Top 15 Netsukuku Alternative and Similar Softwares | Dec 2024

Mesh routing protocol designed to handle a massive amount of nodes with very low resource consumption. Thanks to this feature it can be easily used to build a worldwide distributed, anonymous and uncontrolled network, separated from the Internet, without the support of any servers, ISPs or authority controls.

1. Phantom

Phantom The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind:1. Completely decentralized.2. Maximum resistance against all kinds of DoS attacks.3. Theoretically secure anonymization.4. Theoretically secure end-to-end transport encryption.5. Completely (virtually) isolated from the "normal" Internet.6. Maximum......

2. OnionCat

OnionCat OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It allows users to anonymously access Internet services. It transmits any kind of IPv6-based data transparently through the TOR network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. OnionCat......

3. SMesh

SMesh SMesh is a seamless wireless mesh network being developed by the Distributed System and Networks Lab at Johns Hopkins University. It provides peer-to-peer connectivity, Internet connectivity, and fast handoff to mobile clients across the mesh. Clients get connected automatically through standard DHCP. No software or drivers need to be installed......

4. ninux

ninux Ninux is an Italian wireless network community with the goal of creating and expanding a free, open and experimental computer network. It uses the OLSR (Optimized Link State Routing) Protocol, an IP routing protocol optimized for mobile ad hoc networks.......

5. OneSwarm

OneSwarm Supports both bittorrent protocol and a friend-to-friend version of the same protocol which in most situations makes you anonymous.......

6. OLSR (Optimized Link State Routing)

OLSR (Optimized Link State Routing) olsrd and olsrd2 are both Link State Routing Protocol implementations optimized for Mobile ad hoc networks on embedded devices like commercial of the shelf routers, smartphones or normal computers. Sometimes these networks are called "mesh networks". olsrd and olsrd2 are the routing daemons which make up the mesh.......

7. anoNet

anoNet In early 2005, a few people fed up with the way the Internet was heading, began in earnest to create a large wide area network that was secure and lived in its own space. On this new network anyone would be free to do as they saw fit - roam......

8. netcat

netcat Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging......

9. Osiris SPS

Osiris SPS Osiris is a free portal creation software. The portals created with Osiris don't need a central server; they are safe, indestructible and anonymous. In those portals, all users have the same rights, so the standard hierarchies (administrators, moderators, members) of regular forums are not present, even if they are supported.The......

10. Orbot

Orbot Orbot is an open source Tor Proxy App for Android Phones. If the phone is rooted, it can even transparently route all phone internet traffic through the Tor network. Should be installed alongside Orweb, an open source Tor web browser that will automatically use......

11. Onion Browser

Onion Browser Surf the web through the Tor network with this open source browser for iOS devices.......

12. Babel (protocol)

Babel (protocol) Babel is a loop-avoiding distance-vector routing protocol for IPv6 and IPv4 with fast convergence properties. It is based on the ideas in DSDV, AODV and Cisco's EIGRP, but is designed to work well not only in wired networks but also in wireless mesh networks, and has been extended with support......

13. SMS Privacy

SMS Privacy SMS Privacy allows you to buy mobile phone numbers, using Bitcoin, with completely anonymous signup. We don't even take an email address if you don't want to supply one. You can send and receive SMS text messages on these anonymous numbers using our web interface.There's a TOR hidden service. 0.005......

14. Freenet

Freenet Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in "darknet" mode, where users only connect to their......

15. Charon

Charon Searches Google for open proxies and includes a full anonymity checker. It provides a fully customisable way of filtering out unwanted proxies via control files, a proxy tester to check anonymity - and a fully functional search engine crawler to find lists of posted proxies. Included within the kit is......