Privacy
Resources.

“These are tools. What's interesting is what you do with it.”

0 curated tools

AI & Local LLM

Ollama icon

Ollama

Run open-source LLMs locally

Run open-source LLMs locally with one command. Query your private documents or generate sensitive code on an air-gapped machine without any data leaving your machine.

$ Use Case

Query your private documents or generate sensitive code on an air-gapped or hardened MacBook without any data leaving your machine.

Visit ollama.com

Jan AI

Open-source ChatGPT alternative, runs offline

Open-source desktop app to run and manage local LLMs easily. Daily private research and writing while keeping the option for optional cloud fallback.

$ Use Case

Daily private research and writing while keeping the option for optional cloud fallback without permanent storage of prompts.

Visit jan.ai

Open WebUI

Self-hosted web UI for local LLMs

Self-hosted beautiful web UI for any local LLM (Ollama, etc.). Deploy your own private ChatGPT-like interface on a home server.

$ Use Case

Deploy your own private ChatGPT-like interface on a home server for family or trusted team use.

Visit openwebui.com

LM Studio

Discover and run LLMs locally

User-friendly desktop app for discovering, downloading and running LLMs with GPU support.

$ Use Case

Test multiple models locally before choosing one for long-term sensitive workflows.

Visit lmstudio.ai
GitHub

PrivateGPT

Chat with your own documents

Chat with your own documents using fully local LLMs. Zero risk of leakage for confidential contracts, medical files or personal notes.

$ Use Case

Analyze confidential contracts, medical files or personal notes with zero risk of leakage.

Visit github.com

Duck.ai

AI search powered by DuckDuckGo

DuckDuckGo's AI search that combines real-time web results with AI-powered answers. No tracking, no profile building.

$ Use Case

Private AI-assisted search for security research without query history correlation.

Visit duck.ai

Xprivo

Privacy-focused LLM assistant

Privacy-first AI assistant. No data retention, no training on user data, zero-knowledge architecture.

$ Use Case

Draft security reports, incident analysis, and sensitive documentation with full privacy guarantees.

Visit xprivo.com

Communication

Signal

Gold standard for encrypted messaging

The gold standard for end-to-end encrypted messaging. Open-source protocol, minimal metadata retention.

$ IronClad Use Case

Primary secure channel for team communications, incident coordination, and sharing time-sensitive security alerts.

Visit signal.org

Session

Anonymous messenger, no phone number required

Decentralized messenger with no phone number or email required. Routes messages through an onion network.

$ IronClad Use Case

Anonymous communication channel for whistleblowers, confidential sources, and high-risk operational coordination.

Visit getsession.org

Element / Matrix

Self-hostable encrypted communication

Self-hostable team communication platform built on the Matrix protocol with end-to-end encryption and federation.

$ IronClad Use Case

Self-hosted SOC chat platform with full message encryption, audit trails, and bridging to other secure channels.

Visit element.io

Threema

Swiss encrypted messenger, phone-number-free

Swiss-made end-to-end encrypted messenger that requires no phone number or email. Open-source audited client with minimal data collection.

$ IronClad Use Case

European alternative to Signal for teams requiring Swiss jurisdiction, no phone-number linking, and full auditability.

Visit threema.com

Meshtastic

Open-source mesh networking for off-grid communication

Open-source mesh radio network for off-grid, encrypted text communication without cellular or internet.

$ IronClad Use Case

Off-grid team communication during on-site assessments, red team exercises, and emergency response scenarios.

Visit meshtastic.org

Cape

Privacy-first mobile carrier

Privacy-focused cell phone service with encrypted calls, disappearing call logs, secure roaming, and minimal data retention. Built in partnership with Proton.

$ IronClad Use Case

Secure mobile communications for high-risk operations, field teams, and clients requiring elevated threat protection against surveillance.

Visit cape.co

Crypton.sh

Encrypted SMS & virtual phone numbers

End-to-end encrypted SMS service using real physical SIM cards with zero-access encryption and personal keypair. No email required for signup, TOR support, open-source encryption module. Also offers virtual numbers, Crypton Travel eSIM in 145+ countries, email aliases, and a powerful REST API. Accepts crypto (XMR, BTC, ETH) and credit cards.

