Privacy
Resources.
“These are tools. What's interesting is what you do with it.”
0 curated tools
AI & Local LLM
Ollama
Run open-source LLMs locally
Run open-source LLMs locally with one command. Query your private documents or generate sensitive code on an air-gapped machine without any data leaving your machine.
Query your private documents or generate sensitive code on an air-gapped or hardened MacBook without any data leaving your machine.
Jan AI
Open-source ChatGPT alternative, runs offline
Open-source desktop app to run and manage local LLMs easily. Daily private research and writing while keeping the option for optional cloud fallback.
Daily private research and writing while keeping the option for optional cloud fallback without permanent storage of prompts.
Open WebUI
Self-hosted web UI for local LLMs
Self-hosted beautiful web UI for any local LLM (Ollama, etc.). Deploy your own private ChatGPT-like interface on a home server.
Deploy your own private ChatGPT-like interface on a home server for family or trusted team use.
LM Studio
Discover and run LLMs locally
User-friendly desktop app for discovering, downloading and running LLMs with GPU support.
Test multiple models locally before choosing one for long-term sensitive workflows.
PrivateGPT
Chat with your own documents
Chat with your own documents using fully local LLMs. Zero risk of leakage for confidential contracts, medical files or personal notes.
Analyze confidential contracts, medical files or personal notes with zero risk of leakage.
Duck.ai
AI search powered by DuckDuckGo
DuckDuckGo's AI search that combines real-time web results with AI-powered answers. No tracking, no profile building.
Private AI-assisted search for security research without query history correlation.
Xprivo
Privacy-focused LLM assistant
Privacy-first AI assistant. No data retention, no training on user data, zero-knowledge architecture.
Draft security reports, incident analysis, and sensitive documentation with full privacy guarantees.
Communication
Signal
Gold standard for encrypted messaging
The gold standard for end-to-end encrypted messaging. Open-source protocol, minimal metadata retention.
Primary secure channel for team communications, incident coordination, and sharing time-sensitive security alerts.
Session
Anonymous messenger, no phone number required
Decentralized messenger with no phone number or email required. Routes messages through an onion network.
Anonymous communication channel for whistleblowers, confidential sources, and high-risk operational coordination.
Element / Matrix
Self-hostable encrypted communication
Self-hostable team communication platform built on the Matrix protocol with end-to-end encryption and federation.
Self-hosted SOC chat platform with full message encryption, audit trails, and bridging to other secure channels.
Threema
Swiss encrypted messenger, phone-number-free
Swiss-made end-to-end encrypted messenger that requires no phone number or email. Open-source audited client with minimal data collection.
European alternative to Signal for teams requiring Swiss jurisdiction, no phone-number linking, and full auditability.
Meshtastic
Open-source mesh networking for off-grid communication
Open-source mesh radio network for off-grid, encrypted text communication without cellular or internet.
Off-grid team communication during on-site assessments, red team exercises, and emergency response scenarios.
Cape
Privacy-first mobile carrier
Privacy-focused cell phone service with encrypted calls, disappearing call logs, secure roaming, and minimal data retention. Built in partnership with Proton.
Secure mobile communications for high-risk operations, field teams, and clients requiring elevated threat protection against surveillance.
Crypton.sh
Encrypted SMS & virtual phone numbers
End-to-end encrypted SMS service using real physical SIM cards with zero-access encryption and personal keypair. No email required for signup, TOR support, open-source encryption module. Also offers virtual numbers, Crypton Travel eSIM in 145+ countries, email aliases, and a powerful REST API. Accepts crypto (XMR, BTC, ETH) and credit cards.
Anonymous phone numbers for account verifications, 2FA, and secure messaging without linking personal identity. Ideal for burner setups, operational security, and high-risk communications.
Encrypted Mail
Proton Mail
Swiss encrypted email
Swiss-based encrypted email with zero-access encryption, open-source clients, and optional anonymous signup. Includes calendar, drive, and VPN suite.
Primary secure email for client communications, encrypted file sharing for sensitive reports, and anonymous account registration.
Tuta
German end-to-end encrypted email
German-based encrypted email with full end-to-end encryption for subject lines, body, and attachments. Open-source, no tracking, and GDPR-compliant.
