Community Apps

Browse our large and growing catalog of applications to run in your Unraid server. 

Download the Plugin  |  Become a Community Developer


Community-built

All the applications you love—built and maintained by a community member who understands what you need on Unraid. Love a particular app or plugin? Donate directly to the developer to support their work.

Created by a Legend

Andrew (aka Squid) has worked tirelessly to build and enhance the experience of Community Apps for users like you.

Moderated and Vetted

Moderators ensure that apps listed in the store offer a safe, compatible, and consistent experience. 


Anope's Icon

Anope is a set of IRC Services designed for flexibility and ease of use. This container is configured by default to work with InspIRCd - fill out the required variables and start the container (also click on 'Show more settings' on the template page of InspIRCd to configure it for the Anope Services). WARNING: If you change a variable here it has no effect to the configuration - the configuration file is only changed on the first start of the container. If you made a mistake at the first start go to your the '/anope/conf' directory in your appdata folder and delete the file 'services.conf' after a restart of the container the values will be written again).

CSMM-7DtD's Icon

This Docker will install and download CSMM for 7DtD (CatalysmsServerManager). It's a powerfull Server Manager with Server automation, Discord notifications, High ping kicker, Country ban, Player tracking, Ingame commands, Economy system, Discord integration, Support ticket system, Server analytics,... for 7DtD. UPDATE NOTICE: Simply set the 'Force Update' to 'true' and restart the container (don't forget to turn it off after the update).

Debian-APT-Mirror's Icon

This container will run apt-mirror and Apache2. This allows you to create a local apt mirror for Debian packages. On first run you will have to edit the mirror.list file that lives in your CONFIG_DIR which repositories you want to sync and other settings like how many threads to use for downloading,... Restart the container afterwards (keep an eye on the logs the container will tell you what to do). ATTENTION/WARNING: Keep in mind that the first sync can take very long depending on how much repositories you've selected (stable main contrib non-free: Will take about 200GB of hard drive space!). Update from the mirror files: By default a cron job will run every day at 01:00 which will update your mirror. Mirror address: The default address for the mirror is 'http://ipFROMtheCONTAINER:980' Add something like this to your '/etc/apt/sources.list': 'deb http://ipFROMtheCONTAINER:980/debian stable main contrib non-free'

DirSyncPro's Icon

This Docker will download and install the Runtime and also DirSyncPro with optional encryption by CryFS. You can sync your files to another offsite SMB (is removed in the latest version, please use Unassigned Devices Plugin in Unraid and mount the share with the 'local' option), FTP or WebDAV share also don't forget to specify a path where your source files are. You can also use this tool to duplicate your files on the server to another directory. ENCRYPTION: If you want to use encryption by CryFS you can enable it in the variables below and the mounted folder will be automaticaly encrypted (smb: '/mnt/smb' - ftp: '/mnt/ftp' - webdav: '/mnt/webdav' - local: if you set the type to 'local' you must set the container mountpoint to: '/mnt/local'). Please also note if you set up a encrypted share for the first time the destination folder should be empty since CryFS will create a folder with the basic information for the encryption and all the split files (don't delete any folder since it can corrupt files). The docker will automaticaly create a directory named 'cryfs' in the main directory of DirSyncPro, please copy the 'cryfs.cfg' to a save place since you will need this file and your selected password for CryFS to decrypt the files. Restoring of encrypted files on another computer/server with this Docker: start the container once with CryFS enabled but set no password, the container will start and create the 'cryfs' directory, stop the container copy your cryfs.cfg in the 'cryfs' folder edit the Docker and set the apropriate password and blocksize for the cryfs.cfg and restart the Docker. Now you can sync from/or to your encrypted share again. Also there is a commandline mode without the GUI if you configured all right under the 'Show more settings' section, please be sure that you put your config file in the main directory of the Docker and specify it.

DoH-Client's Icon

This Container will create a DNS Server wich connects by default to Goole's & DNS.SB's DoH resolver with ECS disabled (you can change that simply by editing the 'doh-client.conf' in your root directory of the container) You easily can now hide your DNS querys from your ISP with this docker for your whole internal network, you can use it in combination with DoH-Server to protect even your mobile devices and encrypt all your querys. You can also use this infront of your PiHole to also block Ad's and with DoH-Server to secure your mobile devices. If you got any questions please post it in the support thread on the Unraid forums. I strongly recommend you to run the container in custom mode and give it a static IP address so that you expose all ports from the container and to avoid any network problems. Update Notice: If you want to upgrade to a newer version of the DoH-Server just enter the preferred version number (eg. '2.1.2' without quotes, get them from here: https://github.com/m13253/dns-over-https/releases or set to 'latest' without quotes to check on each container start if there is a new version available) The Docker needs to be run in bridge mode and a Fixed IP address. This Docker is based on the DoH Client component from: https://github.com/m13253/dns-over-https