$ IronClad Use Case

Anonymous phone numbers for account verifications, 2FA, and secure messaging without linking personal identity. Ideal for burner setups, operational security, and high-risk communications.

Visit crypton.sh

Encrypted Mail

Proton Mail

Swiss encrypted email

Swiss-based encrypted email with zero-access encryption, open-source clients, and optional anonymous signup. Includes calendar, drive, and VPN suite.

$ IronClad Use Case

Primary secure email for client communications, encrypted file sharing for sensitive reports, and anonymous account registration.

Visit proton.me

Tuta

German end-to-end encrypted email

German-based encrypted email with full end-to-end encryption for subject lines, body, and attachments. Open-source, no tracking, and GDPR-compliant.

$ IronClad Use Case

Alternative to Proton with stricter encryption defaults. Ideal for EU-based operations requiring subject line encryption.

Visit tuta.com

Mailfence

Belgian privacy-focused email

Belgian-based encrypted email with PGP support, zero-access encryption, and integrated calendar, documents, and drive. No ads, no tracking.

$ IronClad Use Case

European-hosted email with custom domain support. Good for operational aliases and team communication with PGP compatibility.

Visit mailfence.com

StartMail

Private email from Startpage creators

Dutch-based encrypted email from the creators of Startpage. PGP integration, disposable aliases, and custom domain support. No personal data required for signup.

$ IronClad Use Case

Burner alias generation for operational security. Custom domain hosting for anonymous team communication infrastructure.

Visit startmail.com

Security

Bitwarden

Open-source password manager

Open-source password manager with zero-knowledge encryption, self-hosting support, and cross-platform sync.

$ IronClad Use Case

Self-hosted vault for managing client credentials, API keys, and operational access tokens with full audit control.

Visit bitwarden.com

KeePassXC

Local encrypted password manager

Local, offline password manager with strong AES-256 encryption. No cloud dependency, full data control.

$ IronClad Use Case

Air-gapped credential storage for high-value accounts, root passwords, and offline access to critical infrastructure.

Visit keepassxc.org

VeraCrypt

Disk encryption software

Open-source disk encryption for full volumes, partitions, or virtual encrypted disks. Supports plausible deniability.

$ IronClad Use Case

Encrypt forensic images, sensitive case files, and portable drives used during on-site security assessments.

Visit veracrypt.fr

Cryptomator

Client-side cloud encryption

Open-source client-side encryption for cloud storage. Zero-knowledge, transparent encryption before upload to Google Drive, Dropbox, OneDrive, etc.

$ IronClad Use Case

Encrypt sensitive client files before cloud sync. Protect proprietary code, credentials, and documentation stored in Dropbox/Google Drive.

Visit cryptomator.org

Objective-See

macOS security tools

Free open-source macOS security tools including malware detection, firewall monitoring, and persistence analysis.

$ IronClad Use Case

macOS endpoint hardening and malware detection for team workstations and forensic analysis on Apple hardware.

Visit objective-see.org

VirusTotal

URL & file scanner

Multi-engine file and URL scanner aggregating results from 70+ antivirus engines and domain reputation services.

$ IronClad Use Case

Rapid threat intel triage for suspicious files, URLs, and hashes encountered during incident response and investigations.

Visit virustotal.com

urlscan.io

URL scanner & threat intel

Automated URL analysis tool that screenshots web pages and extracts IOCs. Free tier allows 10 scans/day, API available.

$ IronClad Use Case

Quick triage of suspicious links - captures screenshot, scripts, cookies, and domain info for threat assessment.

Visit urlscan.io

Bitdefender

Enterprise endpoint protection

Romanian cybersecurity company providing advanced endpoint detection, network threat prevention, and cloud security for enterprises.

$ IronClad Use Case

Enterprise endpoint protection for client infrastructure, managed detection & response, and compliance hardening.

Visit bitdefender.com

Cover Your Tracks

Browser fingerprint analyzer (EFF)

EFF's browser fingerprinting test to measure how uniquely identifiable your browser configuration is online.

$ IronClad Use Case

Validate browser hardening configurations and verify anonymity posture before conducting sensitive OSINT operations.

Visit coveryourtracks.eff.org

DNS Checker

Global DNS propagation checker

Global DNS propagation checker to verify DNS records across multiple servers worldwide.