Alternative to Proton with stricter encryption defaults. Ideal for EU-based operations requiring subject line encryption.
Mailfence
Belgian privacy-focused email
Belgian-based encrypted email with PGP support, zero-access encryption, and integrated calendar, documents, and drive. No ads, no tracking.
European-hosted email with custom domain support. Good for operational aliases and team communication with PGP compatibility.
StartMail
Private email from Startpage creators
Dutch-based encrypted email from the creators of Startpage. PGP integration, disposable aliases, and custom domain support. No personal data required for signup.
Burner alias generation for operational security. Custom domain hosting for anonymous team communication infrastructure.
Security
Bitwarden
Open-source password manager
Open-source password manager with zero-knowledge encryption, self-hosting support, and cross-platform sync.
Self-hosted vault for managing client credentials, API keys, and operational access tokens with full audit control.
KeePassXC
Local encrypted password manager
Local, offline password manager with strong AES-256 encryption. No cloud dependency, full data control.
Air-gapped credential storage for high-value accounts, root passwords, and offline access to critical infrastructure.
VeraCrypt
Disk encryption software
Open-source disk encryption for full volumes, partitions, or virtual encrypted disks. Supports plausible deniability.
Encrypt forensic images, sensitive case files, and portable drives used during on-site security assessments.
Cryptomator
Client-side cloud encryption
Open-source client-side encryption for cloud storage. Zero-knowledge, transparent encryption before upload to Google Drive, Dropbox, OneDrive, etc.
Encrypt sensitive client files before cloud sync. Protect proprietary code, credentials, and documentation stored in Dropbox/Google Drive.
Objective-See
macOS security tools
Free open-source macOS security tools including malware detection, firewall monitoring, and persistence analysis.
macOS endpoint hardening and malware detection for team workstations and forensic analysis on Apple hardware.
VirusTotal
URL & file scanner
Multi-engine file and URL scanner aggregating results from 70+ antivirus engines and domain reputation services.
Rapid threat intel triage for suspicious files, URLs, and hashes encountered during incident response and investigations.
urlscan.io
URL scanner & threat intel
Automated URL analysis tool that screenshots web pages and extracts IOCs. Free tier allows 10 scans/day, API available.
Quick triage of suspicious links - captures screenshot, scripts, cookies, and domain info for threat assessment.
Bitdefender
Enterprise endpoint protection
Romanian cybersecurity company providing advanced endpoint detection, network threat prevention, and cloud security for enterprises.
Enterprise endpoint protection for client infrastructure, managed detection & response, and compliance hardening.
Cover Your Tracks
Browser fingerprint analyzer (EFF)
EFF's browser fingerprinting test to measure how uniquely identifiable your browser configuration is online.
Validate browser hardening configurations and verify anonymity posture before conducting sensitive OSINT operations.
DNS Checker
Global DNS propagation checker
Global DNS propagation checker to verify DNS records across multiple servers worldwide.
Verify DNS changes during infrastructure migrations and detect potential DNS hijacking or poisoning attempts.
MetaDefender
Multi-engine malware analysis
Multi-scanning malware analysis with 70+ AV engines. Deep packet inspection and threat intelligence aggregation.
Analyze suspicious files with 70+ AV engines and AI behavioral analysis before deployment.
AlienVault OTX
Threat intelligence platform
Open threat intelligence platform with pulse indicators, malware analysis, and collaborative threat research from global users.
Query IOC databases during incident response, track threat actor campaigns, and contribute to community threat intel.
URLhaus
Malware URL database
Swiss project tracking malware distribution URLs. Focuses on collecting and sharing URLs used for malware distribution.
Check suspicious URLs against known malware distribution sites. Quick triage for phishing and malware URLs in client investigations.
Hybrid Analysis
Malware sandbox analysis
Free malware analysis service using sandbox execution. Submits samples for behavioral analysis and provides detailed reports.
Analyze suspicious binaries, documents, and links in sandbox. No account required for basic analysis.
ANY.RUN
Interactive malware sandbox
Interactive online malware sandbox with real-time process monitoring. Allows full interaction with malware during execution for detailed behavioral analysis.
