proxychains VS i2pd

Compare proxychains vs i2pd and see what are their differences.

proxychains

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. (by haad)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
proxychains i2pd
19 54
6,053 3,093
- 1.9%
7.0 9.5
4 months ago 6 days ago
C C++
GNU General Public License v3.0 only BSD 3-clause "New" or "Revised" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

proxychains

Posts with mentions or reviews of proxychains. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-08.

i2pd

Posts with mentions or reviews of i2pd. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-26.

What are some alternatives?

When comparing proxychains and i2pd you can also consider the following projects:

torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git

i2p.i2p - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

CrackMapExec - A swiss army knife for pentesting networks

i2p-zero - Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface

Tor - Tor protects your privacy on the Internet by hiding the connection between your Internet address and the services you use. (This is *not* the official repository.)

i2pplus - I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/

nipe - An engine to make Tor network your default gateway

Freenet - Freenet REference Daemon

sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.

InviZible - Android application for online privacy and security

impacket - Impacket is a collection of Python classes for working with network protocols.

i2pdbrowser - i2pd browser bundle