$ IronClad Use Case

Verify DNS changes during infrastructure migrations and detect potential DNS hijacking or poisoning attempts.

Visit dnschecker.org

MetaDefender

Multi-engine malware analysis

Multi-scanning malware analysis with 70+ AV engines. Deep packet inspection and threat intelligence aggregation.

$ IronClad Use Case

Analyze suspicious files with 70+ AV engines and AI behavioral analysis before deployment.

Visit metadefender.com

AlienVault OTX

Threat intelligence platform

Open threat intelligence platform with pulse indicators, malware analysis, and collaborative threat research from global users.

$ IronClad Use Case

Query IOC databases during incident response, track threat actor campaigns, and contribute to community threat intel.

Visit otx.alienvault.com

URLhaus

Malware URL database

Swiss project tracking malware distribution URLs. Focuses on collecting and sharing URLs used for malware distribution.

$ IronClad Use Case

Check suspicious URLs against known malware distribution sites. Quick triage for phishing and malware URLs in client investigations.

Visit urlhaus.abuse.ch

Hybrid Analysis

Malware sandbox analysis

Free malware analysis service using sandbox execution. Submits samples for behavioral analysis and provides detailed reports.

$ IronClad Use Case

Analyze suspicious binaries, documents, and links in sandbox. No account required for basic analysis.

Visit hybrid-analysis.com

ANY.RUN

Interactive malware sandbox

Interactive online malware sandbox with real-time process monitoring. Allows full interaction with malware during execution for detailed behavioral analysis.

$ IronClad Use Case

Interactive analysis for complex malware. Stealth sandbox option available. Good for live malware behavior observation.

Visit app.any.run

Hardware

Yubico

Hardware security keys

FIDO2/WebAuthn hardware keys for phishing-resistant authentication. Used by major tech companies and governments worldwide.

$ Use Case

Secure your accounts with hardware 2FA that cannot be compromised by phishing or keyloggers.

Visit yubico.com

Nitrokey

Open-source hardware keys

European-made open-source hardware security keys. Supports FIDO2, PGP, and TOTP. No proprietary cloud dependency.

$ Use Case

Privacy-respecting alternative to Yubikey with fully open-source firmware and hardware designs.

Visit nitrokey.com

Protectli

Hardware firewall appliances

Fanless mini PCs running VyOS or OPNsense. Dedicated hardware firewall for home or office network security.

$ Use Case

Replace consumer routers with enterprise-grade firewall hardware for complete network control.

Visit protectli.com

GL.iNet

Privacy travel routers

Mini travel routers with OpenWrt, built-in VPN clients, and DNS filtering. Create a secure network anywhere.

$ Use Case

Secure all your devices on untrusted networks with your own VPN-protected router while traveling.

Visit gl-inet.com

LilyGO

ESP32 dev boards & pentest hardware

Manufacturer of affordable ESP32-based development boards including T-Embed, T-Deck, T-Watch, and T-Display series. Popular platforms for running offensive security firmware like Bruce. Integrated displays, keyboards, CC1101 radios, and USB-C in compact form factors.

$ Use Case

Hardware platform for portable red team tools. T-Embed CC1101 and T-Deck are ideal hosts for Bruce firmware — built-in screens, keyboards, and RF modules.

Visit lilygo.cc

Firewalla

Smart firewall & DNS

Smart home firewall with built-in VPN, DNS filtering, and network monitoring. Protects all devices including IoT.

$ Use Case

Network-wide protection for home users with easy VPN setup and ad/tracker blocking.

Visit firewalla.com

OnlyKey

PIN-protected hardware key

Open-source hardware security key with PIN entry on the device itself. Supports FIDO2, TOTP, PGP, and offline password storage. Brute-force self-destruct after 30 failed PIN attempts. Firmware is fully auditable and runs on ESP32.

$ Use Case

High-assurance hardware key for field operations where physical coercion is a threat. PIN on device prevents forced authentication.

Visit onlykey.io

Mosequipment

Faraday bags & RF shielding

French manufacturer of high-quality Faraday bags, RF shielding pouches, and signal-blocking cases. Protects devices against remote wiping, tracking, and RF interception. Tested and certified shielding effectiveness across GSM, GPS, Wi-Fi, and Bluetooth frequencies.