DoH-Server's Icon

This is a simple DoH Server for Unraid. You easily can hide your DNS querys from your ISP with this docker on Firefox or Chrome and even on Android with the Intra App (by default it is set to use the Cloudflare and Google DNS servers). As a special bonus you can hide all Ad's on your Android Device on the go without the need of a VPN (for Android Devices only the Intra app is needed https://getintra.org/)! Very usefull if you have kids and they should not visit certain sites or if you simply don't like Ad's on your Android Device. All you need is a PiHole, a Webserver with an SSL Certificate & this Docker (i highly recommend you for the PiHole Docker: https://hub.docker.com/r/pihole/pihole | for the Webserver: https://hub.docker.com/r/linuxserver/letsencrypt both Dockers are available in the CA Applications). A detailed guide is available on my github page for this project: https://github.com/ich777/docker-DoH If you got any questions please poste it in the support thread on the Unraid forums. I strongly recommend you to run the container in custom mode and give it a static IP address so that you expose all ports from the container and to avoid any network problems. Update Notice: If you want to upgrade to a newer version of the DoH-Server just enter the preferred version number (eg. '2.1.2' without quotes, get them from here: https://github.com/m13253/dns-over-https/releases or set to 'latest' without quotes to check on each container start if there is a new version available) The Docker runns by default on port: 8053 and handels querys in the directory /dns-query (eg: http://192.168.1.7:8053/dns-query) This Docker is based on the DoH Server component from: https://github.com/m13253/dns-over-https

Electrum's Icon

Electrum is a Bitcoin wallet focused on speed and simplicity, with low resource usage. It uses remote servers that handle the most complicated parts of the Bitcoin system, and it allows you to recover your wallet from a secret phrase. ATTENTION: Please keep in mind that your wallet is stored in the created folder in your appdata directory/.electrum/wallets/YOURWALLETNAME - I strongly recommend you to backup this file on a regular basis! IMPORT: If you are already using Electrum you can import your existing wallet by placing the WALLETFILE in the appdata directory for electrum/.electrum/wallets and then choose to use a existing wallet.

Enpass's Icon

Enpass is a cross-platform password management app to securely store passwords and other credentials in a virtual vault locked with a master password. Unlike most other popular password managers, Enpass is an offline password manager. The app does not store user data on its servers, but locally on their own devices, encrypted. Users can choose to synchronize their data between different devices using their own preferred cloud storage service like Google Drive, Box, Dropbox, OneDrive, iCloud, and WebDAV.

FlutterCoin-Wallet's Icon

FlutterCoin may be a coin with the tried and true algorithm of scrypt, but it's definitely anything but ordinary. This is a community driven triple hybrid coin and the very first to offer a highly secure network through: Proof of Work (Mining), Proof of Stake (Investing), and it's own highly innovative Proof of Transaction (Using). ATTENTION: Please keep in mind that your wallet is stored in the created folder in your appdata directory/.fluttercoin/wallet.dat - I strongly recommend you to backup this file on a regular basis! IMPORT: If you are already using FlutterCoin you can import your existing wallet by placing the 'wallet.dat' in the appdata directory for fluttercoin/.fluttercoin/wallet.dat (please let the container fully startup if you are using it for the first time and then shut it down before replacing the wallet.dat). UPDATED NOTICE: The container will check on every start/restart if there is a newer version available.

InspIRCd's Icon

InspIRCd is a modular Internet Relay Chat (IRC) server written in C++ It was created from scratch to be stable, modern and lightweight. It provides a tunable number of features through the use of an advanced but well documented module system. By keeping core functionality to a minimum we hope to increase the stability, security and speed of InspIRCd while also making it customisable to the needs of many different users. NOTE: If you want to change the hostname turn on 'Advanced View' and at the 'Extra-Parameters' change '--hostname=YOURPREFERREDHOSTNAME' The container will create a TLS certificate at first start or if the certificate isn't found in the 'conf/' directory, after it is created you can import your own certificate. HASH CREATION NOTICE: Read the discription from the variable 'Operator Password Hash' how to create the hash from your password.

MEGASync's Icon

MEGAsync is an intuitive application that enables you to effortlessly synchronize folders on several computers. You simply need to upload data in the cloud and, within seconds, you can explore the same documents on your own PC. MEGAsync can synchronize all of your devices with your MEGA account. Access and work with your data securely across different locations and devices.

OpenVPN-Client's Icon

OpenVPN-Client

Network Services

This OpenVPN container was designed to be started first to provide a connection to other containers (using '--net=container:OpenVPN-Client'), see the documentation for further help here: https://github.com/ich777/docker-openvpn-client The basic steps for a OpenVPN connection that requires a Username and Password are: 1) Rename your *.ovpn to 'vpn.ovpn' and place it in your OpenVPN-Client directory, 2) Create in the same directory a file named 'vpn.auth' and place your Username in the first line and the Password for the connection in the second line and save it 3) Restart the container open the logs and see if the connection to your VPN establishes successfully. To tunnel traffic from another container through this container edit the template from the other container, set the 'Network Type' to: 'None', enable the advanced view in the top right corner and at 'Extra Parameters' add the following: '--net=container:OpenVPN-Client' (replace 'OpenVPN-Client' with the name of this container if you choose a different name for it) and write down the port(s) that you need to connect to. After that go back to edit this containers template and add the port that you have noted in the above step to this container and click 'Apply' now you can connect to the container that you tunneld the traffic though this container. You can route the traffic from multiple containers through this container with the steps above, if you need more ports then simply add more ports in this containers template. DNS: By default this container uses Googles DNS Server: 8.8.8.8 if you want to edit this turn on 'Advanced View' and edit this setting at 'Extra Parameters'. IPv6: By default IPv6 is disabled in this container. If you want to enable it turn on 'Advanced View' and delete the entry: '--sysctl net.ipv6.conf.all.disable_ipv6=1' from the 'Extra Parameters' or simply set it to: '--sysctl net.ipv6.conf.all.disable_ipv6=0'. ADVANCED CONFIG: If you leave the appdata directory for this container empty it will start up and you have to manually configure it with the builtin comand: 'openvpn.sh', see: https://github.com/ich777/docker-openvpn-client