Interactive analysis for complex malware. Stealth sandbox option available. Good for live malware behavior observation.
Hardware
Yubico
Hardware security keys
FIDO2/WebAuthn hardware keys for phishing-resistant authentication. Used by major tech companies and governments worldwide.
Secure your accounts with hardware 2FA that cannot be compromised by phishing or keyloggers.
Nitrokey
Open-source hardware keys
European-made open-source hardware security keys. Supports FIDO2, PGP, and TOTP. No proprietary cloud dependency.
Privacy-respecting alternative to Yubikey with fully open-source firmware and hardware designs.
Protectli
Hardware firewall appliances
Fanless mini PCs running VyOS or OPNsense. Dedicated hardware firewall for home or office network security.
Replace consumer routers with enterprise-grade firewall hardware for complete network control.
GL.iNet
Privacy travel routers
Mini travel routers with OpenWrt, built-in VPN clients, and DNS filtering. Create a secure network anywhere.
Secure all your devices on untrusted networks with your own VPN-protected router while traveling.
LilyGO
ESP32 dev boards & pentest hardware
Manufacturer of affordable ESP32-based development boards including T-Embed, T-Deck, T-Watch, and T-Display series. Popular platforms for running offensive security firmware like Bruce. Integrated displays, keyboards, CC1101 radios, and USB-C in compact form factors.
Hardware platform for portable red team tools. T-Embed CC1101 and T-Deck are ideal hosts for Bruce firmware — built-in screens, keyboards, and RF modules.
Firewalla
Smart firewall & DNS
Smart home firewall with built-in VPN, DNS filtering, and network monitoring. Protects all devices including IoT.
Network-wide protection for home users with easy VPN setup and ad/tracker blocking.
OnlyKey
PIN-protected hardware key
Open-source hardware security key with PIN entry on the device itself. Supports FIDO2, TOTP, PGP, and offline password storage. Brute-force self-destruct after 30 failed PIN attempts. Firmware is fully auditable and runs on ESP32.
High-assurance hardware key for field operations where physical coercion is a threat. PIN on device prevents forced authentication.
Mosequipment
Faraday bags & RF shielding
French manufacturer of high-quality Faraday bags, RF shielding pouches, and signal-blocking cases. Protects devices against remote wiping, tracking, and RF interception. Tested and certified shielding effectiveness across GSM, GPS, Wi-Fi, and Bluetooth frequencies.
Secure device isolation during field operations — prevent remote wiping, block RF tracking, and secure phones/radios when entering sensitive facilities.
SoloKeys
Open-source hardware security keys
Open-source FIDO2/WebAuthn security keys with fully transparent firmware. Supports FIDO2, U2F, and GPG. Available in USB-A, USB-C, and NFC form factors. Firmware is publicly auditable and community-reviewed. Solo V2 and Somu (NFC-only) models available.
Phishing-resistant hardware 2FA with fully open-source firmware. Ideal for security-conscious users who want auditable keys without proprietary black-box firmware.
Browsing
DuckDuckGo
Private search engine
Search engine that doesn't track your queries, build profiles, or serve personalized results. No cookies, no logging.
Default search for all operational devices to prevent query profiling during OSINT and research.
Startpage
Anonymous search with Google results
European search engine delivering Google results without tracking. No cookies, no logging. Features Privacy Proxy for anonymous browsing.
Alternative for operational research. Privacy Proxy hides your IP from target sites.
Tor Browser
Onion-routed anonymous browsing
The original onion-routed browser for anonymous web access. Defends against traffic analysis and network surveillance.
Anonymous OSINT, dark web threat intel, and accessing .onion services for security research.
Whonix
Tor-based OS for anonymity
Security-focused OS that forces all connections through Tor using a gateway/workstation architecture. Provides network leak protection.
Isolated anonymous workspace for high-risk investigations, leak analysis, and sensitive research operations.
Browserling
Live browser testing
Live interactive browser testing in the cloud. Test across different browsers, OS, and screen resolutions without local VMs.
Cross-browser testing for security tools, XSS verification, and phishing page rendering analysis.