$ Use Case

Secure device isolation during field operations — prevent remote wiping, block RF tracking, and secure phones/radios when entering sensitive facilities.

Visit mosequipment.com

SoloKeys

Open-source hardware security keys

Open-source FIDO2/WebAuthn security keys with fully transparent firmware. Supports FIDO2, U2F, and GPG. Available in USB-A, USB-C, and NFC form factors. Firmware is publicly auditable and community-reviewed. Solo V2 and Somu (NFC-only) models available.

$ Use Case

Phishing-resistant hardware 2FA with fully open-source firmware. Ideal for security-conscious users who want auditable keys without proprietary black-box firmware.

Visit solokeys.com

Browsing

DuckDuckGo

Private search engine

Search engine that doesn't track your queries, build profiles, or serve personalized results. No cookies, no logging.

$ Use Case

Default search for all operational devices to prevent query profiling during OSINT and research.

Visit duckduckgo.com

Startpage

Anonymous search with Google results

European search engine delivering Google results without tracking. No cookies, no logging. Features Privacy Proxy for anonymous browsing.

$ Use Case

Alternative for operational research. Privacy Proxy hides your IP from target sites.

Visit startpage.com

Tor Browser

Onion-routed anonymous browsing

The original onion-routed browser for anonymous web access. Defends against traffic analysis and network surveillance.

$ Use Case

Anonymous OSINT, dark web threat intel, and accessing .onion services for security research.

Visit torproject.org

Whonix

Tor-based OS for anonymity

Security-focused OS that forces all connections through Tor using a gateway/workstation architecture. Provides network leak protection.

$ Use Case

Isolated anonymous workspace for high-risk investigations, leak analysis, and sensitive research operations.

Visit whonix.org

Browserling

Live browser testing

Live interactive browser testing in the cloud. Test across different browsers, OS, and screen resolutions without local VMs.

$ Use Case

Cross-browser testing for security tools, XSS verification, and phishing page rendering analysis.

Visit browserling.com

Mullvad Browser

Privacy-focused browser (with Tor Project)

Privacy-first browser developed with Tor Project. Private mode enabled by default, fingerprinting resistance via letterboxing, no telemetry. Works with any VPN.

$ Use Case

Daily browsing with VPN. Blocks trackers, resists fingerprinting. No data collected, no account required.

Visit mullvad.net/browser

Brave

Privacy-first browser with ad blocker

Privacy-first browser with built-in ad blocker, script blocker, and fingerprinting protection. Blocks trackers by default, offers Tor private windows.

$ Use Case

Everyday browsing with strong tracker blocking. Good balance of privacy and compatibility.

Visit brave.com

LibreWolf

Privacy-hardened Firefox fork

Firefox fork focused on privacy and freedom. Removes telemetry, strengthens fingerprinting protection, includes uBlock Origin.

$ Use Case

Privacy-focused daily browser. No Mozilla account required, strong anti-fingerprinting.

Visit librewolf.com

Kameleo

Anti-detect browser for multi-accounting

Advanced anti-detect browser with real fingerprint profiles from actual devices. Supports desktop and Android mobile emulation. Unlimited profiles.

$ Use Case

Multi-account management on social platforms, e-commerce, and affiliate marketing. Uses real device fingerprints to bypass detection.

Visit kameleo.io

Octo Browser

Anti-detect browser with fingerprint spoofing

Anti-detect browser with high-quality fingerprint spoofing at Chromium kernel level. Passes Pixelscan, BrowserLeaks, Whoer. Supports mobile fingerprints, API automation.

$ Use Case

Multi-accounting for social media, e-commerce, and automation. Team collaboration, cookie management, and integrated proxy shop.

Visit octobrowser.net

Ahmia

Tor hidden service search engine

Search engine for Tor hidden services (.onion sites). Open-source, indexes clearnet-accessible .onion addresses, and filters illegal content. Provides anonymity-friendly search for the Tor network.

$ Use Case

Discover and verify legitimate .onion services during OSINT investigations and dark web threat intelligence research.

Visit ahmia.fi

Operating Systems

Qubes OS

Security-by-compartmentalization OS

Security-focused OS that uses virtualization to isolate your digital life into secure compartments called "qubes." If one qube is compromised, the others remain safe. Uses Xen hypervisor for strong isolation between domains.

