extension to protect from being fingerprinted.☆1,284Updated 2 weeks ago
- a censorship resistant deadman's switch☆522Updated last year
- Lockdown your linux install. The simple zero config linux hardening script☆365Updated 4 years ago
- DataHen Till is a companion tool to your existing web scraper that instantly makes it scalable, maintainable, and more unblockable, with …☆814Updated 3 years ago
- Privacy Possum makes tracking you less profitable☆766Updated 2 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,261Updated 3 weeks ago
- nFreezer is an encrypted-at-rest backup tool.☆305Updated 2 years ago
- Web Extension: Easily find Hacker News discussions about the page you're currently browsing.☆268Updated last month
- Free, open-source, decentralized and encrypted filesharing.☆113Updated 2 years ago
- Aether client app with bundled front-end and P2P back-end☆1,240Updated last year
- Create fake phone contacts, to do data-poisoning.☆562Updated 4 years ago
- TUI Client for Torrent Paradise☆211Updated 3 years ago
- Forget the past. Social Amnesia makes sure your social media accounts only show your posts from recent history, not from "that phase" 5 y…☆802Updated last year
- Key management is hard☆917Updated last year
- dgit adds decentralized ownership to git - powered by Tupelo DLT and Skynet☆208Updated 4 years ago
- Librefox: Firefox with privacy enhancements☆1,754Updated 4 years ago
- InterPlanetary Wayback: A distributed and persistent archive replay system using IPFS☆625Updated 3 weeks ago
- ✨ Hacker News, but refined — Interface tweaks and features to make the HN experience better☆819Updated last year
- Extract and decompose (fuzzy) URLs (including emails, which are conceptually a part of URLs) in texts with Area-Pattern-based modularity☆351Updated 2 months ago
- A research-based pihole list to reduce tracking by Apple and Google☆317Updated last year
- Quickly build microservices using p2p networking in NodeJS/Go.☆650Updated 3 years ago
- A web extension to block browser fingerprinting (Manifest V2)☆356Updated last year