Proxy-Server's Icon

Proxy-Server

Network ServicesPrivacy

This container is a dedicated http/https and SOCKS5 proxy both with authentication support. It's intended usecase is to use it in combination with a VPN container to give your applications outside of your server access to the VPN. If you VPN supports native Wireguard support: 1. Go to the built in VPN Manager in the Settings tab in Unraid 2. Import the configuration vrom your VPN provider 3. Make sure that "Peer type of access" is set to "VPN tunneled access for docker" 4. Change the slider to active 5. Set the network from this container to the wg: network from your provider To connect the container to a already installed VPN container: 1. Set the Network Type in this Docker template to None 2. Enable the Advanced View on the top right corner from this Docker template and append: --net=container:CONTAINERNAME To the Extra Parameters (you have to change CONTAINERNAME to the VPN Docker container name eg: --net=container:binhex-delugevpn when the VPN Docker container name is binhex-delugevpn - case sensitive!). 3. Go to the VPN Docker template and create two new port mappings with the button Add another Path, Port, Variable, Label or Device, by default 8118 (for http/https proxy) and 1030 (for SOCKS5 proxy) both TCP protocol and with host/container port set to the same port. 4. When you've done that you can connect the application(s) to the proxy to the host IP from the VPN Docker container, by default with 8118 (for http/https proxy) and 1030 (for SOCKS5 proxy) Note for Firefox and Chrome: Firefox and Chrome natively don't support authentication for a SOCKS5 proxy, it is recommended to use a extension like FoxyProxy supports authentication). URL encode: If you are using a password with special charcters and want to use the http/https proxy system wide, the container ships with urlencode to convert your password to a URL compatible format. Just open up a terminal from the container, issue urlencode and follow the prompts. The container uses dumbproxy and socks5 (both written in golang) as a backend to serve http/https and SOCKS5 proxy.

RCON's Icon

This plugin adds RCON to your unRAID server and enables your to connecto to various servers who are following the RCON protocol standard. Simply issue 'rcon -h' from an unRAID Terminal and you get an overview on how to connect. A basic connection command will look like this: 'rcon -a RCONIP:RCONPORT -p PASSWORD' to end the connection press CTRL + C. ATTENTION: The RCON protocol transmits everything un-encrypted (including your password!). Therefore it is strongly recommended to not connect to RCON over the internet rather it is recommended to use a VPN or SSH if you want to connect to a foreign server over the internet. Source: https://github.com/n0la/rcon

Remmina's Icon

Remmina is a remote desktop client for POSIX-based computer operating systems. It supports the Remote Desktop Protocol, VNC, NX, XDMCP, SPICE and SSH protocols. With this container you can connect through VNC to your RDP session, SSH,... In the Docker Hub description for the container is a example how to reverse proxy noVNC with nginx and secure it via http basic authentification.

Stun-Turn-Server's Icon

This is a Basic STUN & TURN server that was mainly created for Nextcloud Talk. It is fully automated and will create all the necessary files and passwords so that the server can sucessfully start and run. Please read all the discriptions from the Variables carefully and also look at the 'Show more settings' tab. ATTENTION: Please ignore the socket errors after the server startup if you don't have IPv6 enabled on your server.

TeamSpeak3's Icon

This container will download and install TeamSpeak3 Server. FIRST RUN: at first run the token will be displayed in the log (also don't forget to accept the license in the template). UPDATE NOTICE: The container will check on every start/restart if there is a newer version of the server available and install it.

TheLounge's Icon

TheLonge is the self-hosted web IRC client. Modern features brought to IRC, Always connected, Responsive interface, Synchronized experience The Lounge is the official and community-managed fork of Shout, by Mattias Erming. Multiple Users: If you want to create a new user simply change the name in the 'Username' variable and also the 'Password' variable, this will have no impact to existing users (the 'Username' variable can't be empty and should always have a username in it that is available on the server).

ZNC's Icon

ZNC is an IRC network bouncer or BNC. It can detach the client from the actual IRC server, and also from selected channels. Multiple clients from different locations can connect to a single ZNC account simultaneously and therefore appear under the same nickname on IRC. It supports Transport Layer Security connections and IPv6. DEFAULT CREDENTIALS: Username: admin Password: admin