$ Use Case

High-security computing environment for sensitive operations. Separate qubes for banking, work, browsing. Disposable VMs for untrusted files.

Visit qubes-os.org

Tails

Amnesic live OS for anonymity

Portable OS that runs from a USB stick without leaving any trace on the computer. All traffic routed through Tor, no data saved after shutdown (amnesic). Based on Debian with privacy tools pre-installed.

$ Use Case

Anonymous field operations, whistle-blowing, untrusted computers. Leaves zero trace on host machine.

Visit tails.net

Parrot Security

Debian-based security distro

Debian-based Linux distro for ethical hacking, penetration testing, and digital forensics. Includes 600+ pre-installed security tools. Available in Security and Home editions. Lightweight and privacy-focused.

$ Use Case

Penetration testing, vulnerability assessment, red team operations. Home edition for everyday privacy.

Visit parrotsec.org

Security Onion

Network security monitoring

Distro for network security monitoring, intrusion detection, and log management. Includes Suricata, Zeek, Wazuh, TheHive, and Playbook. Full SOC platform for blue team operations.

$ Use Case

Blue team monitoring, incident response lab, SOC deployment, threat hunting.

Visit securityonionsolutions.com

UTM

Virtual machines for macOS/iOS

Full-featured system emulator and virtual machine host for macOS and iOS based on QEMU. Uses Apple's Hypervisor framework for near-native performance. Supports x86_64, ARM64, RISC-V, and dozens of other architectures.

$ Use Case

Isolated testing environments on Mac. Run Windows, Linux, legacy OS in sandboxed VMs. macOS VM support for developers.

Visit mac.getutm.app

Pentesting

Flipper Zero

Portable multi-tool for pentesters

All-in-one portable multi-tool for pentesting, hardware hacking, and RFID/NFC analysis. Features sub-GHz frequency analysis, RFID cloning (125kHz, 13.56MHz), NFC, iButton, infrared remote control, BadUSB, and GPIO for custom hardware interfacing. Extensive open-source ecosystem with custom firmware (Xtreme, Unleashed, RogueMaster).

$ Use Case

Physical pentesting toolkit for access control assessment — RFID badge cloning, infrared signal replay, sub-GHz brute-force, and BadUSB payload delivery during on-site engagements.

Visit flipperzero.one

Bruce Firmware

Offensive ESP32 firmware for red team ops

Open-source ESP32 firmware for offensive security and red team operations. Runs on M5Stack Cardputer, LilyGo T-Embed, and other ESP32 devices. Features Wi-Fi attacks (deauth, evil portal, beacon spam), BLE attacks, BadUSB/DuckyScript payloads, RFID/NFC cloning via PN532, Sub-GHz RF via CC1101, IR tools, and more. AGPL-licensed with fully open hardware designs.

$ Use Case

Portable red team toolkit for physical assessments — Wi-Fi deauth testing, BadUSB payload delivery, RFID/NFC cloning, and RF replay attacks. Low-cost Flipper Zero alternative (~$40-65).

Visit bruce.computer

Shodan

IoT & exposed service search engine

The search engine for internet-connected devices. Scans and indexes every publicly accessible service: webcams, routers, servers, industrial control systems, and more. Filter by port, country, OS, product, or vulnerability.

$ Use Case

Reconnaissance phase of penetration testing — discover exposed services, identify vulnerable devices, and map client attack surface from the outside.

Visit shodan.io

Pentagi

AI-powered pentesting platform

AI-driven penetration testing platform that automates vulnerability discovery, exploitation chains, and reporting. Combines machine learning with traditional pentest methodologies for faster, deeper assessments.

$ Use Case

Accelerate pentest engagements with AI-assisted vulnerability chaining and automated proof-of-concept generation.

Visit pentagi.com

Penligent

Autonomous attack simulation

AI-powered breach and attack simulation platform. Continuously tests defenses with realistic adversary tactics, techniques, and procedures (TTPs). Maps findings to MITRE ATT&CK framework.

$ Use Case

Continuous security validation between pentests. Measure detection coverage and response readiness against real-world attack patterns.

Visit penligent.ai

PentestGPT

AI-assisted pentest companion

GPT-powered penetration testing assistant that guides through the testing methodology. Provides real-time suggestions for enumeration, exploitation, and post-exploitation based on context and findings.