Mullvad Browser
Privacy-focused browser (with Tor Project)
Privacy-first browser developed with Tor Project. Private mode enabled by default, fingerprinting resistance via letterboxing, no telemetry. Works with any VPN.
Daily browsing with VPN. Blocks trackers, resists fingerprinting. No data collected, no account required.
Brave
Privacy-first browser with ad blocker
Privacy-first browser with built-in ad blocker, script blocker, and fingerprinting protection. Blocks trackers by default, offers Tor private windows.
Everyday browsing with strong tracker blocking. Good balance of privacy and compatibility.
LibreWolf
Privacy-hardened Firefox fork
Firefox fork focused on privacy and freedom. Removes telemetry, strengthens fingerprinting protection, includes uBlock Origin.
Privacy-focused daily browser. No Mozilla account required, strong anti-fingerprinting.
Kameleo
Anti-detect browser for multi-accounting
Advanced anti-detect browser with real fingerprint profiles from actual devices. Supports desktop and Android mobile emulation. Unlimited profiles.
Multi-account management on social platforms, e-commerce, and affiliate marketing. Uses real device fingerprints to bypass detection.
Octo Browser
Anti-detect browser with fingerprint spoofing
Anti-detect browser with high-quality fingerprint spoofing at Chromium kernel level. Passes Pixelscan, BrowserLeaks, Whoer. Supports mobile fingerprints, API automation.
Multi-accounting for social media, e-commerce, and automation. Team collaboration, cookie management, and integrated proxy shop.
Ahmia
Tor hidden service search engine
Search engine for Tor hidden services (.onion sites). Open-source, indexes clearnet-accessible .onion addresses, and filters illegal content. Provides anonymity-friendly search for the Tor network.
Discover and verify legitimate .onion services during OSINT investigations and dark web threat intelligence research.
Operating Systems
Qubes OS
Security-by-compartmentalization OS
Security-focused OS that uses virtualization to isolate your digital life into secure compartments called "qubes." If one qube is compromised, the others remain safe. Uses Xen hypervisor for strong isolation between domains.
High-security computing environment for sensitive operations. Separate qubes for banking, work, browsing. Disposable VMs for untrusted files.
Tails
Amnesic live OS for anonymity
Portable OS that runs from a USB stick without leaving any trace on the computer. All traffic routed through Tor, no data saved after shutdown (amnesic). Based on Debian with privacy tools pre-installed.
Anonymous field operations, whistle-blowing, untrusted computers. Leaves zero trace on host machine.
Parrot Security
Debian-based security distro
Debian-based Linux distro for ethical hacking, penetration testing, and digital forensics. Includes 600+ pre-installed security tools. Available in Security and Home editions. Lightweight and privacy-focused.
Penetration testing, vulnerability assessment, red team operations. Home edition for everyday privacy.
Security Onion
Network security monitoring
Distro for network security monitoring, intrusion detection, and log management. Includes Suricata, Zeek, Wazuh, TheHive, and Playbook. Full SOC platform for blue team operations.
Blue team monitoring, incident response lab, SOC deployment, threat hunting.
UTM
Virtual machines for macOS/iOS
Full-featured system emulator and virtual machine host for macOS and iOS based on QEMU. Uses Apple's Hypervisor framework for near-native performance. Supports x86_64, ARM64, RISC-V, and dozens of other architectures.
Isolated testing environments on Mac. Run Windows, Linux, legacy OS in sandboxed VMs. macOS VM support for developers.
Pentesting
Flipper Zero
Portable multi-tool for pentesters
All-in-one portable multi-tool for pentesting, hardware hacking, and RFID/NFC analysis. Features sub-GHz frequency analysis, RFID cloning (125kHz, 13.56MHz), NFC, iButton, infrared remote control, BadUSB, and GPIO for custom hardware interfacing. Extensive open-source ecosystem with custom firmware (Xtreme, Unleashed, RogueMaster).
Physical pentesting toolkit for access control assessment — RFID badge cloning, infrared signal replay, sub-GHz brute-force, and BadUSB payload delivery during on-site engagements.
