Top 15 Cookie Monster Alternative and Similar Softwares | Nov 2024

Cookie Monster provides proactive cookie management on a site or domain level basis, including 3rd party cookies. Via the status bar, it provides easy access to enhanced cookie functionality, while doing so in a non-intrusive manner.

1. selectivecookiedelete

selectivecookiedelete Delete cookies from specified domains (black-list) or delete cookies not in the specified domains (white-list). This can be done on-demand or automatically at shutdown.......

2. µMatrix

µMatrix Point & click to forbid/allow any class of requests made by your browser. Use it to block scripts, iframes, ads, facebook, etc.µMatrix: A point-and-click matrix-based firewall, with many privacy-enhancing tools.µMatrix put you in full control of where your browser is allowed to connect, what type of data it is allowed......

3. Tab Cookies

Tab Cookies Get in control of your privacy automatically deleting the unused cookies created in each tab when you close it.This extensions deletes all the cookies created in a tab (which are not used by other tabs) when you close the tab. In this way your privacy is guaranteed.For example, as long......

4. HTTP Switchboard

HTTP Switchboard httpswitchboard - Point & click to forbid/allow any class of requests made by your browser. Use it to block scripts, iframes, ads, facebook, etc. https://github.com/gorhill/httpswitchboard/blob/master/assets/update-3rdparties.sh......

5. Outpost Firewall Pro

Outpost Firewall Pro PC defense against hackers, malware, viruses and Internet attacks. Inbound and outbound system and application firewall delivers powerful protection against a wide range of threats from local networks and the Internet and prevents unauthorized access to your PC. Protection for your OS and applications is easy with System and Application......

6. Emsisoft Mobile Security

Emsisoft Mobile Security Emsisoft Mobile Security is a next-gen security solution for Android devices focused on little (to zero) system or battery impact while providing access to a number of security functions in order to help you have a safer and......

7. Lusca

Lusca Lusca is a fork of the Squid -2 development tree. The Lusca project aims to fix the shortcomings in the Squid-2 codebase whilst maintaining the the Squid-2 functionality and stability.......

8. PHProxy (original)

PHProxy (original) PHProxy is a web HTTP proxy programmed in PHP meant to bypass firewalls and access otherwise inaccessible resources (i.e. blocked websites). If the server this script is run on can access a resource, so can you!......

9. Extreme Password Generator Pro

Extreme Password Generator Pro Extreme Password Generator Pro (EPG Pro) is a password generator utility which allows users to generate strong, difficult to crack random passwords. EPG Pro can be used by individual home computer users or large organizations.EPG Pro is very easy to use. Simply start the program, choose the length of the......

10. Online Armor

Online Armor Online Armor is a security system that protects your computer against spyware, malware, Trojans and phishing attacks.The first time you initiate the program, you are required to set up its configuration. You can enable Online Armor to automatically trust everything found by the wizard on your computer (so, you do......

11. GPGTools

GPGTools GPGTools is an open source initiative to bring OpenPGP to Apple OS X in the form of an easy installer package. This allows you to sign, verify, encrypt, and decrypt files and e-mails. Read the introduction to get a detailed idea of how PGP works.......

12. SecretBox

SecretBox You can use SecretBox to store all sorts of information : Credit Card details, SSN numbers, Software Licenses, e-mail accountand passwords. All are easily stored in SecretBoxs flexible database. Most people will use SecretBox for personal use,but businesses can also use SecretBox for managing their customers passwords or software licenses.SecretBox......

13. Snuko Anti-Theft

Snuko Anti-Theft [Snuko was acquired by Mobile Cloud Labs, which develop My AntiTheft & Antivirus ]Protect your laptop or mobile device with the Snuko anti-theft software. Retrieve data, encrypt files, lock down your device and even locate it. Nowadays no laptop should be without anti-theft software.......

14. GadgetTrak

GadgetTrak Using patented location-detection technology, GadgetTrak evens the odds of recovering a stolen laptop or mobile phone by pinpointing the location of your laptop, who has it, even what they’re wearing!......

15. CirrusManager

CirrusManager CirrusManager - manage your Android devices from the webCirrusManager lets you control your Android devices from the web. Features include:- Google Maps tracking- Remote lock with custom message- Remote wipe- Ring your device- Start audio recordings- Read and send messages- View your calls- Lock device on SIM card change- Lock......