$ Use Case

Interactive pentest assistant for methodology guidance, command suggestions, and lateral movement strategy during engagements.

Visit pentestgpt.com

Kali Tools

Directory of 600+ security tools

Official Kali Linux tools directory — 600+ penetration testing and security tools organized by category: information gathering, vulnerability analysis, exploitation, wireless attacks, reverse engineering, and more. Each tool has documentation and package details.

$ Use Case

Find the right tool for each pentest phase. Browse by attack category or search for specific techniques. Reference for tool installation and usage.

Visit kali.org/tools

Lab401

Hardware hacking & pentest gear

European retailer specializing in hardware hacking and cybersecurity equipment. Stocks Flipper Zero, Proxmark3, ChameleonUltra, HackRF, RTL-SDR, BadUSB devices, RFID/NFC tools, lockpicks, WiFi deauthers, and development boards. Ships from France with EU/UK coverage.

$ Use Case

One-stop shop for hardware pentesting equipment — RFID cloning tools, SDRs, BadUSB devices, and RF analysis gear for physical assessments and red team ops.

Visit lab401.com

Anonymity

OnionShare

Anonymous file sharing via Tor

Secure, anonymous file sharing and website hosting over the Tor network with no central servers.

$ IronClad Use Case

Secure transfer of forensic evidence, large log files, and sensitive documents to clients or legal counsel.

Visit onionshare.org

Silent.link

Anonymous eSIM & data

Anonymous eSIM data plans with crypto payment support and no personal information required.

$ IronClad Use Case

Anonymous mobile connectivity for field operations, travel security, and isolated network access.

Visit silent.link

GrapheneOS

Hardened Android OS with enhanced security

Hardened Android OS with enhanced privacy, security, and sandboxing. Designed for Pixel devices.

$ IronClad Use Case

Secure mobile platform for field operatives, mobile pentesting, and running sensitive security apps in hardened sandboxes.

Visit grapheneos.org

NadaNada

No-KYC eSIM & VPN provider

No-KYC eSIM and VPN services for anonymous mobile connectivity without identity verification.

$ IronClad Use Case

Anonymous mobile data for field operations, burner device provisioning, and untraceable network access.

Visit nadanada.me

VoidMob

Mobile proxies, SMS & eSIM unified

Real 4G/5G mobile proxies from carrier networks, carrier-based SMS verifications, and global eSIMs unified in a privacy-focused, crypto-friendly platform. No KYC required, 99.9% uptime, API access with MCP support for AI agents. Pay with BTC, ETH, SOL and more.

$ IronClad Use Case

Mobile proxy IPs for geo-obfuscation during remote assessments, anonymous SMS verification for account creation, and untraceable eSIM data for field operations — all from one dashboard.

Visit voidmob.com

VPN / DNS

Mullvad VPN

Anonymous VPN, no account needed

Privacy-first VPN with anonymous account creation (no email required), crypto and cash payment options, and strict no-logs policy independently audited. WireGuard and OpenVPN on 500+ servers across 40+ countries.

$ IronClad Use Case

Primary VPN for operational traffic and geo-obfuscation during remote assessments. Anonymous payment with Monero for non-attributable subscriptions.

Visit mullvad.net

NymVPN

Mixnet-based VPN for anonymity

Next-generation VPN built on a mixnet architecture (Nym network), providing stronger anonymity guarantees than traditional VPNs. Traffic is mixed, delayed, and re-ordered to defeat traffic correlation and timing analysis.

$ IronClad Use Case

Enhanced network anonymity for reconnaissance operations where metadata protection and traffic analysis resistance are critical.

Visit nymvpn.net

Obscura

Provably private VPN

VPN with blind relay architecture — servers never see your decrypted traffic. Unlike "no-log" VPNs that rely on policy promises, Obscura is provably private by design. Uses WireGuard with cryptographically enforced blind relays that physically cannot decrypt your traffic. Accepts Bitcoin and Monero.

$ IronClad Use Case

High-assurance VPN for threat models requiring provable technical privacy guarantees rather than policy trust. Anonymous payment via Monero.