Bruce Firmware
Offensive ESP32 firmware for red team ops
Open-source ESP32 firmware for offensive security and red team operations. Runs on M5Stack Cardputer, LilyGo T-Embed, and other ESP32 devices. Features Wi-Fi attacks (deauth, evil portal, beacon spam), BLE attacks, BadUSB/DuckyScript payloads, RFID/NFC cloning via PN532, Sub-GHz RF via CC1101, IR tools, and more. AGPL-licensed with fully open hardware designs.
Portable red team toolkit for physical assessments — Wi-Fi deauth testing, BadUSB payload delivery, RFID/NFC cloning, and RF replay attacks. Low-cost Flipper Zero alternative (~$40-65).
Shodan
IoT & exposed service search engine
The search engine for internet-connected devices. Scans and indexes every publicly accessible service: webcams, routers, servers, industrial control systems, and more. Filter by port, country, OS, product, or vulnerability.
Reconnaissance phase of penetration testing — discover exposed services, identify vulnerable devices, and map client attack surface from the outside.
Pentagi
AI-powered pentesting platform
AI-driven penetration testing platform that automates vulnerability discovery, exploitation chains, and reporting. Combines machine learning with traditional pentest methodologies for faster, deeper assessments.
Accelerate pentest engagements with AI-assisted vulnerability chaining and automated proof-of-concept generation.
Penligent
Autonomous attack simulation
AI-powered breach and attack simulation platform. Continuously tests defenses with realistic adversary tactics, techniques, and procedures (TTPs). Maps findings to MITRE ATT&CK framework.
Continuous security validation between pentests. Measure detection coverage and response readiness against real-world attack patterns.
PentestGPT
AI-assisted pentest companion
GPT-powered penetration testing assistant that guides through the testing methodology. Provides real-time suggestions for enumeration, exploitation, and post-exploitation based on context and findings.
Interactive pentest assistant for methodology guidance, command suggestions, and lateral movement strategy during engagements.
Kali Tools
Directory of 600+ security tools
Official Kali Linux tools directory — 600+ penetration testing and security tools organized by category: information gathering, vulnerability analysis, exploitation, wireless attacks, reverse engineering, and more. Each tool has documentation and package details.
Find the right tool for each pentest phase. Browse by attack category or search for specific techniques. Reference for tool installation and usage.
Lab401
Hardware hacking & pentest gear
European retailer specializing in hardware hacking and cybersecurity equipment. Stocks Flipper Zero, Proxmark3, ChameleonUltra, HackRF, RTL-SDR, BadUSB devices, RFID/NFC tools, lockpicks, WiFi deauthers, and development boards. Ships from France with EU/UK coverage.
One-stop shop for hardware pentesting equipment — RFID cloning tools, SDRs, BadUSB devices, and RF analysis gear for physical assessments and red team ops.
Anonymity
OnionShare
Anonymous file sharing via Tor
Secure, anonymous file sharing and website hosting over the Tor network with no central servers.
Secure transfer of forensic evidence, large log files, and sensitive documents to clients or legal counsel.
Silent.link
Anonymous eSIM & data
Anonymous eSIM data plans with crypto payment support and no personal information required.
Anonymous mobile connectivity for field operations, travel security, and isolated network access.
GrapheneOS
Hardened Android OS with enhanced security
Hardened Android OS with enhanced privacy, security, and sandboxing. Designed for Pixel devices.
Secure mobile platform for field operatives, mobile pentesting, and running sensitive security apps in hardened sandboxes.
NadaNada
No-KYC eSIM & VPN provider
No-KYC eSIM and VPN services for anonymous mobile connectivity without identity verification.
Anonymous mobile data for field operations, burner device provisioning, and untraceable network access.
VoidMob
Mobile proxies, SMS & eSIM unified
Real 4G/5G mobile proxies from carrier networks, carrier-based SMS verifications, and global eSIMs unified in a privacy-focused, crypto-friendly platform. No KYC required, 99.9% uptime, API access with MCP support for AI agents. Pay with BTC, ETH, SOL and more.
Mobile proxy IPs for geo-obfuscation during remote assessments, anonymous SMS verification for account creation, and untraceable eSIM data for field operations — all from one dashboard.
VPN / DNS
Mullvad VPN
Anonymous VPN, no account needed
Privacy-first VPN with anonymous account creation (no email required), crypto and cash payment options, and strict no-logs policy independently audited. WireGuard and OpenVPN on 500+ servers across 40+ countries.