Visit obscura.com

NextDNS

Privacy-focused DNS resolver

Cloud-based DNS resolver with ad blocking, tracker prevention, and customizable security filters. Supports DNS-over-HTTPS, DNS-over-TLS, and DNSCrypt. Configurable blocklists, allow/deny lists, and analytics dashboard. Free tier covers 300,000 queries/month.

$ IronClad Use Case

Network-wide DNS filtering for lab environments, blocking telemetry, trackers, and known malicious domains at the DNS level across all devices.

Visit nextdns.io

Proton VPN

Swiss VPN with free tier

Swiss-based VPN from the creators of Proton Mail. Strong no-logs policy, Secure Core architecture (traffic routed through privacy-friendly countries), Ad-blocker (NetShield), and full-disk encrypted servers. Free tier available with no data caps. WireGuard and OpenVPN protocols. Part of the Proton ecosystem (Mail, Drive, Calendar, Pass).

$ IronClad Use Case

Integrated privacy stack for ops — pair with Proton Mail for unified secure communications. Secure Core for high-risk environments where adversary controls the local ISP.

Visit protonvpn.com

AdGuard

DNS filtering & ad blocking

Comprehensive ad blocking and privacy protection suite with DNS filtering at its core. AdGuard DNS is a free, privacy-focused DNS resolver that blocks ads, trackers, and malicious domains across all devices. Self-hosted AdGuard Home for network-wide filtering. Also available as browser extensions and desktop/mobile apps.

$ IronClad Use Case

DNS-level filtering for lab and operational networks. Block telemetry, tracking, and malware domains without per-device setup. Self-host on Raspberry Pi for full control.

Visit adguard.com

Privacy Tools

Privacy.com

Virtual cards for online purchases

Generate virtual payment cards to mask your real card details and limit merchant exposure.

$ IronClad Use Case

Isolated payment cards for tool subscriptions, burner accounts, and operational expenses without exposing primary financial data.

Visit privacy.com

PrivateBin

Self-hosted encrypted pastebin

Self-hosted encrypted pastebin with zero-knowledge architecture. Data is encrypted/decrypted in the browser.

$ IronClad Use Case

Secure sharing of configuration snippets, IoCs, and temporary credentials with auto-expiring encrypted pastes.

Visit privatebin.info

KYC Not Me

KYC-free service alternatives

Curated directory of services that don't require KYC (Know Your Customer) identity verification.

$ IronClad Use Case

Find identity-free alternatives for operational infrastructure, payment processing, and service provisioning.

Visit kycnot.me

Ad Nauseam

Anti-ad obfuscation extension

Browser extension that fights back against advertising tracking by automatically clicking every blocked ad. Built atop uBlock Origin, it creates noise in ad networks' data, rendering user profiling futile. No data collected, no servers, fully local.

$ Use Case

Active defense against ad trackers. Obfuscates your profile by generating fake click streams that make targeting useless.

Visit adnauseam.io

Lumo

Privacy-first AI assistant (Proton)

Proton's privacy-first AI assistant with end-to-end encryption. Conversations are never stored or used to train models. Swiss-based with zero-knowledge architecture.

$ IronClad Use Case

Secure AI assistance for drafting incident reports, threat analysis summaries, and security documentation without data leaving your control.

Visit lumo.proton.me

Legal

Have I Been Pwned

Check if your data was breached

Search across hundreds of breached databases to check if your email, phone, or password has been exposed.

$ IronClad Use Case

Quick breach checks during client onboarding, credential hygiene audits, and post-incident exposure assessment.

Visit haveibeenpwned.com

DeHashed

Breach & leak database search

Comprehensive breach and leak database search engine with advanced filtering and alerting capabilities.

$ IronClad Use Case

Deep breach intelligence for incident response, credential compromise investigations, and threat actor research.

Visit dehashed.com

ToS;DR

Terms of Service analyzer

Community-driven analysis of Terms of Service agreements, rating services on privacy, rights, and data handling.

$ IronClad Use Case

Evaluate privacy posture of third-party services before integration, and assess legal risk for client tool recommendations.

Visit tosdr.org

DataBreach.com

Breach tracking & alerts

Real-time breach notifications, historical breach database, and security incident tracking platform.

$ IronClad Use Case

Monitor emerging breach trends, client exposure alerts, and post-incident tracking for incident response.

Visit databreach.com

Bitdefender Reverse Phone Lookup

Reverse phone lookup

Free reverse phone lookup tool to identify unknown callers. Helps block unwanted telemarketing and scam calls.

$ IronClad Use Case

Identify unknown numbers before answering. Essential for operational security and call screening.

Visit bitdefender.com

DarkOwl

Dark web intelligence platform

Dark web monitoring and intelligence platform that crawls illicit forums, marketplaces, and paste sites for compromised credentials, leaked data, and threat actor activity.

$ IronClad Use Case

Proactive dark web threat detection for client credentials, leaked documents, and early warning of targeted attacks in underground forums.

Visit darkowl.com

Data Removal

DeleteMe

Manual data broker removal

Premium service with human researchers who manually submit opt-out requests to data brokers on your behalf.

$ IronClad Use Case

Executive-level personal data removal with guaranteed results. Best for high-profile individuals and corporate executives.

Visit joindeleteme.com

PrivacyBee

Browser extension + removal

Combines browser extension tracking blocking with data broker removal services. Continuous monitoring and re-submission.

$ IronClad Use Case

Dual approach: block trackers while removing existing data. Good for ongoing privacy maintenance.

Visit privacybee.com

OneRep

Automated broker removal

Monitors 190+ people-search sites and automatically submits opt-out requests. Provides removal progress dashboard.

$ IronClad Use Case

Automated, hands-off approach. Good baseline protection for teams wanting to reduce exposure without ongoing manual work.

Visit onerep.com

Optery

Enterprise-grade removal

B2B-focused data removal with bulk employee protection, exposure reports, and custom removal strategies.

$ IronClad Use Case

Best for organizations. Protect entire workforce with centralized dashboard, exposure scoring, and enterprise SLAs.

Visit optery.com

Incogni

Auto-removes personal data

Automated service that contacts data brokers to remove your personal information from their databases.

$ IronClad Use Case

Reduce digital footprint of team members and clients to minimize doxxing risk and social engineering attack surface.

Visit incogni.com

Cryptocurrencies

Unstoppable Wallet

Multi-chain crypto wallet

Non-custodial multi-chain crypto wallet. Supports Bitcoin, Ethereum, Polygon, BNB Chain, and 80+ chains. No KYC required, open-source, self-custody with your keys.

$ IronClad Use Case

Privacy-first crypto storage for operational funds. Self-custody, no identity verification, supports multiple chains in one app.

Visit unstoppable.money

Cake Wallet

Multi-coin wallet

Non-custodial multi-chain mobile wallet with built-in exchange. Supports Monero, Bitcoin, Ethereum, Solana, Zcash, and 17+ native chains with thousands of tokens. No KYC required for basic usage.

$ IronClad Use Case

Privacy-first crypto storage for operational funds. No identity verification for basic usage.

Visit cakewallet.com

Monero

Privacy coin

Leading privacy-focused cryptocurrency. Default stealth addresses, RingCT, and Kovri hide amounts, senders, and receivers. Untraceable by design.

$ IronClad Use Case

Operational funding for scenarios requiring financial privacy. Use with Cake Wallet or CLI.

Visit getmonero.org

Bisq

Decentralized P2P bitcoin exchange

Decentralized peer-to-peer bitcoin exchange. Trade BTC for fiat or altcoins without intermediaries. No KYC, no registration, runs as Tor hidden service. Funds held in 2-of-2 multisig.

$ IronClad Use Case

Privacy-first bitcoin trading without identity verification. Peer-to-peer, no exchange custody, censorship-resistant.

Visit bisq.network

Privacy Pools

Private Bitcoin pool

Bitcoin privacy protocol using zero-knowledge proofs. Enable private, unlinkable transactions through a cooperative pool.

$ IronClad Use Case

Privacy-preserving Bitcoin transactions without on-chain analysis. For operational Bitcoin security.

Visit privacypools.com

SmolRefuel

Gas refueling across 80+ chains

Multi-chain gas refueling service. Swap any token for gas (ETH, BNB, MATIC, etc.) across 80+ supported chains with zero gas fees. No KYC, anonymous wallet refill. Also supports bridging gas from other chains when the destination has none.

$ IronClad Use Case

Refuel operational wallets that have tokens but no gas for transactions. No KYC, no upfront gas fee, multi-chain support.

Visit smolrefuel.com