Primary VPN for operational traffic and geo-obfuscation during remote assessments. Anonymous payment with Monero for non-attributable subscriptions.
NymVPN
Mixnet-based VPN for anonymity
Next-generation VPN built on a mixnet architecture (Nym network), providing stronger anonymity guarantees than traditional VPNs. Traffic is mixed, delayed, and re-ordered to defeat traffic correlation and timing analysis.
Enhanced network anonymity for reconnaissance operations where metadata protection and traffic analysis resistance are critical.
Obscura
Provably private VPN
VPN with blind relay architecture — servers never see your decrypted traffic. Unlike "no-log" VPNs that rely on policy promises, Obscura is provably private by design. Uses WireGuard with cryptographically enforced blind relays that physically cannot decrypt your traffic. Accepts Bitcoin and Monero.
High-assurance VPN for threat models requiring provable technical privacy guarantees rather than policy trust. Anonymous payment via Monero.
NextDNS
Privacy-focused DNS resolver
Cloud-based DNS resolver with ad blocking, tracker prevention, and customizable security filters. Supports DNS-over-HTTPS, DNS-over-TLS, and DNSCrypt. Configurable blocklists, allow/deny lists, and analytics dashboard. Free tier covers 300,000 queries/month.
Network-wide DNS filtering for lab environments, blocking telemetry, trackers, and known malicious domains at the DNS level across all devices.
Proton VPN
Swiss VPN with free tier
Swiss-based VPN from the creators of Proton Mail. Strong no-logs policy, Secure Core architecture (traffic routed through privacy-friendly countries), Ad-blocker (NetShield), and full-disk encrypted servers. Free tier available with no data caps. WireGuard and OpenVPN protocols. Part of the Proton ecosystem (Mail, Drive, Calendar, Pass).
Integrated privacy stack for ops — pair with Proton Mail for unified secure communications. Secure Core for high-risk environments where adversary controls the local ISP.
AdGuard
DNS filtering & ad blocking
Comprehensive ad blocking and privacy protection suite with DNS filtering at its core. AdGuard DNS is a free, privacy-focused DNS resolver that blocks ads, trackers, and malicious domains across all devices. Self-hosted AdGuard Home for network-wide filtering. Also available as browser extensions and desktop/mobile apps.
DNS-level filtering for lab and operational networks. Block telemetry, tracking, and malware domains without per-device setup. Self-host on Raspberry Pi for full control.
Privacy Tools
Privacy.com
Virtual cards for online purchases
Generate virtual payment cards to mask your real card details and limit merchant exposure.
Isolated payment cards for tool subscriptions, burner accounts, and operational expenses without exposing primary financial data.
PrivateBin
Self-hosted encrypted pastebin
Self-hosted encrypted pastebin with zero-knowledge architecture. Data is encrypted/decrypted in the browser.
Secure sharing of configuration snippets, IoCs, and temporary credentials with auto-expiring encrypted pastes.
KYC Not Me
KYC-free service alternatives
Curated directory of services that don't require KYC (Know Your Customer) identity verification.
Find identity-free alternatives for operational infrastructure, payment processing, and service provisioning.
Ad Nauseam
Anti-ad obfuscation extension
Browser extension that fights back against advertising tracking by automatically clicking every blocked ad. Built atop uBlock Origin, it creates noise in ad networks' data, rendering user profiling futile. No data collected, no servers, fully local.
Active defense against ad trackers. Obfuscates your profile by generating fake click streams that make targeting useless.
Lumo
Privacy-first AI assistant (Proton)
Proton's privacy-first AI assistant with end-to-end encryption. Conversations are never stored or used to train models. Swiss-based with zero-knowledge architecture.
Secure AI assistance for drafting incident reports, threat analysis summaries, and security documentation without data leaving your control.
Legal
Have I Been Pwned
Check if your data was breached
Search across hundreds of breached databases to check if your email, phone, or password has been exposed.
Quick breach checks during client onboarding, credential hygiene audits, and post-incident exposure assessment.
DeHashed
Breach & leak database search
Comprehensive breach and leak database search engine with advanced filtering and alerting capabilities.
Deep breach intelligence for incident response, credential compromise investigations, and threat actor research.
ToS;DR
Terms of Service analyzer
Community-driven analysis of Terms of Service agreements, rating services on privacy, rights, and data handling.
Evaluate privacy posture of third-party services before integration, and assess legal risk for client tool recommendations.
DataBreach.com
Breach tracking & alerts
Real-time breach notifications, historical breach database, and security incident tracking platform.
Monitor emerging breach trends, client exposure alerts, and post-incident tracking for incident response.
Bitdefender Reverse Phone Lookup
Reverse phone lookup
Free reverse phone lookup tool to identify unknown callers. Helps block unwanted telemarketing and scam calls.
Identify unknown numbers before answering. Essential for operational security and call screening.
DarkOwl
Dark web intelligence platform
Dark web monitoring and intelligence platform that crawls illicit forums, marketplaces, and paste sites for compromised credentials, leaked data, and threat actor activity.
Proactive dark web threat detection for client credentials, leaked documents, and early warning of targeted attacks in underground forums.
Data Removal
DeleteMe
Manual data broker removal
Premium service with human researchers who manually submit opt-out requests to data brokers on your behalf.
Executive-level personal data removal with guaranteed results. Best for high-profile individuals and corporate executives.
PrivacyBee
Browser extension + removal
Combines browser extension tracking blocking with data broker removal services. Continuous monitoring and re-submission.
Dual approach: block trackers while removing existing data. Good for ongoing privacy maintenance.
OneRep
Automated broker removal
Monitors 190+ people-search sites and automatically submits opt-out requests. Provides removal progress dashboard.
Automated, hands-off approach. Good baseline protection for teams wanting to reduce exposure without ongoing manual work.
Optery
Enterprise-grade removal
B2B-focused data removal with bulk employee protection, exposure reports, and custom removal strategies.
Best for organizations. Protect entire workforce with centralized dashboard, exposure scoring, and enterprise SLAs.
Incogni
Auto-removes personal data
Automated service that contacts data brokers to remove your personal information from their databases.
Reduce digital footprint of team members and clients to minimize doxxing risk and social engineering attack surface.
Cryptocurrencies
Unstoppable Wallet
Multi-chain crypto wallet
Non-custodial multi-chain crypto wallet. Supports Bitcoin, Ethereum, Polygon, BNB Chain, and 80+ chains. No KYC required, open-source, self-custody with your keys.
Privacy-first crypto storage for operational funds. Self-custody, no identity verification, supports multiple chains in one app.
Cake Wallet
Multi-coin wallet
Non-custodial multi-chain mobile wallet with built-in exchange. Supports Monero, Bitcoin, Ethereum, Solana, Zcash, and 17+ native chains with thousands of tokens. No KYC required for basic usage.
Privacy-first crypto storage for operational funds. No identity verification for basic usage.
Monero
Privacy coin
Leading privacy-focused cryptocurrency. Default stealth addresses, RingCT, and Kovri hide amounts, senders, and receivers. Untraceable by design.
Operational funding for scenarios requiring financial privacy. Use with Cake Wallet or CLI.
Bisq
Decentralized P2P bitcoin exchange
Decentralized peer-to-peer bitcoin exchange. Trade BTC for fiat or altcoins without intermediaries. No KYC, no registration, runs as Tor hidden service. Funds held in 2-of-2 multisig.
Privacy-first bitcoin trading without identity verification. Peer-to-peer, no exchange custody, censorship-resistant.
Privacy Pools
Private Bitcoin pool
Bitcoin privacy protocol using zero-knowledge proofs. Enable private, unlinkable transactions through a cooperative pool.
Privacy-preserving Bitcoin transactions without on-chain analysis. For operational Bitcoin security.
SmolRefuel
Gas refueling across 80+ chains
Multi-chain gas refueling service. Swap any token for gas (ETH, BNB, MATIC, etc.) across 80+ supported chains with zero gas fees. No KYC, anonymous wallet refill. Also supports bridging gas from other chains when the destination has none.
Refuel operational wallets that have tokens but no gas for transactions. No KYC, no upfront gas fee, multi-chain support.